Vulnerabilites related to arubanetworks - nx-11700
CVE-2020-12148 (GCVE-0-2020-12148)
Vulnerability from cvelistv5
Published
2020-12-11 15:24
Modified
2024-09-16 23:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Silver Peak Systems, Inc. | ECOS |
Version: All current ECOS versions prior to 8.1.9.15 Version: 8.3.0.8 Version: 8.3.1.2 Version: 8.3.2.0 Version: 9.0.2.0 Version: and 9.1.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:58.361Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.silver-peak.com/support/user-documentation/security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ECOS", "vendor": "Silver Peak Systems, Inc.", "versions": [ { "status": "affected", "version": "All current ECOS versions prior to 8.1.9.15" }, { "status": "affected", "version": "8.3.0.8" }, { "status": "affected", "version": "8.3.1.2" }, { "status": "affected", "version": "8.3.2.0" }, { "status": "affected", "version": "9.0.2.0" }, { "status": "affected", "version": "and 9.1.0.0" } ] } ], "credits": [ { "lang": "en", "value": "This vulnerability was reported to Silver Peak by Alexander Smye and Jonathan Letham from the security team at NCC Group." } ], "datePublic": "2020-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 OS Command Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-15T16:13:57", "orgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c", "shortName": "Silver Peak" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.silver-peak.com/support/user-documentation/security-advisories" } ], "source": { "advisory": "2020-11-15-01-001", "discovery": "EXTERNAL" }, "title": "OS Command Injection - nslookup API", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@silver-peak.com", "DATE_PUBLIC": "2020-11-30T17:30:00.000Z", "ID": "CVE-2020-12148", "STATE": "PUBLIC", "TITLE": "OS Command Injection - nslookup API" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ECOS", "version": { "version_data": [ { "version_value": "All current ECOS versions prior to 8.1.9.15" }, { "version_value": "8.3.0.8" }, { "version_value": "8.3.1.2" }, { "version_value": "8.3.2.0" }, { "version_value": "9.0.2.0" }, { "version_value": "and 9.1.0.0" } ] } } ] }, "vendor_name": "Silver Peak Systems, Inc." } ] } }, "credit": [ { "lang": "eng", "value": "This vulnerability was reported to Silver Peak by Alexander Smye and Jonathan Letham from the security team at NCC Group." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-78 OS Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.silver-peak.com/support/user-documentation/security-advisories", "refsource": "MISC", "url": "https://www.silver-peak.com/support/user-documentation/security-advisories" } ] }, "source": { "advisory": "2020-11-15-01-001", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c", "assignerShortName": "Silver Peak", "cveId": "CVE-2020-12148", "datePublished": "2020-12-11T15:24:23.056324Z", "dateReserved": "2020-04-24T00:00:00", "dateUpdated": "2024-09-16T23:05:48.430Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-12149 (GCVE-0-2020-12149)
Vulnerability from cvelistv5
Published
2020-12-11 15:23
Modified
2024-09-16 23:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Silver Peak Systems, Inc. | ECOS |
Version: All current ECOS versions prior to 8.1.9.15 Version: 8.3.0.8 Version: 8.3.1.2 Version: 8.3.2.0 Version: 9.0.2.0 Version: and 9.1.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:58.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.silver-peak.com/support/user-documentation/security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ECOS", "vendor": "Silver Peak Systems, Inc.", "versions": [ { "status": "affected", "version": "All current ECOS versions prior to 8.1.9.15" }, { "status": "affected", "version": "8.3.0.8" }, { "status": "affected", "version": "8.3.1.2" }, { "status": "affected", "version": "8.3.2.0" }, { "status": "affected", "version": "9.0.2.0" }, { "status": "affected", "version": "and 9.1.0.0" } ] } ], "credits": [ { "lang": "en", "value": "This vulnerability was reported to Silver Peak by Alexander Smye and Jonathan Letham from the security team at NCC Group." } ], "datePublic": "2020-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 OS Command Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-15T16:14:01", "orgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c", "shortName": "Silver Peak" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.silver-peak.com/support/user-documentation/security-advisories" } ], "solutions": [ { "lang": "en", "value": "The backup/restore functions in the patched versions of ECOS software have been modified to only accept alphanumeric characters, along with the period, hyphen, and underscore characters. This change ensures that OS commands cannot be injected via filename." } ], "source": { "advisory": "2020-11-15-01-002", "discovery": "EXTERNAL" }, "title": "OS Command Injection - Management File Upload", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@silver-peak.com", "DATE_PUBLIC": "2020-11-30T17:30:00.000Z", "ID": "CVE-2020-12149", "STATE": "PUBLIC", "TITLE": "OS Command Injection - Management File Upload" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ECOS", "version": { "version_data": [ { "version_value": "All current ECOS versions prior to 8.1.9.15" }, { "version_value": "8.3.0.8" }, { "version_value": "8.3.1.2" }, { "version_value": "8.3.2.0" }, { "version_value": "9.0.2.0" }, { "version_value": "and 9.1.0.0" } ] } } ] }, "vendor_name": "Silver Peak Systems, Inc." } ] } }, "credit": [ { "lang": "eng", "value": "This vulnerability was reported to Silver Peak by Alexander Smye and Jonathan Letham from the security team at NCC Group." