NN-2021:1-01

Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4

Last update: 2024-05-20

Advisory IDNN-2021:1-01
TopicAuthenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4
CWE ImpactCWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Issue date2021-02-04
AffectsGuardian, CMC <v20.0.7.4 or <v19.0.12
CVE Name(s)CVE-2021-26724
CVSS DetailsCVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS Score8.6 (CVSS v4.0)
7.2 (CVSS v3.1)
CVE Risk LevelHigh (CVSS v4.0)
High (CVSS v3.1)
Risk Level for Nozomi customersLow

Summary

An OS command injection vulnerability in the management interface allows an authenticated administrator to execute arbitrary OS commands gaining access to the system.

Impact

Authenticated web GUI administrator can execute a command on the local system and then escalate privilege to the root user. However, as by design web GUI administrators are allowed to use ssh keys to gain full console access, this finding has a low impact on our customers.

Affected Products

Guardian, CMC <v20.0.7.4 or <v19.0.12

Workarounds and Mitigations

Use internal firewall feature to limit management interface access and review user roles.

Solutions

v19 series: Upgrade to v19.0.12. v20 series: Upgrade to v20.0.7.4.

Modification History

2021-02-22: Initial revision
2023-09-04: Minor updates to format and metadata to improve the CSAF implementation
2023-11-13: Migrated to CSAF VEX format
2023-11-16: CSAF vers improvements
2024-05-20: Added CVSS v4.0 scoring where applicable

Related Links

Acknowledgements

We thank the following parties for their efforts:

  • Erik de Jong for finding this bug

Contact

Nozomi Networks Product Security team can be reached at prodsec@nozominetworks.com.
More contact details on the PSIRT page.