Remote code execution in Genexis DRGOS



Published: 2017-01-05
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2015-3441
CWE-ID CWE-78
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
DRGOS
Hardware solutions / Firmware

Vendor Genexis

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) OS command injection

EUVDB-ID: #VU3571

Risk: Low

CVSSv3.1: 5.5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2015-3441

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary commands on vulnerable device.

The vulnerability exists due to insufficient filtration of use-supplied data passed via "start_hour", "start_minute", "end_hour",  "end_minute", and "hostname" parameters to Parental Control interface. A remote authenticated user can create a custom rule and execute arbitrary system commands with administrative privileges.

Successful exploitation of the vulnerability results in compromise of vulnerable device.

Mitigation

Update DRGOS firmware to version 1.14.1.

Vulnerable software versions

DRGOS: 1.14.0

External links

http://www.navixia.com/CVE-2015-3441.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###