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-78 OS Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.silver-peak.com/support/user-documentation/security-advisories", "refsource": "MISC", "url": "https://www.silver-peak.com/support/user-documentation/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "The backup/restore functions in the patched versions of ECOS software have been modified to only accept alphanumeric characters, along with the period, hyphen, and underscore characters. This change ensures that OS commands cannot be injected via filename." } ], "source": { "advisory": "2020-11-15-01-002", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c", "assignerShortName": "Silver Peak", "cveId": "CVE-2020-12149", "datePublished": "2020-12-11T15:23:32.991669Z", "dateReserved": "2020-04-24T00:00:00", "dateUpdated": "2024-09-16T23:26:33.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-12-11 16:15
Modified
2024-12-12 18:27
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
Summary
The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5865651-63E8-48B3-8247-FE5B9200F9F6", "versionEndExcluding": "8.1.9.15", "versionStartIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "1753A7F3-07DC-422A-BB41-83B9C32846D3", "versionEndExcluding": "8.3.0.8", "versionStartIncluding": "8.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "3120A0E3-BFBA-4CB7-A29B-73B0220B916E", "versionEndExcluding": "8.3.1.2", "versionStartIncluding": "8.3.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "547026C9-CCBD-451E-AEC9-4DAFFB5B89C2", "versionEndExcluding": "9.0.2.0", "versionStartIncluding": "9.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:arubanetworks:vx-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2180B045-86D1-44FB-A665-60CDFA26F5DE", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "4353377E-9D3C-423F-9582-925C81E6D7DB", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD514ED5-0E97-4300-B960-53B048383662", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-500:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3466FD-0EFE-45E6-AA18-5FF55541B9A4", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F95797-8F64-4200-933C-0EE89E9D9D61", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2785D127-06A0-4E85-80AE-6B00E73CA013", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1736626-683E-49C4-B4A1-0EA86FFA4D6A", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-8000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2869A025-2379-4593-8B0F-B6B5437CD696", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B4E6381-FAF4-4ED4-9405-5336356D9637", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-10700:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFC924C3-9038-4CA4-8738-0705744D11B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-11700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8140B4EC-955F-4FC0-8706-BBF365270854", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-1700:-:*:*:*:*:*:*:*", "matchCriteriaId": "C285EFEB-2FF0-45CA-AAB2-9224D4AD93BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "A844F08B-BCAA-4BE8-A7FE-1F6864D948FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-3700:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8788AD7-B697-4B9F-BC51-CE2E78AE3044", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E15328DE-CA41-46F9-925C-3B49121855DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "D21A0F79-B79B-4C42-848B-4A38267AD331", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*", "matchCriteriaId": "204B5FB4-A1F7-445C-83C5-868A7BC698BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DECBFDA6-4C9A-4EC0-8642-451ECC336A94", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5CEF46C-AA03-4E03-8E3A-E0D2FEEA8C24", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "10325BCF-63AA-4767-A60D-14CA0A429546", "vulnerable": false }, { "criteria": "cpe:2.3:h:silver-peak:unity_edgeconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4A46BCC-53C0-4FAC-B006-562DD282DD98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0." }, { "lang": "es", "value": "Se detect\u00f3 que la funci\u00f3n backup/restore de la configuraci\u00f3n en el software del dispositivo Silver Peak Unity ECOSTM (ECOS) incorpora directamente el nombre de archivo de configuraci\u00f3n controlado por el usuario en un comando shell posterior, permitiendo a un atacante manipular el comando resultante al inyectar una entrada de comando v\u00e1lida del sistema operativo. Esta vulnerabilidad puede ser explotada por un atacante con acceso autenticado a la Interfaz de Usuario de Orchestrator o la Interfaz de Usuario de EdgeConnect. Esto afecta a todas las versiones de ECOS anteriores a: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0 y 9.1.0.0" } ], "id": "CVE-2020-12149", "lastModified": "2024-12-12T18:27:55.