SB2020101101 - Multiple vulnerabilities in EdgeMax EdgeSwitch
Published: October 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-8232)
The vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to application does not properly impose security restrictions. A remote user with read only permissions can obtain unauthorized information through SNMP community pages.
2) OS Command Injection (CVE-ID: CVE-2020-8233)
The vulnerability allows a remote user to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation. A remote authenticated user can pass specially crafted data via the HTTP interface and execute arbitrary OS commands on the target system with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Insufficient Session Expiration (CVE-ID: CVE-2020-8234)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient session expiration issue. A remote non-authenticated attacker can guess legacy web interface SIDSSL cookie for administrative account and take over the device.
Remediation
Install update from vendor's website.
References
- https://community.ui.com/releases/EdgeMAX-EdgeSwitch-Firmware-v1-9-1-v1-9-1/8a87dfc5-70f5-4055-8d67-570db1f5695c
- https://community.ui.com/releases/Security-advisory-bulletin-014-014/1c32c056-2c64-4e60-ac23-ce7d8f387821
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html
- https://www.ui.com/download/edgemax