fkie_cve-2020-12149
Vulnerability from fkie_nvd
Published
2020-12-11 16:15
Modified
2024-12-12 18:27
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
Summary
The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5865651-63E8-48B3-8247-FE5B9200F9F6", "versionEndExcluding": "8.1.9.15", "versionStartIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "1753A7F3-07DC-422A-BB41-83B9C32846D3", "versionEndExcluding": "8.3.0.8", "versionStartIncluding": "8.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "3120A0E3-BFBA-4CB7-A29B-73B0220B916E", "versionEndExcluding": "8.3.1.2", "versionStartIncluding": "8.3.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "547026C9-CCBD-451E-AEC9-4DAFFB5B89C2", "versionEndExcluding": "9.0.2.0", "versionStartIncluding": "9.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:arubanetworks:vx-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2180B045-86D1-44FB-A665-60CDFA26F5DE", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "4353377E-9D3C-423F-9582-925C81E6D7DB", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD514ED5-0E97-4300-B960-53B048383662", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-500:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3466FD-0EFE-45E6-AA18-5FF55541B9A4", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "03F95797-8F64-4200-933C-0EE89E9D9D61", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2785D127-06A0-4E85-80AE-6B00E73CA013", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1736626-683E-49C4-B4A1-0EA86FFA4D6A", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-8000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2869A025-2379-4593-8B0F-B6B5437CD696", "vulnerable": false }, { "criteria": "cpe:2.3:a:arubanetworks:vx-9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B4E6381-FAF4-4ED4-9405-5336356D9637", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-10700:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFC924C3-9038-4CA4-8738-0705744D11B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-11700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8140B4EC-955F-4FC0-8706-BBF365270854", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-1700:-:*:*:*:*:*:*:*", "matchCriteriaId": "C285EFEB-2FF0-45CA-AAB2-9224D4AD93BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "A844F08B-BCAA-4BE8-A7FE-1F6864D948FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-3700:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8788AD7-B697-4B9F-BC51-CE2E78AE3044", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E15328DE-CA41-46F9-925C-3B49121855DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "D21A0F79-B79B-4C42-848B-4A38267AD331", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*", "matchCriteriaId": "204B5FB4-A1F7-445C-83C5-868A7BC698BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DECBFDA6-4C9A-4EC0-8642-451ECC336A94", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5CEF46C-AA03-4E03-8E3A-E0D2FEEA8C24", "vulnerable": false }, { "criteria": "cpe:2.3:h:arubanetworks:nx-9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "10325BCF-63AA-4767-A60D-14CA0A429546", "vulnerable": false }, { "criteria": "cpe:2.3:h:silver-peak:unity_edgeconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4A46BCC-53C0-4FAC-B006-562DD282DD98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0." }, { "lang": "es", "value": "Se detect\u00f3 que la funci\u00f3n backup/restore de la configuraci\u00f3n en el software del dispositivo Silver Peak Unity ECOSTM (ECOS) incorpora directamente el nombre de archivo de configuraci\u00f3n controlado por el usuario en un comando shell posterior, permitiendo a un atacante manipular el comando resultante al inyectar una entrada de comando v\u00e1lida del sistema operativo. Esta vulnerabilidad puede ser explotada por un atacante con acceso autenticado a la Interfaz de Usuario de Orchestrator o la Interfaz de Usuario de EdgeConnect. Esto afecta a todas las versiones de ECOS anteriores a: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0 y 9.1.0.0" } ], "id": "CVE-2020-12149", "lastModified": "2024-12-12T18:27:55.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "sirt@silver-peak.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-11T16:15:11.807", "references": [ { "source": "sirt@silver-peak.com", "tags": [ "Vendor Advisory" ], "url": "https://www.silver-peak.com/support/user-documentation/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.silver-peak.com/support/user-documentation/security-advisories" } ], "sourceIdentifier": "sirt@silver-peak.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "sirt@silver-peak.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…