Vulnerabilites related to arubanetworks - vx-7000
CVE-2020-12142 (GCVE-0-2020-12142)
Vulnerability from cvelistv5
Published
2020-05-05 19:54
Modified
2024-08-04 11:48
CWE
  • CWE-668 - Exposure of Resource to Wrong Sphere
Summary
1. IPSec UDP key material can be retrieved from machine-to-machine interfaces and human-accessible interfaces by a user with admin credentials. Such a user, with the required system knowledge, could use this material to decrypt in-flight communication. 2. The vulnerability requires administrative access and shell access to the EdgeConnect appliance. An admin user can access IPSec seed and nonce parameters using the CLI, REST APIs, and the Linux shell.
Impacted products
Vendor Product Version
Silver Peak Systems, Inc. 1. Unity EdgeConnect, NX, VX 2. Unity Orchestrator,   3. EdgeConnect in AWS, Azure, GCP  Version: All versions affected prior to Silver Peak Unity ECOS™ 8.3.2+, 8.1.9.12+ and Silver Peak Unity Orchestrator™ 8.9.2+
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:48:58.551Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_ipsec_udp_key_material-cve_2020_12142.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "1. Unity EdgeConnect, NX, VX 2. Unity Orchestrator, \u202f 3. EdgeConnect in AWS, Azure, GCP\u202f ",
          "vendor": "Silver Peak Systems, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "All versions affected prior to Silver Peak Unity ECOS\u2122 8.3.2+, 8.1.9.12+ and Silver Peak Unity Orchestrator\u2122 8.9.2+ "
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "value": "\u2022\tEdgeConnect software has been modified to prevent users from accessing IPSec seed and nonce parameters using the CLI, REST APIs, and the Linux shell. \n\n\u2022\tEdgeConnect software has been modified to allow customers to choose not to persist the IPSec seed for additional security. \n"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "This vulnerability was reported to Silver Peak by Denis Kolegov, Mariya Nedyak, and Anton Nikolaev from the SD-WAN New Hop team. "
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "1. IPSec UDP key material can be retrieved from machine-to-machine interfaces and human-accessible interfaces by a user with admin credentials. Such a user, with the required system knowledge, could use this material to decrypt in-flight communication. 2. The vulnerability requires administrative access and shell access to the EdgeConnect appliance. An admin user can access IPSec seed and nonce parameters using the CLI, REST APIs, and the Linux shell."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-668",
              "description": "CWE-668: Exposure of Resource to Wrong Sphere",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-05-07T16:57:35",
        "orgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c",
        "shortName": "Silver Peak"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_ipsec_udp_key_material-cve_2020_12142.pdf"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_ipsec_udp_key_material_cve_2020_12142.pdf"
        }
      ],
      "source": {
        "advisory": "2020 -04-24-001- 001",
        "discovery": "EXTERNAL"
      },
      "title": "IPSec UDP key material can be retrieved from EdgeConnect by a user with admin credentials",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "sirt@silver-peak.com",
          "ID": "CVE-2020-12142",
          "STATE": "PUBLIC",
          "TITLE": "IPSec UDP key material can be retrieved from EdgeConnect by a user with admin credentials"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "1. Unity EdgeConnect, NX, VX 2. Unity Orchestrator, \u202f 3. EdgeConnect in AWS, Azure, GCP\u202f ",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All versions affected prior to Silver Peak Unity ECOS\u2122 8.3.2+, 8.1.9.12+ and Silver Peak Unity Orchestrator\u2122 8.9.2+ "
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Silver Peak Systems, Inc."
              }
            ]
          }
        },
        "configuration": [
          {
            "lang": "en",
            "value": "\u2022\tEdgeConnect software has been modified to prevent users from accessing IPSec seed and nonce parameters using the CLI, REST APIs, and the Linux shell. \n\n\u2022\tEdgeConnect software has been modified to allow customers to choose not to persist the IPSec seed for additional security. \n"
          }
        ],
        "credit": [
          {
            "lang": "eng",
            "value": "This vulnerability was reported to Silver Peak by Denis Kolegov, Mariya Nedyak, and Anton Nikolaev from the SD-WAN New Hop team. "
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "1. IPSec UDP key material can be retrieved from machine-to-machine interfaces and human-accessible interfaces by a user with admin credentials. Such a user, with the required system knowledge, could use this material to decrypt in-flight communication. 2. The vulnerability requires administrative access and shell access to the EdgeConnect appliance. An admin user can access IPSec seed and nonce parameters using the CLI, REST APIs, and the Linux shell."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-668: Exposure of Resource to Wrong Sphere"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_ipsec_udp_key_material-cve_2020_12142.pdf",
              "refsource": "CONFIRM",
              "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_ipsec_udp_key_material-cve_2020_12142.pdf"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_ipsec_udp_key_material_cve_2020_12142.pdf"
          }
        ],
        "source": {
          "advisory": "2020 -04-24-001- 001",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c",
    "assignerShortName": "Silver Peak",
    "cveId": "CVE-2020-12142",
    "datePublished": "2020-05-05T19:54:07",
    "dateReserved": "2020-04-24T00:00:00",
    "dateUpdated": "2024-08-04T11:48:58.551Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12143 (GCVE-0-2020-12143)
Vulnerability from cvelistv5
Published
2020-05-05 19:53
Modified
2024-08-04 11:48
CWE
  • CWE-295 - Improper Certificate Validation
Summary
The certificate used to identify Orchestrator to EdgeConnect devices is not validated, which makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted Orchestrator.
