Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 9 |
CVE-ID | CVE-2018-9074 CVE-2018-9082 CVE-2018-9080 CVE-2018-9081 CVE-2018-9079 CVE-2018-9078 CVE-2018-9077 CVE-2018-9076 CVE-2018-9075 |
CWE-ID | CWE-22 CWE-620 CWE-613 CWE-79 CWE-434 CWE-78 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
LenovoEMC NAS Firmware Hardware solutions / Firmware |
Vendor | Lenovo |
Security Bulletin
This security bulletin contains information about 9 vulnerabilities.
EUVDB-ID: #VU15051
Risk: Medium
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-9074
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences within Content Explorer application. A remote authenticated attacker can send a specially crafted HTTP request and upload arbitrary file to the system as a root user.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLenovoEMC NAS Firmware: 4.1.402.34662
CPE2.3 External linkshttps://support.lenovo.com/us/en/solutions/LEN-24224
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU15059
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-9082
CWE-ID:
CWE-620 - Unverified Password Change
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to change victim's password.
The vulnerability exists due to the web application does not provide verification of an old password before allowing to change it to a new one. A remote attacker with knowledge of vimctim's session token can change the user's password.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLenovoEMC NAS Firmware: 4.1.402.34662
CPE2.3 External linkshttps://support.lenovo.com/us/en/solutions/LEN-24224
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU15058
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-9080
CWE-ID:
CWE-613 - Insufficient Session Expiration
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise victim's account.
The vulnerability exists due to application sets the lomega cookie to a known value before logging into the NAS's web application. A remote attacker with knowledge of the cookie can compromise victim's session.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLenovoEMC NAS Firmware: 4.1.402.34662
CPE2.3 External linkshttps://support.lenovo.com/us/en/solutions/LEN-24224
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU15057
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-9081
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLenovoEMC NAS Firmware: 4.1.402.34662
CPE2.3 External linkshttps://support.lenovo.com/us/en/solutions/LEN-24224
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU15056
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-9079
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLenovoEMC NAS Firmware: 4.1.402.34662
CPE2.3 External linkshttps://support.lenovo.com/us/en/solutions/LEN-24224
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU15055
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-9078
CWE-ID:
CWE-434 - Unrestricted Upload of File with Dangerous Type
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to upload dangerous files.
The vulnerability exists due to the web interface allows uploading of SVG files. A remote authenticated attacker can upload a malicious SVG file, trick the victim into opening it in the browser and execute arbitrary JavaScript code in the context of vulnerable application.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLenovoEMC NAS Firmware: 4.1.402.34662
CPE2.3 External linkshttps://support.lenovo.com/us/en/solutions/LEN-24224
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU15054
Risk: Medium
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-9077
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to insufficient sanitization of user-supplied data within the "share:name" parameter. A remote authenticated attacker can inject and execute arbitrary OS commands with root privileges on the affected device.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLenovoEMC NAS Firmware: 4.1.402.34662
CPE2.3 External linkshttps://support.lenovo.com/us/en/solutions/LEN-24224
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU15053
Risk: Medium
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-9076
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to insufficient sanitization of user-supplied data within the "name" parameter. A remote authenticated attacker can inject and execute arbitrary OS commands with root privileges on the affected device.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLenovoEMC NAS Firmware: 4.1.402.34662
CPE2.3 External linkshttps://support.lenovo.com/us/en/solutions/LEN-24224
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU15052
Risk: Medium
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-9075
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to insufficient sanitization of user-supplied data within the client:password parameter. A remote authenticated attacker can inject and execute arbitrary OS commands with root privileges on the affected device.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLenovoEMC NAS Firmware: 4.1.402.34662
CPE2.3 External linkshttps://support.lenovo.com/us/en/solutions/LEN-24224
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.