NN-2021:2-01

Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4

Last update: 2024-05-20

Advisory IDNN-2021:2-01
TopicAuthenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4
CWE ImpactCWE-24: Path Traversal: '../filedir'
Issue date2021-02-04
AffectsGuardian, CMC <v20.0.7.4 or <v19.0.12
CVE Name(s)CVE-2021-26725
CVSS DetailsCVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS Score8.6 (CVSS v4.0)
7.2 (CVSS v3.1)
CVE Risk LevelHigh (CVSS v4.0)
High (CVSS v3.1)
Risk Level for Nozomi customersLow

Summary

An authenticated command path traversal vulnerability in the management interface allows an authenticated administrator to read-protected system files.

Impact

Authenticated web GUI administrator can force the system to copy system files to the wrong location allowing him to read the contents. However, as by design web GUI administrators are allowed to use ssh keys to gain full console access, this finding has a low impact on our customers.

Affected Products

Guardian, CMC <v20.0.7.4 or <v19.0.12

Workarounds and Mitigations

Use internal firewall feature to limit management interface access and review user roles.

Solutions

v19 series: Upgrade to v19.0.12. v20 series: Upgrade to v20.0.7.4.

Modification History

2021-02-22: Initial revision
2023-09-04: Minor updates to format and metadata to improve the CSAF implementation
2023-11-13: Migrated to CSAF VEX format
2023-11-16: CSAF vers improvements
2024-05-20: Added CVSS v4.0 scoring where applicable

Related Links

Acknowledgements

We thank the following parties for their efforts:

  • Erik de Jong for finding this bug

Contact

Nozomi Networks Product Security team can be reached at prodsec@nozominetworks.com.
More contact details on the PSIRT page.