Impacted products
Vendor Product Version
Silver Peak Systems, Inc. 1. Unity EdgeConnect, NX, VX 2. Unity Orchestrator,   3. EdgeConnect in AWS, Azure, GCP  Version: All versions affected prior to Silver Peak Unity ECOS™ 8.3.2+, 8.1.9.12+ and Silver Peak Unity Orchestrator™ 8.9.2+
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:48:58.488Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_orchestrator-cve_2020_12143.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "1. Unity EdgeConnect, NX, VX 2. Unity Orchestrator, \u202f 3. EdgeConnect in AWS, Azure, GCP\u202f ",
          "vendor": "Silver Peak Systems, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "All versions affected prior to Silver Peak Unity ECOS\u2122 8.3.2+, 8.1.9.12+ and Silver Peak Unity Orchestrator\u2122 8.9.2+ "
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "value": "Any required configuration\n\u2022\tDo not change Orchestrator\u2019s IP address as discovered by the EdgeConnect appliance. \n\u2022\tUpgrade to Silver Peak Unity ECOS\u2122 8.3.2+ or 8.1.9.12+ and Silver Peak Unity Orchestrator\u2122 8.9.2+. \n\u2022\tIn Orchestrator, enable the \u201cVerify Orchestrator Certificate\u201d option under Advanced Security Settings. \n\nSolution link - References \n             The full details of the CVE can be found at https://www.cvedetails.com/cve/CVE-2020-12143.  \n"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "This vulnerability was reported to Silver Peak by Denis Kolegov, Mariya Nedyak, and Anton Nikolaev from the SD-WAN New Hop team."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The certificate used to identify Orchestrator to EdgeConnect devices is not validated, which makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted Orchestrator."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295: Improper Certificate Validation ",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-05-07T16:58:22",
        "orgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c",
        "shortName": "Silver Peak"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_orchestrator-cve_2020_12143.pdf"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Any required configuration\n\u2022\tDo not change Orchestrator\u2019s IP address as discovered by the EdgeConnect appliance. \n\u2022\tUpgrade to Silver Peak Unity ECOS\u2122 8.3.2+ or 8.1.9.12+ and Silver Peak Unity Orchestrator\u2122 8.9.2+. \n\u2022\tIn Orchestrator, enable the \u201cVerify Orchestrator Certificate\u201d option under Advanced Security Settings. \n\nSolution link - References \n             The full details of the CVE can be found at https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_orchestrator_cve_2020_12143.pdf\n"
        }
      ],
      "source": {
        "advisory": "2020 -04-24-001- 002",
        "discovery": "EXTERNAL"
      },
      "title": "The certificate used to identify Orchestrator to EdgeConnect devices is not validated ",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "sirt@silver-peak.com",
          "ID": "CVE-2020-12143",
          "STATE": "PUBLIC",
          "TITLE": "The certificate used to identify Orchestrator to EdgeConnect devices is not validated "
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "1. Unity EdgeConnect, NX, VX 2. Unity Orchestrator, \u202f 3. EdgeConnect in AWS, Azure, GCP\u202f ",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "All versions affected prior to Silver Peak Unity ECOS\u2122 8.3.2+, 8.1.9.12+ and Silver Peak Unity Orchestrator\u2122 8.9.2+ ",
                            "version_value": "All versions affected prior to Silver Peak Unity ECOS\u2122 8.3.2+, 8.1.9.12+ and Silver Peak Unity Orchestrator\u2122 8.9.2+ "
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Silver Peak Systems, Inc."
              }
            ]
          }
        },
        "configuration": [
          {
            "lang": "en",
            "value": "Any required configuration\n\u2022\tDo not change Orchestrator\u2019s IP address as discovered by the EdgeConnect appliance. \n\u2022\tUpgrade to Silver Peak Unity ECOS\u2122 8.3.2+ or 8.1.9.12+ and Silver Peak Unity Orchestrator\u2122 8.9.2+. \n\u2022\tIn Orchestrator, enable the \u201cVerify Orchestrator Certificate\u201d option under Advanced Security Settings. \n\nSolution link - References \n             The full details of the CVE can be found at https://www.cvedetails.com/cve/CVE-2020-12143.  \n"
          }
        ],
        "credit": [
          {
            "lang": "eng",
            "value": "This vulnerability was reported to Silver Peak by Denis Kolegov, Mariya Nedyak, and Anton Nikolaev from the SD-WAN New Hop team."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The certificate used to identify Orchestrator to EdgeConnect devices is not validated, which makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted Orchestrator."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-295: Improper Certificate Validation "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_orchestrator-cve_2020_12143.pdf",
              "refsource": "CONFIRM",
              "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_orchestrator-cve_2020_12143.pdf"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Any required configuration\n\u2022\tDo not change Orchestrator\u2019s IP address as discovered by the EdgeConnect appliance. \n\u2022\tUpgrade to Silver Peak Unity ECOS\u2122 8.3.2+ or 8.1.9.12+ and Silver Peak Unity Orchestrator\u2122 8.9.2+. \n\u2022\tIn Orchestrator, enable the \u201cVerify Orchestrator Certificate\u201d option under Advanced Security Settings. \n\nSolution link - References \n             The full details of the CVE can be found at https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_orchestrator_cve_2020_12143.pdf\n"
          }
        ],
        "source": {
          "advisory": "2020 -04-24-001- 002",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c",
    "assignerShortName": "Silver Peak",
    "cveId": "CVE-2020-12143",
    "datePublished": "2020-05-05T19:53:56",
    "dateReserved": "2020-04-24T00:00:00",
    "dateUpdated": "2024-08-04T11:48:58.488Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12148 (GCVE-0-2020-12148)
Vulnerability from cvelistv5
Published
2020-12-11 15:24
Modified
2024-09-16 23:05
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • CWE-78 - OS Command Injection
Summary
A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.
