Lucene search

K
cvelistZdiCVELIST:CVE-2020-15642
HistoryAug 25, 2020 - 8:21 p.m.

CVE-2020-15642

2020-08-2520:21:26
CWE-77
zdi
www.cve.org
2
vulnerability
marvell qconvergeconsole
code execution
authentication bypass
remote attackers
system call
zdi-can-10501

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.014

Percentile

86.8%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the isHPSmartComponent method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10501.

CNA Affected

[
  {
    "product": "QConvergeConsole",
    "vendor": "Marvell",
    "versions": [
      {
        "status": "affected",
        "version": "5.5.0.64"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.014

Percentile

86.8%

Related for CVELIST:CVE-2020-15642