CVE-2020-12148 (GCVE-0-2020-12148)
Vulnerability from cvelistv5
Published
2020-12-11 15:24
Modified
2024-09-16 23:05
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • CWE-78 - OS Command Injection
Summary
A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.
Impacted products
Vendor Product Version
Silver Peak Systems, Inc. ECOS Version: All current ECOS versions prior to 8.1.9.15
Version: 8.3.0.8
Version: 8.3.1.2
Version: 8.3.2.0
Version: 9.0.2.0
Version: and 9.1.0.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:48:58.361Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.silver-peak.com/support/user-documentation/security-advisories"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ECOS",
          "vendor": "Silver Peak Systems, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "All current ECOS versions prior to 8.1.9.15"
            },
            {
              "status": "affected",
              "version": "8.3.0.8"
            },
            {
              "status": "affected",
              "version": "8.3.1.2"
            },
            {
              "status": "affected",
              "version": "8.3.2.0"
            },
            {
              "status": "affected",
              "version": "9.0.2.0"
            },
            {
              "status": "affected",
              "version": "and 9.1.0.0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "This vulnerability was reported to Silver Peak by Alexander Smye and Jonathan Letham from the security team at NCC Group."
        }
      ],
      "datePublic": "2020-11-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 OS Command Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-12-15T16:13:57",
        "orgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c",
        "shortName": "Silver Peak"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.silver-peak.com/support/user-documentation/security-advisories"
        }
      ],
      "source": {
        "advisory": "2020-11-15-01-001",
        "discovery": "EXTERNAL"
      },
      "title": "OS Command Injection - nslookup API",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "sirt@silver-peak.com",
          "DATE_PUBLIC": "2020-11-30T17:30:00.000Z",
          "ID": "CVE-2020-12148",
          "STATE": "PUBLIC",
          "TITLE": "OS Command Injection - nslookup API"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ECOS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All current ECOS versions prior to 8.1.9.15"
                          },
                          {
                            "version_value": "8.3.0.8"
                          },
                          {
                            "version_value": "8.3.1.2"
                          },
                          {
                            "version_value": "8.3.2.0"
                          },
                          {
                            "version_value": "9.0.2.0"
                          },
                          {
                            "version_value": "and 9.1.0.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Silver Peak Systems, Inc."
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "This vulnerability was reported to Silver Peak by Alexander Smye and Jonathan Letham from the security team at NCC Group."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
                }
              ]
            },
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78 OS Command Injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.silver-peak.com/support/user-documentation/security-advisories",
              "refsource": "MISC",
              "url": "https://www.silver-peak.com/support/user-documentation/security-advisories"
            }
          ]
        },
        "source": {
          "advisory": "2020-11-15-01-001",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c",
    "assignerShortName": "Silver Peak",
    "cveId": "CVE-2020-12148",
    "datePublished": "2020-12-11T15:24:23.056324Z",
    "dateReserved": "2020-04-24T00:00:00",
    "dateUpdated": "2024-09-16T23:05:48.430Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2020-12148\",\"sourceIdentifier\":\"sirt@silver-peak.com\",\"published\":\"2020-12-11T16:15:11.697\",\"lastModified\":\"2024-12-12T18:19:50.530\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.\"},{\"lang\":\"es\",\"value\":\"Un fallo de inyecci\u00f3n de comandos identificada en la API nslookup en el software del dispositivo Silver Peak Unity ECOSTM (ECOS), podr\u00eda permitir a un atacante ejecutar comandos arbitrarios con los privilegios del servidor web que se ejecuta en el dispositivo EdgeConnect. Un atacante podr\u00eda explotar esta vulnerabilidad para establecer un canal interactivo, tomando el control efectivamente del sistema objetivo. Esta vulnerabilidad puede ser explotada por un atacante con acceso autenticado a la Interfaz de Usuario de Orchestrator o la Interfaz de Usuario de EdgeConnect. Esto afecta a todas las versiones de ECOS anteriores a: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0 y 9.1.0.0\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"sirt@silver-peak.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:C/I:C/A:C\",\"baseScore\":8.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":6.8,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"sirt@silver-peak.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.1\",\"versionEndExcluding\":\"8.1.9.15\",\"matchCriteriaId\":\"D5865651-63E8-48B3-8247-FE5B9200F9F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.3.0\",\"versionEndExcluding\":\"8.3.0.8\",\"matchCriteriaId\":\"1753A7F3-07DC-422A-BB41-83B9C32846D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.3.1\",\"versionEndExcluding\":\"8.3.1.2\",\"matchCriteriaId\":\"3120A0E3-BFBA-4CB7-A29B-73B0220B916E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0\",\"versionEndExcluding\":\"9.0.2.0\",\"matchCriteriaId\":\"547026C9-CCBD-451E-AEC9-4DAFFB5B89C2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:vx-1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2180B045-86D1-44FB-A665-60CDFA26F5DE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:vx-2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4353377E-9D3C-423F-9582-925C81E6D7DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:vx-3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD514ED5-0E97-4300-B960-53B048383662\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:vx-500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E3466FD-0EFE-45E6-AA18-5FF55541B9A4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:vx-5000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03F95797-8F64-4200-933C-0EE89E9D9D61\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:vx-6000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2785D127-06A0-4E85-80AE-6B00E73CA013\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:vx-7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1736626-683E-49C4-B4A1-0EA86FFA4D6A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:vx-8000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2869A025-2379-4593-8B0F-B6B5437CD696\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:vx-9000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B4E6381-FAF4-4ED4-9405-5336356D9637\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:nx-10700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFC924C3-9038-4CA4-8738-0705744D11B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:nx-11700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8140B4EC-955F-4FC0-8706-BBF365270854\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:nx-1700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C285EFEB-2FF0-45CA-AAB2-9224D4AD93BC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:nx-2700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A844F08B-BCAA-4BE8-A7FE-1F6864D948FE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:nx-3700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8788AD7-B697-4B9F-BC51-CE2E78AE3044\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:nx-5700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E15328DE-CA41-46F9-925C-3B49121855DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:nx-6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D21A0F79-B79B-4C42-848B-4A38267AD331\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"204B5FB4-A1F7-445C-83C5-868A7BC698BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:nx-7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DECBFDA6-4C9A-4EC0-8642-451ECC336A94\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:nx-8700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5CEF46C-AA03-4E03-8E3A-E0D2FEEA8C24\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:nx-9700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10325BCF-63AA-4767-A60D-14CA0A429546\"}]}]}],\"references\":[{\"url\":\"https://www.silver-peak.com/support/user-documentation/security-advisories\",\"source\":\"sirt@silver-peak.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.silver-peak.com/support/user-documentation/security-advisories\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…