Impacted products
Vendor Product Version
Silver Peak Systems, Inc. ECOS Version: All current ECOS versions prior to 8.1.9.15
Version: 8.3.0.8
Version: 8.3.1.2
Version: 8.3.2.0
Version: 9.0.2.0
Version: and 9.1.0.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:48:58.361Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.silver-peak.com/support/user-documentation/security-advisories"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ECOS",
          "vendor": "Silver Peak Systems, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "All current ECOS versions prior to 8.1.9.15"
            },
            {
              "status": "affected",
              "version": "8.3.0.8"
            },
            {
              "status": "affected",
              "version": "8.3.1.2"
            },
            {
              "status": "affected",
              "version": "8.3.2.0"
            },
            {
              "status": "affected",
              "version": "9.0.2.0"
            },
            {
              "status": "affected",
              "version": "and 9.1.0.0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "This vulnerability was reported to Silver Peak by Alexander Smye and Jonathan Letham from the security team at NCC Group."
        }
      ],
      "datePublic": "2020-11-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 OS Command Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-12-15T16:13:57",
        "orgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c",
        "shortName": "Silver Peak"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.silver-peak.com/support/user-documentation/security-advisories"
        }
      ],
      "source": {
        "advisory": "2020-11-15-01-001",
        "discovery": "EXTERNAL"
      },
      "title": "OS Command Injection - nslookup API",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "sirt@silver-peak.com",
          "DATE_PUBLIC": "2020-11-30T17:30:00.000Z",
          "ID": "CVE-2020-12148",
          "STATE": "PUBLIC",
          "TITLE": "OS Command Injection - nslookup API"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ECOS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All current ECOS versions prior to 8.1.9.15"
                          },
                          {
                            "version_value": "8.3.0.8"
                          },
                          {
                            "version_value": "8.3.1.2"
                          },
                          {
                            "version_value": "8.3.2.0"
                          },
                          {
                            "version_value": "9.0.2.0"
                          },
                          {
                            "version_value": "and 9.1.0.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Silver Peak Systems, Inc."
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "This vulnerability was reported to Silver Peak by Alexander Smye and Jonathan Letham from the security team at NCC Group."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
                }
              ]
            },
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78 OS Command Injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.silver-peak.com/support/user-documentation/security-advisories",
              "refsource": "MISC",
              "url": "https://www.silver-peak.com/support/user-documentation/security-advisories"
            }
          ]
        },
        "source": {
          "advisory": "2020-11-15-01-001",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c",
    "assignerShortName": "Silver Peak",
    "cveId": "CVE-2020-12148",
    "datePublished": "2020-12-11T15:24:23.056324Z",
    "dateReserved": "2020-04-24T00:00:00",
    "dateUpdated": "2024-09-16T23:05:48.430Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12144 (GCVE-0-2020-12144)
Vulnerability from cvelistv5
Published
2020-05-05 19:54
Modified
2024-08-04 11:48
CWE
  • CWE-295 - Improper Certificate Validation
Summary
The certificate used to identify the Silver Peak Cloud Portal to EdgeConnect devices is not validated. This makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted portal.
Impacted products
Vendor Product Version
Silver Peak Systems, Inc. 1. Unity EdgeConnect, NX, VX 2. Unity Orchestrator  3. EdgeConnect in AWS, Azure, GCP  Version: All versions affected prior to Silver Peak Unity ECOS™ 8.3.2+, 8.1.9.12+ and Silver Peak Unity Orchestrator™ 8.9.2+
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:48:58.453Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_portal-cve_2020_12144.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "1. Unity EdgeConnect, NX, VX 2. Unity Orchestrator\u202f  3. EdgeConnect in AWS, Azure, GCP\u202f",
          "vendor": "Silver Peak Systems, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "All versions affected prior to Silver Peak Unity ECOS\u2122 8.3.2+, 8.1.9.12+ and Silver Peak Unity Orchestrator\u2122 8.9.2+"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "This vulnerability was reported to Silver Peak by Denis Kolegov, Mariya Nedyak, and Anton Nikolaev from the SD-WAN New Hop team."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The certificate used to identify the Silver Peak Cloud Portal to EdgeConnect devices is not validated. This makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted portal."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295: Improper Certificate Validation ",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-05-07T16:59:01",
        "orgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c",
        "shortName": "Silver Peak"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_portal-cve_2020_12144.pdf"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Resolution \n\u2022\tChanges have been made to strengthen the initial exchange between the EdgeConnect appliance and the Cloud Portal. After the changes, EdgeConnect will validate the certificate used to identify the Silver Peak Cloud Portal to EdgeConnect. \n\n\u2022\tTLS itself is continually subject to newly discovered and exploitable vulnerabilities. As such, all versions of EdgeConnect software implement additional out-of-band and user-controlled authentication mechanisms. \n\nAny required configuration\n\u2022\tDo not change Cloud Portal\u2019s IP address as discovered by the EdgeConnect appliance. \n\u2022\tUpgrade to Silver Peak Unity ECOS\u2122 8.3.2+ or 8.1.9.12+ and Silver Peak Unity  Orchestrator\u2122 8.9.2+. \n\u2022\tIn Orchestrator, enable the \u201cVerify Portal Certificate\u201d option under Advanced Security Settings. \n"
        },
        {
          "lang": "en",
          "value": "The full details of the CVE can be found at https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_portal_cve_2020_12144.pdf"
        }
      ],
      "source": {
        "advisory": "2020 -04-24-001- 003",
        "discovery": "EXTERNAL"
      },
      "title": "The certificate used to identify the Silver Peak Cloud Portal to EdgeConnect devices is not validated ",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "sirt@silver-peak.com",
          "ID": "CVE-2020-12144",
          "STATE": "PUBLIC",
          "TITLE": "The certificate used to identify the Silver Peak Cloud Portal to EdgeConnect devices is not validated "
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "1. Unity EdgeConnect, NX, VX 2. Unity Orchestrator\u202f  3. EdgeConnect in AWS, Azure, GCP\u202f",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "All versions affected prior to Silver Peak Unity ECOS\u2122 8.3.2+, 8.1.9.12+ and Silver Peak Unity Orchestrator\u2122 8.9.2+",
                            "version_value": "All versions affected prior to Silver Peak Unity ECOS\u2122 8.3.2+, 8.1.9.12+ and Silver Peak Unity Orchestrator\u2122 8.9.2+"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Silver Peak Systems, Inc."
