Advisory ID | NN-2021:1-01 |
---|---|
Topic | Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4 |
CWE Impact | CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
Issue date | 2021-02-04 |
Affects | Guardian, CMC <v20.0.7.4 or <v19.0.12 |
CVE Name(s) | CVE-2021-26724 |
CVSS Details | CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVSS Score | 8.6 (CVSS v4.0) 7.2 (CVSS v3.1) |
CVE Risk Level | High (CVSS v4.0) High (CVSS v3.1) |
Risk Level for Nozomi customers | Low |
An OS command injection vulnerability in the management interface allows an authenticated administrator to execute arbitrary OS commands gaining access to the system.
Authenticated web GUI administrator can execute a command on the local system and then escalate privilege to the root user. However, as by design web GUI administrators are allowed to use ssh keys to gain full console access, this finding has a low impact on our customers.
Guardian, CMC <v20.0.7.4 or <v19.0.12
Use internal firewall feature to limit management interface access and review user roles.
v19 series: Upgrade to v19.0.12. v20 series: Upgrade to v20.0.7.4.
We thank the following parties for their efforts: