Lucene search

K
cve[email protected]CVE-2022-27224
HistoryMay 09, 2022 - 3:15 p.m.

CVE-2022-27224

2022-05-0915:15:07
CWE-78
web.nvd.nist.gov
60
11
cve-2022-27224
galleon nts-6002-gps
command injection
network tools
authentication bypass
web-management interface
security vulnerability

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.019

Percentile

88.5%

An issue was discovered in Galleon NTS-6002-GPS 4.14.103-Galleon-NTS-6002.V12 4. An authenticated attacker can perform command injection as root via shell metacharacters within the Network Tools section of the web-management interface. All three networking tools are affected (Ping, Traceroute, and DNS Lookup) and their respective input fields (ping_address, trace_address, nslookup_address).

Affected configurations

NVD
Node
galsysnts-6002-gps_firmwareMatch4.14.103-galleon-nts-6002.v12_4
AND
galsysnts-6002-gpsMatch-
VendorProductVersionCPE
galsysnts-6002-gps_firmware4.14.103-galleon-nts-6002.v12+4cpe:/o:galsys:nts-6002-gps_firmware:4.14.103-galleon-nts-6002.v12+4:::

Social References

More

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.019

Percentile

88.5%

Related for CVE-2022-27224