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "This vulnerability was reported to Silver Peak by Denis Kolegov, Mariya Nedyak, and Anton Nikolaev from the SD-WAN New Hop team."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The certificate used to identify the Silver Peak Cloud Portal to EdgeConnect devices is not validated. This makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted portal."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-295: Improper Certificate Validation "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_portal-cve_2020_12144.pdf",
              "refsource": "CONFIRM",
              "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_portal-cve_2020_12144.pdf"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Resolution \n\u2022\tChanges have been made to strengthen the initial exchange between the EdgeConnect appliance and the Cloud Portal. After the changes, EdgeConnect will validate the certificate used to identify the Silver Peak Cloud Portal to EdgeConnect. \n\n\u2022\tTLS itself is continually subject to newly discovered and exploitable vulnerabilities. As such, all versions of EdgeConnect software implement additional out-of-band and user-controlled authentication mechanisms. \n\nAny required configuration\n\u2022\tDo not change Cloud Portal\u2019s IP address as discovered by the EdgeConnect appliance. \n\u2022\tUpgrade to Silver Peak Unity ECOS\u2122 8.3.2+ or 8.1.9.12+ and Silver Peak Unity  Orchestrator\u2122 8.9.2+. \n\u2022\tIn Orchestrator, enable the \u201cVerify Portal Certificate\u201d option under Advanced Security Settings. \n"
          },
          {
            "lang": "en",
            "value": "The full details of the CVE can be found at https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_portal_cve_2020_12144.pdf"
          }
        ],
        "source": {
          "advisory": "2020 -04-24-001- 003",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c",
    "assignerShortName": "Silver Peak",
    "cveId": "CVE-2020-12144",
    "datePublished": "2020-05-05T19:54:00",
    "dateReserved": "2020-04-24T00:00:00",
    "dateUpdated": "2024-08-04T11:48:58.453Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12149 (GCVE-0-2020-12149)
Vulnerability from cvelistv5
Published
2020-12-11 15:23
Modified
2024-09-16 23:26
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • CWE-78 - OS Command Injection
Summary
The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.
Impacted products
Vendor Product Version
Silver Peak Systems, Inc. ECOS Version: All current ECOS versions prior to 8.1.9.15
Version: 8.3.0.8
Version: 8.3.1.2
Version: 8.3.2.0
Version: 9.0.2.0
Version: and 9.1.0.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:48:58.307Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.silver-peak.com/support/user-documentation/security-advisories"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ECOS",
          "vendor": "Silver Peak Systems, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "All current ECOS versions prior to 8.1.9.15"
            },
            {
              "status": "affected",
              "version": "8.3.0.8"
            },
            {
              "status": "affected",
              "version": "8.3.1.2"
            },
            {
              "status": "affected",
              "version": "8.3.2.0"
            },
            {
              "status": "affected",
              "version": "9.0.2.0"
            },
            {
              "status": "affected",
              "version": "and 9.1.0.0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "This vulnerability was reported to Silver Peak by Alexander Smye and Jonathan Letham from the security team at NCC Group."
        }
      ],
      "datePublic": "2020-11-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 OS Command Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-12-15T16:14:01",
        "orgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c",
        "shortName": "Silver Peak"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.silver-peak.com/support/user-documentation/security-advisories"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The backup/restore functions in the patched versions of ECOS software have been modified to only accept alphanumeric characters, along with the period, hyphen, and underscore characters. This change ensures that OS commands cannot be injected via filename."
        }
      ],
      "source": {
        "advisory": "2020-11-15-01-002",
        "discovery": "EXTERNAL"
      },
      "title": "OS Command Injection - Management File Upload",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "sirt@silver-peak.com",
          "DATE_PUBLIC": "2020-11-30T17:30:00.000Z",
          "ID": "CVE-2020-12149",
          "STATE": "PUBLIC",
          "TITLE": "OS Command Injection - Management File Upload"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ECOS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All current ECOS versions prior to 8.1.9.15"
                          },
                          {
                            "version_value": "8.3.0.8"
                          },
                          {
                            "version_value": "8.3.1.2"
                          },
                          {
                            "version_value": "8.3.2.0"
                          },
                          {
                            "version_value": "9.0.2.0"
                          },
                          {
                            "version_value": "and 9.1.0.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Silver Peak Systems, Inc."
