SB2020062616 - Multiple vulnerabilities in ENTTEC Lighting Controllers



SB2020062616 - Multiple vulnerabilities in ENTTEC Lighting Controllers

Published: June 26, 2020

Security Bulletin ID SB2020062616
Severity
Medium
Patch available
NO
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 75% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Use of Hard-coded Cryptographic Key (CVE-ID: CVE-2019-12776)

The vulnerability allows a remote attacker to gain unauthorized access to the system.

The vulnerability exists due to the affected products include hard-coded SSH keys for remote SSH and SCP access as the root user. A remote authenticated attacker can gain root access to all affected products.


2) Stored cross-site scripting (CVE-ID: CVE-2019-12774)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can permanently inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


3) Improper access control (CVE-ID: CVE-2019-12775)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to the affected products enable high privileged root access via sudo capability without requiring appropriate access control. A remote authenticated attacker can bypass implemented security restrictions and gain unauthorized access to the application.


4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-12777)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to the system replaces permissions by the underlying operating system with highly insecure read, write, and execute directory permissions for all users. A remote authenticated attacker can gain elevated privileges on the target system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.