SB2020062616 - Multiple vulnerabilities in ENTTEC Lighting Controllers
Published: June 26, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Use of Hard-coded Cryptographic Key (CVE-ID: CVE-2019-12776)
The vulnerability allows a remote attacker to gain unauthorized access to the system.
The vulnerability exists due to the affected products include hard-coded SSH keys for remote SSH and SCP access as the root user. A remote authenticated attacker can gain root access to all affected products.
2) Stored cross-site scripting (CVE-ID: CVE-2019-12774)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can permanently inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Improper access control (CVE-ID: CVE-2019-12775)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to the affected products enable high privileged root access via sudo capability without requiring appropriate access control. A remote authenticated attacker can bypass implemented security restrictions and gain unauthorized access to the application.
4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-12777)
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to the system replaces permissions by the underlying operating system with highly insecure read, write, and execute directory permissions for all users. A remote authenticated attacker can gain elevated privileges on the target system.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.