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "This vulnerability was reported to Silver Peak by Alexander Smye and Jonathan Letham from the security team at NCC Group."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
                }
              ]
            },
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78 OS Command Injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.silver-peak.com/support/user-documentation/security-advisories",
              "refsource": "MISC",
              "url": "https://www.silver-peak.com/support/user-documentation/security-advisories"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "The backup/restore functions in the patched versions of ECOS software have been modified to only accept alphanumeric characters, along with the period, hyphen, and underscore characters. This change ensures that OS commands cannot be injected via filename."
          }
        ],
        "source": {
          "advisory": "2020-11-15-01-002",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c",
    "assignerShortName": "Silver Peak",
    "cveId": "CVE-2020-12149",
    "datePublished": "2020-12-11T15:23:32.991669Z",
    "dateReserved": "2020-04-24T00:00:00",
    "dateUpdated": "2024-09-16T23:26:33.482Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2020-12-11 16:15
Modified
2024-12-12 18:19
Summary
A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5865651-63E8-48B3-8247-FE5B9200F9F6",
              "versionEndExcluding": "8.1.9.15",
              "versionStartIncluding": "8.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1753A7F3-07DC-422A-BB41-83B9C32846D3",
              "versionEndExcluding": "8.3.0.8",
              "versionStartIncluding": "8.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3120A0E3-BFBA-4CB7-A29B-73B0220B916E",
              "versionEndExcluding": "8.3.1.2",
              "versionStartIncluding": "8.3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "547026C9-CCBD-451E-AEC9-4DAFFB5B89C2",
              "versionEndExcluding": "9.0.2.0",
              "versionStartIncluding": "9.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2180B045-86D1-44FB-A665-60CDFA26F5DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4353377E-9D3C-423F-9582-925C81E6D7DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD514ED5-0E97-4300-B960-53B048383662",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3466FD-0EFE-45E6-AA18-5FF55541B9A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F95797-8F64-4200-933C-0EE89E9D9D61",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2785D127-06A0-4E85-80AE-6B00E73CA013",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1736626-683E-49C4-B4A1-0EA86FFA4D6A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-8000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2869A025-2379-4593-8B0F-B6B5437CD696",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-9000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B4E6381-FAF4-4ED4-9405-5336356D9637",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-10700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFC924C3-9038-4CA4-8738-0705744D11B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-11700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8140B4EC-955F-4FC0-8706-BBF365270854",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-1700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C285EFEB-2FF0-45CA-AAB2-9224D4AD93BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A844F08B-BCAA-4BE8-A7FE-1F6864D948FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8788AD7-B697-4B9F-BC51-CE2E78AE3044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E15328DE-CA41-46F9-925C-3B49121855DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D21A0F79-B79B-4C42-848B-4A38267AD331",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "204B5FB4-A1F7-445C-83C5-868A7BC698BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECBFDA6-4C9A-4EC0-8642-451ECC336A94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5CEF46C-AA03-4E03-8E3A-E0D2FEEA8C24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-9700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10325BCF-63AA-4767-A60D-14CA0A429546",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0."
    },
    {
      "lang": "es",
      "value": "Un fallo de inyecci\u00f3n de comandos identificada en la API nslookup en el software del dispositivo Silver Peak Unity ECOSTM (ECOS), podr\u00eda permitir a un atacante ejecutar comandos arbitrarios con los privilegios del servidor web que se ejecuta en el dispositivo EdgeConnect. Un atacante podr\u00eda explotar esta vulnerabilidad para establecer un canal interactivo, tomando el control efectivamente del sistema objetivo. Esta vulnerabilidad puede ser explotada por un atacante con acceso autenticado a la Interfaz de Usuario de Orchestrator o la Interfaz de Usuario de EdgeConnect. Esto afecta a todas las versiones de ECOS anteriores a: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0 y 9.1.0.0"
    }
  ],
  "id": "CVE-2020-12148",
  "lastModified": "2024-12-12T18:19:50.530",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.5,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "sirt@silver-peak.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-12-11T16:15:11.697",
  "references": [
    {
      "source": "sirt@silver-peak.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.silver-peak.com/support/user-documentation/security-advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.silver-peak.com/support/user-documentation/security-advisories"
    }
  ],
  "sourceIdentifier": "sirt@silver-peak.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "sirt@silver-peak.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-05-05 20:15
Modified
2024-11-21 04:59
Summary
1. IPSec UDP key material can be retrieved from machine-to-machine interfaces and human-accessible interfaces by a user with admin credentials. Such a user, with the required system knowledge, could use this material to decrypt in-flight communication. 2. The vulnerability requires administrative access and shell access to the EdgeConnect appliance. An admin user can access IPSec seed and nonce parameters using the CLI, REST APIs, and the Linux shell.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:silver-peak:unity_edgeconnect_for_amazon_web_services:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABAD6DEA-2F2B-41E3-ADCA-08FAC616A88E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:silver-peak:unity_edgeconnect_for_azure:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "524DEFA6-6381-4ABC-9549-396B1FD60A62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:silver-peak:unity_edgeconnect_for_google_cloud_platform:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BD97B84-E986-4BD3-BDA0-1B9E13D183F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:silver-peak:unity_orchestrator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C770AE97-F96C-45B9-8F5A-F398E5ED9E13",
