Advisory ID | NN-2021:2-01 |
---|---|
Topic | Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4 |
CWE Impact | CWE-24: Path Traversal: '../filedir' |
Issue date | 2021-02-04 |
Affects | Guardian, CMC <v20.0.7.4 or <v19.0.12 |
CVE Name(s) | CVE-2021-26725 |
CVSS Details | CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVSS Score | 8.6 (CVSS v4.0) 7.2 (CVSS v3.1) |
CVE Risk Level | High (CVSS v4.0) High (CVSS v3.1) |
Risk Level for Nozomi customers | Low |
An authenticated command path traversal vulnerability in the management interface allows an authenticated administrator to read-protected system files.
Authenticated web GUI administrator can force the system to copy system files to the wrong location allowing him to read the contents. However, as by design web GUI administrators are allowed to use ssh keys to gain full console access, this finding has a low impact on our customers.
Guardian, CMC <v20.0.7.4 or <v19.0.12
Use internal firewall feature to limit management interface access and review user roles.
v19 series: Upgrade to v19.0.12. v20 series: Upgrade to v20.0.7.4.
We thank the following parties for their efforts: