SB2021052801 - Multiple vulnerabilities in MesaLabs AmegaView
Published: May 28, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Command Injection (CVE-ID: CVE-2021-27447)
The vulnerability allows a remote attacker to execute arbitrary commands on the target system.
The vulnerability exists due to improper input validation. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Improper Authentication (CVE-ID: CVE-2021-27451)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to the affected product’s passcode is generated by an easily reversible algorithm. A remote attacker can bypass authentication process and gain unauthorized access to the application.
3) Authentication bypass using an alternate path or channel (CVE-ID: CVE-2021-27453)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exist due to improper implementation of the authentication process when the affected product uses default cookies. A remote attacker can bypass authentication process and gain access to the target system.
4) Command Injection (CVE-ID: CVE-2021-27449)
The vulnerability allows a remote attacker to execute arbitrary commands on the target system.
The vulnerability exists due to improper input validation in the web server. A remote authenticated attacker can pass specially crafted data to the application and execute arbitrary commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Improper Privilege Management (CVE-ID: CVE-2021-27445)
The vulnerability allows a local user to escalate privileges.
The vulnerability exists due to insecure file permissions. A local user can escalate privileges.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.