              "versionEndExcluding": "8.9.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEC335D-2F77-4E16-BCBE-F805260D4975",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4A54E1-2C08-423C-99C2-D289EF360B22",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-1000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B25DCA3-FFE8-4FCF-9C7C-0765F5E35317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F645C96A-7A60-4724-A102-5B86684A4DF7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-2000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5B47D55-3156-4433-A380-B11F5AB2BB3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E07EBC-2366-4369-AF75-90E12F34DE5D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-3000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "169A83DF-A052-4EC2-9396-036AA0234C35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87FE30FB-F836-4D92-BAC2-CD3EABAE6F6E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-5000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A7F8C0-969B-430C-8B2B-30BCD3C64400",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B7E4523-018F-40B0-A600-C5CCC58C9914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-6000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0BE9A9-FF36-4652-A122-3B3651958DEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B913729C-2834-4FFD-B7A3-A96E96ECF10C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-7000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEFF5265-88F8-4637-BD72-6D7A19631ED2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE19BE53-00FB-400A-8F51-BFC5698C1779",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-9000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC60C235-7BA2-48C2-B6B4-3099AA271E5F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-9000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28CF057A-CD5E-4277-8A2E-8A8493143E61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-8000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02B86CCA-4367-44F9-A915-245532D799B4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-8000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F682E0F6-EF2E-486F-B046-F4E813E5A078",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67036359-5CEC-43E8-9436-90D82DBC23D1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "204B5FB4-A1F7-445C-83C5-868A7BC698BA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-1000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFC3B48D-74BF-422D-97C3-5EF3442DB315",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EFE7DD-16A7-4F1A-BA7D-0C008CB46075",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-2000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "110F488B-2169-41BE-A4B0-001D33F71C83",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341B740-1EAD-4268-AF6C-F52191911FC8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-3000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2B50FEA-3BA8-4E42-A618-36D7524B5D06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F9DD803-1DEE-4D19-B111-2B323C574DF5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-5000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61BA34E-C1DA-4E1A-969B-88BABDD237AE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "787A5C1F-D14F-49E7-8CBF-3F8BA152A4B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-6000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "051A9816-3175-424F-AC08-B3D3726CFFED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8406F3C1-6D87-41E7-A158-78144B6D8EBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-7000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBEEB980-A456-4EC2-9254-24CB59AD1CAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9716EB9-C00D-4964-B8B4-3BA5C044373E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-8000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A607F5E-CC24-4732-BBBD-A42316620F77",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-8000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A7C903F-6AB3-4F66-B8DE-2203B034D9A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-9000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B21BB8F-B8AC-4595-8CDE-984651FB87B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-9000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B72B1307-E5D3-4892-ADC7-896C676F4275",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-10k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D017AD85-C92F-4F47-8442-66E2B3F5DF0C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-10k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF3ABCC1-C71B-450C-9654-DF3324AE3859",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-11k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D60F6AB-1DC2-4E0C-AFE5-3D5E2E5EB252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-11k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D388409D-5270-41AD-8755-74B2EDF6C9BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "1. IPSec UDP key material can be retrieved from machine-to-machine interfaces and human-accessible interfaces by a user with admin credentials. Such a user, with the required system knowledge, could use this material to decrypt in-flight communication. 2. The vulnerability requires administrative access and shell access to the EdgeConnect appliance. An admin user can access IPSec seed and nonce parameters using the CLI, REST APIs, and the Linux shell."
    },
    {
      "lang": "es",
      "value": "1. Un usuario con credenciales de administrador puede recuperar el material clave IPSec UDP de las interfaces m\u00e1quina a m\u00e1quina y las interfaces accesibles para humanos. Dicho usuario, con el conocimiento requerido del sistema, podr\u00eda usar este material para descifrar la comunicaci\u00f3n en vuelo. 2. La vulnerabilidad requiere acceso administrativo y acceso a shell en el dispositivo EdgeConnect. Un usuario administrador puede acceder a los par\u00e1metros seed y nonce de IPSec utilizando la CLI, las API REST y el shell de Linux."
    }
  ],
  "id": "CVE-2020-12142",
  "lastModified": "2024-11-21T04:59:20.767",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 4.2,
        "source": "sirt@silver-peak.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-05-05T20:15:12.057",
  "references": [
    {
      "source": "sirt@silver-peak.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_ipsec_udp_key_material-cve_2020_12142.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_ipsec_udp_key_material-cve_2020_12142.pdf"
    }
  ],
  "sourceIdentifier": "sirt@silver-peak.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-668"
        }
      ],
      "source": "sirt@silver-peak.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-668"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-05-05 20:15
Modified
2024-11-21 04:59
Summary
The certificate used to identify Orchestrator to EdgeConnect devices is not validated, which makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted Orchestrator.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:silver-peak:unity_edgeconnect_for_amazon_web_services:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABAD6DEA-2F2B-41E3-ADCA-08FAC616A88E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:silver-peak:unity_edgeconnect_for_azure:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "524DEFA6-6381-4ABC-9549-396B1FD60A62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:silver-peak:unity_edgeconnect_for_google_cloud_platform:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BD97B84-E986-4BD3-BDA0-1B9E13D183F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:silver-peak:unity_orchestrator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C770AE97-F96C-45B9-8F5A-F398E5ED9E13",
              "versionEndExcluding": "8.9.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEC335D-2F77-4E16-BCBE-F805260D4975",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4A54E1-2C08-423C-99C2-D289EF360B22",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-1000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B25DCA3-FFE8-4FCF-9C7C-0765F5E35317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F645C96A-7A60-4724-A102-5B86684A4DF7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-2000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5B47D55-3156-4433-A380-B11F5AB2BB3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E07EBC-2366-4369-AF75-90E12F34DE5D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-3000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "169A83DF-A052-4EC2-9396-036AA0234C35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87FE30FB-F836-4D92-BAC2-CD3EABAE6F6E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-5000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A7F8C0-969B-430C-8B2B-30BCD3C64400",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B7E4523-018F-40B0-A600-C5CCC58C9914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-6000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0BE9A9-FF36-4652-A122-3B3651958DEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B913729C-2834-4FFD-B7A3-A96E96ECF10C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-7000