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "sirt@silver-peak.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-11T16:15:11.807", "references": [ { "source": "sirt@silver-peak.com", "tags": [ "Vendor Advisory" ], "url": "https://www.silver-peak.com/support/user-documentation/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.silver-peak.com/support/user-documentation/security-advisories" } ], "sourceIdentifier": "sirt@silver-peak.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "sirt@silver-peak.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-11 16:15
Modified
2024-12-12 18:19
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
Summary
A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5865651-63E8-48B3-8247-FE5B9200F9F6", "versionEndExcluding": "8.1.9.15", "versionStartIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "1753A7F3-07DC-422A-BB41-83B9C32846D3", "versionEndExcluding": "8.3.0.8", "versionStartIncluding": "8.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "3120A0E3-BFBA-4CB7-A29B-73B0220B916E", "versionEndExcluding": "8.3.1.2", "versionStartIncluding": "8.3.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "547026C9-CCBD-451E-AEC9-4DAFFB5B89C2", "versionEndExcluding": "9.0.2.0", "versionStartIncluding": "9.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:arubanetworks:vx-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2180B045-86D1-44FB-A665-60CDFA26F5DE", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "4353377E-9D3C-423F-9582-925C81E6D7DB", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD514ED5-0E97-4300-B960-53B048383662", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-500:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3466FD-0EFE-45E6-AA18-5FF55541B9A4", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F95797-8F64-4200-933C-0EE89E9D9D61", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2785D127-06A0-4E85-80AE-6B00E73CA013", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1736626-683E-49C4-B4A1-0EA86FFA4D6A", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-8000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2869A025-2379-4593-8B0F-B6B5437CD696", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B4E6381-FAF4-4ED4-9405-5336356D9637", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-10700:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFC924C3-9038-4CA4-8738-0705744D11B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-11700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8140B4EC-955F-4FC0-8706-BBF365270854", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-1700:-:*:*:*:*:*:*:*", "matchCriteriaId": "C285EFEB-2FF0-45CA-AAB2-9224D4AD93BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "A844F08B-BCAA-4BE8-A7FE-1F6864D948FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-3700:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8788AD7-B697-4B9F-BC51-CE2E78AE3044", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E15328DE-CA41-46F9-925C-3B49121855DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "D21A0F79-B79B-4C42-848B-4A38267AD331", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*", "matchCriteriaId": "204B5FB4-A1F7-445C-83C5-868A7BC698BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DECBFDA6-4C9A-4EC0-8642-451ECC336A94", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5CEF46C-AA03-4E03-8E3A-E0D2FEEA8C24", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "10325BCF-63AA-4767-A60D-14CA0A429546", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0." }, { "lang": "es", "value": "Un fallo de inyecci\u00f3n de comandos identificada en la API nslookup en el software del dispositivo Silver Peak Unity ECOSTM (ECOS), podr\u00eda permitir a un atacante ejecutar comandos arbitrarios con los privilegios del servidor web que se ejecuta en el dispositivo EdgeConnect. Un atacante podr\u00eda explotar esta vulnerabilidad para establecer un canal interactivo, tomando el control efectivamente del sistema objetivo. Esta vulnerabilidad puede ser explotada por un atacante con acceso autenticado a la Interfaz de Usuario de Orchestrator o la Interfaz de Usuario de EdgeConnect. Esto afecta a todas las versiones de ECOS anteriores a: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0 y 9.1.0.0" } ], "id": "CVE-2020-12148", "lastModified": "2024-12-12T18:19:50.530", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "sirt@silver-peak.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-11T16:15:11.697", "references": [ { "source": "sirt@silver-peak.com", "tags": [ "Vendor Advisory" ], "url": "https://www.silver-peak.com/support/user-documentation/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.silver-peak.com/support/user-documentation/security-advisories" } ], "sourceIdentifier": "sirt@silver-peak.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "sirt@silver-peak.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }