Lucene search

K
jvnJapan Vulnerability NotesJVN:38784555
HistoryJan 04, 2021 - 12:00 a.m.

JVN#38784555: Multiple vulnerabilities in UNIVERGE SV9500/SV8500 series

2021-01-0400:00:00
Japan Vulnerability Notes
jvn.jp
62
univerge sv9500
univerge sv8500
remote maintenance console
os command injection
authentication algorithm
arbitrary command execution
dos
unauthorized access

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

64.8%

Remote system maintenance feature of UNIVERGE SV9500/SV8500 series’ Web based remote maintenance console contains multiple vulnerabilities listed below.

OS Command Injection (CWE-78) - CVE-2020-5685

Version Vector Score
CVSS v3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Base Score: 9.6
CVSS v2 AV:A/AC:L/Au:N/C:P/I:P/A:P Base Score: 5.8

Incorrect Implementation of Authentication Algorithm (CWE-303) - CVE-2020-5686

Version Vector Score
CVSS v3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L Base Score: 7.6
CVSS v2 AV:A/AC:L/Au:N/C:P/I:P/A:P Base Score: 5.8

Impact

  • If an attacker who can access the device sends a specially crafted request to a specific URL, an arbitrary command may be executed or a denial-of-service (DoS) condition may be caused - CVE-2020-5685
  • If an attacker who can access the device sends a specially crafted request to a specific URL, the remote system maintenance feature may be accessed illegally and information may be disclosed - CVE-2020-5686

Solution

Update the Software
Update to the software according to the information provided by the developer.
Contact your product dealer for details of the update.

Apply the workarounds
Applying the following workarounds may mitigate the impacts of these vulnerabilities.

  • Do not directly connect the products to an external network such as the Internet.
  • Explicitly create an access rule based on source IP addresses/destination IP addresses/port numbers for network connection to the products.

Products Affected

  • UNIVERGE SV9500 series from V1 to V7
  • UNIVERGE SV8500 series from S6 to S8

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

64.8%

Related for JVN:38784555