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEFF5265-88F8-4637-BD72-6D7A19631ED2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE19BE53-00FB-400A-8F51-BFC5698C1779",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-9000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC60C235-7BA2-48C2-B6B4-3099AA271E5F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-9000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28CF057A-CD5E-4277-8A2E-8A8493143E61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-8000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02B86CCA-4367-44F9-A915-245532D799B4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-8000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F682E0F6-EF2E-486F-B046-F4E813E5A078",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67036359-5CEC-43E8-9436-90D82DBC23D1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "204B5FB4-A1F7-445C-83C5-868A7BC698BA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-1000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFC3B48D-74BF-422D-97C3-5EF3442DB315",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EFE7DD-16A7-4F1A-BA7D-0C008CB46075",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-2000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "110F488B-2169-41BE-A4B0-001D33F71C83",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341B740-1EAD-4268-AF6C-F52191911FC8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-3000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2B50FEA-3BA8-4E42-A618-36D7524B5D06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F9DD803-1DEE-4D19-B111-2B323C574DF5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-5000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61BA34E-C1DA-4E1A-969B-88BABDD237AE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "787A5C1F-D14F-49E7-8CBF-3F8BA152A4B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-6000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "051A9816-3175-424F-AC08-B3D3726CFFED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8406F3C1-6D87-41E7-A158-78144B6D8EBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-7000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBEEB980-A456-4EC2-9254-24CB59AD1CAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9716EB9-C00D-4964-B8B4-3BA5C044373E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-8000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A607F5E-CC24-4732-BBBD-A42316620F77",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-8000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A7C903F-6AB3-4F66-B8DE-2203B034D9A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-9000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B21BB8F-B8AC-4595-8CDE-984651FB87B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-9000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B72B1307-E5D3-4892-ADC7-896C676F4275",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-10k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D017AD85-C92F-4F47-8442-66E2B3F5DF0C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-10k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF3ABCC1-C71B-450C-9654-DF3324AE3859",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-11k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D60F6AB-1DC2-4E0C-AFE5-3D5E2E5EB252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-11k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D388409D-5270-41AD-8755-74B2EDF6C9BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The certificate used to identify Orchestrator to EdgeConnect devices is not validated, which makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted Orchestrator."
    },
    {
      "lang": "es",
      "value": "El certificado utilizado para identificar Orchestrator a los dispositivos EdgeConnect no est\u00e1 validado, lo que hace posible que alguien establezca una conexi\u00f3n TLS desde EdgeConnect a un Orchestrator no confiable."
    }
  ],
  "id": "CVE-2020-12143",
  "lastModified": "2024-11-21T04:59:20.960",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 5.5,
        "source": "sirt@silver-peak.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-05-05T20:15:12.137",
  "references": [
    {
      "source": "sirt@silver-peak.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_orchestrator-cve_2020_12143.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_orchestrator-cve_2020_12143.pdf"
    }
  ],
  "sourceIdentifier": "sirt@silver-peak.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "sirt@silver-peak.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-12-11 16:15
Modified
2024-12-12 18:27
Summary
The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5865651-63E8-48B3-8247-FE5B9200F9F6",
              "versionEndExcluding": "8.1.9.15",
              "versionStartIncluding": "8.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1753A7F3-07DC-422A-BB41-83B9C32846D3",
              "versionEndExcluding": "8.3.0.8",
              "versionStartIncluding": "8.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3120A0E3-BFBA-4CB7-A29B-73B0220B916E",
              "versionEndExcluding": "8.3.1.2",
              "versionStartIncluding": "8.3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "547026C9-CCBD-451E-AEC9-4DAFFB5B89C2",
              "versionEndExcluding": "9.0.2.0",
              "versionStartIncluding": "9.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2180B045-86D1-44FB-A665-60CDFA26F5DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4353377E-9D3C-423F-9582-925C81E6D7DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD514ED5-0E97-4300-B960-53B048383662",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3466FD-0EFE-45E6-AA18-5FF55541B9A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F95797-8F64-4200-933C-0EE89E9D9D61",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2785D127-06A0-4E85-80AE-6B00E73CA013",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1736626-683E-49C4-B4A1-0EA86FFA4D6A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-8000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2869A025-2379-4593-8B0F-B6B5437CD696",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:arubanetworks:vx-9000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B4E6381-FAF4-4ED4-9405-5336356D9637",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-10700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFC924C3-9038-4CA4-8738-0705744D11B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-11700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8140B4EC-955F-4FC0-8706-BBF365270854",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-1700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C285EFEB-2FF0-45CA-AAB2-9224D4AD93BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A844F08B-BCAA-4BE8-A7FE-1F6864D948FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8788AD7-B697-4B9F-BC51-CE2E78AE3044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E15328DE-CA41-46F9-925C-3B49121855DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D21A0F79-B79B-4C42-848B-4A38267AD331",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "204B5FB4-A1F7-445C-83C5-868A7BC698BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECBFDA6-4C9A-4EC0-8642-451ECC336A94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5CEF46C-AA03-4E03-8E3A-E0D2FEEA8C24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-9700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10325BCF-63AA-4767-A60D-14CA0A429546",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silver-peak:unity_edgeconnect:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A46BCC-53C0-4FAC-B006-562DD282DD98",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 que la funci\u00f3n backup/restore de la configuraci\u00f3n en el software del dispositivo Silver Peak Unity ECOSTM (ECOS) incorpora directamente el nombre de archivo de configuraci\u00f3n controlado por el usuario en un comando shell posterior, permitiendo a un atacante manipular el comando resultante al inyectar una entrada de comando v\u00e1lida del sistema operativo. Esta vulnerabilidad puede ser explotada por un atacante con acceso autenticado a la Interfaz de Usuario de Orchestrator o la Interfaz de Usuario de EdgeConnect. Esto afecta a todas las versiones de ECOS anteriores a: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0 y 9.1.0.0"
