NN-2021:1-01

Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4

Last update: 2021-02-22

Advisory IDNN-2021:1-01
TopicAuthenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4
ImpactCode Execution, Gain Privileges, CWE-78 OS Command Injection
Issue date2021-02-04
AffectsGuardian and CMC with N2OS <v20.0.7.4 or N2OS <v19.0.12
CVE Name(s)CVE-2021-26724
CVSS Score7.2
CVE Risk LevelHigh
Risk Level for Nozomi customersLow

Summary

An OS command injection vulnerability in the management interface allows an authenticated administrator to execute arbitrary OS commands gaining access to the system.

Impact

Authenticated web GUI administrator can execute a command on the local system and then escalate privilege to the root user.
However, as by design web GUI administrators are allowed to use ssh keys to gain full console access, this finding has a low impact on our customers.

Affected Products

Guardian / CMC before v19.0.12.
Guardian / CMC before v20.0.7.4.

Workarounds and Mitigations

Use internal firewall feature to limit management interface access and review user roles.

Solutions

v19 series: Upgrade to v19.0.12.
v20 series: Upgrade to v20.0.7.4.

Modification History

2021-02-22: Initial revision

Related Links

Mitre CVE entry

Acknowledgements

This bug was found by Erik de Jong

Contact

Nozomi Networks Product Security team can be reached at prodsec@nozominetworks.com. More contact details on the PSIRT page.