    }
  ],
  "id": "CVE-2020-12149",
  "lastModified": "2024-12-12T18:27:55.190",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.5,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "sirt@silver-peak.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-12-11T16:15:11.807",
  "references": [
    {
      "source": "sirt@silver-peak.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.silver-peak.com/support/user-documentation/security-advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.silver-peak.com/support/user-documentation/security-advisories"
    }
  ],
  "sourceIdentifier": "sirt@silver-peak.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "sirt@silver-peak.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-05-05 20:15
Modified
2024-11-21 04:59
Summary
The certificate used to identify the Silver Peak Cloud Portal to EdgeConnect devices is not validated. This makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted portal.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:silver-peak:unity_edgeconnect_for_amazon_web_services:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABAD6DEA-2F2B-41E3-ADCA-08FAC616A88E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:silver-peak:unity_edgeconnect_for_azure:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "524DEFA6-6381-4ABC-9549-396B1FD60A62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:silver-peak:unity_edgeconnect_for_google_cloud_platform:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BD97B84-E986-4BD3-BDA0-1B9E13D183F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:silver-peak:unity_orchestrator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C770AE97-F96C-45B9-8F5A-F398E5ED9E13",
              "versionEndExcluding": "8.9.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEC335D-2F77-4E16-BCBE-F805260D4975",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4A54E1-2C08-423C-99C2-D289EF360B22",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-1000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B25DCA3-FFE8-4FCF-9C7C-0765F5E35317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F645C96A-7A60-4724-A102-5B86684A4DF7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-2000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5B47D55-3156-4433-A380-B11F5AB2BB3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E07EBC-2366-4369-AF75-90E12F34DE5D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-3000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "169A83DF-A052-4EC2-9396-036AA0234C35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87FE30FB-F836-4D92-BAC2-CD3EABAE6F6E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-5000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A7F8C0-969B-430C-8B2B-30BCD3C64400",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B7E4523-018F-40B0-A600-C5CCC58C9914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-6000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0BE9A9-FF36-4652-A122-3B3651958DEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B913729C-2834-4FFD-B7A3-A96E96ECF10C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-7000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEFF5265-88F8-4637-BD72-6D7A19631ED2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE19BE53-00FB-400A-8F51-BFC5698C1779",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-9000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC60C235-7BA2-48C2-B6B4-3099AA271E5F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-9000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28CF057A-CD5E-4277-8A2E-8A8493143E61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:vx-8000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02B86CCA-4367-44F9-A915-245532D799B4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:vx-8000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F682E0F6-EF2E-486F-B046-F4E813E5A078",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67036359-5CEC-43E8-9436-90D82DBC23D1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "204B5FB4-A1F7-445C-83C5-868A7BC698BA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-1000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFC3B48D-74BF-422D-97C3-5EF3442DB315",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EFE7DD-16A7-4F1A-BA7D-0C008CB46075",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-2000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "110F488B-2169-41BE-A4B0-001D33F71C83",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341B740-1EAD-4268-AF6C-F52191911FC8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-3000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2B50FEA-3BA8-4E42-A618-36D7524B5D06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F9DD803-1DEE-4D19-B111-2B323C574DF5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-5000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61BA34E-C1DA-4E1A-969B-88BABDD237AE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "787A5C1F-D14F-49E7-8CBF-3F8BA152A4B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-6000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "051A9816-3175-424F-AC08-B3D3726CFFED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8406F3C1-6D87-41E7-A158-78144B6D8EBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-7000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBEEB980-A456-4EC2-9254-24CB59AD1CAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9716EB9-C00D-4964-B8B4-3BA5C044373E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-8000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A607F5E-CC24-4732-BBBD-A42316620F77",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-8000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A7C903F-6AB3-4F66-B8DE-2203B034D9A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-9000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B21BB8F-B8AC-4595-8CDE-984651FB87B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-9000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B72B1307-E5D3-4892-ADC7-896C676F4275",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-10k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D017AD85-C92F-4F47-8442-66E2B3F5DF0C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-10k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF3ABCC1-C71B-450C-9654-DF3324AE3859",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silver-peak:nx-11k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D60F6AB-1DC2-4E0C-AFE5-3D5E2E5EB252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arubanetworks:nx-11k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D388409D-5270-41AD-8755-74B2EDF6C9BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The certificate used to identify the Silver Peak Cloud Portal to EdgeConnect devices is not validated. This makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted portal."
    },
    {
      "lang": "es",
      "value": "El certificado usado para identificar el Silver Cloud Portal para dispositivos EdgeConnect no es validado. Esto hace posible que alguien establezca una conexi\u00f3n TLS desde EdgeConnect a un portal no confiable."
    }
  ],
  "id": "CVE-2020-12144",
  "lastModified": "2024-11-21T04:59:21.143",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 5.5,
        "source": "sirt@silver-peak.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-05-05T20:15:12.200",
  "references": [
    {
      "source": "sirt@silver-peak.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_portal-cve_2020_12144.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_portal-cve_2020_12144.pdf"
    }
  ],
  "sourceIdentifier": "sirt@silver-peak.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "sirt@silver-peak.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}