Lucene search

K
jvnJapan Vulnerability NotesJVN:96561229
HistoryMay 09, 2022 - 12:00 a.m.

JVN#96561229: Multiple vulnerabilities in Operation management interface of FUJITSU Network IPCOM

2022-05-0900:00:00
Japan Vulnerability Notes
jvn.jp
45
fujitsu network ipcom
management interface
vulnerabilities
cve-2022-29516
cve-2020-10188
os command injection
buffer overflow
firmware update
workaround
ipcom ex2
ipcom ex
ipcom ve2
ipcom va2/ve1

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.833

Percentile

98.5%

FUJITSU Network IPCOM provided by FUJITSU LIMITED is an integrated network appliance.
Operation management interface used to operate FUJITSU Network IPCOM contains multiple vulnerabilities listed below.

OS command injection in the web console (CWE-78) - CVE-2022-29516

Version Vector Score
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score: 9.8
CVSS v2 AV:N/AC:L/Au:N/C:C/I:C/A:C Base Score: 10.0

Buffer overflow in the Command Line Interface (CWE-120) - CVE-2020-10188
The product uses previous versions of netkit-telnet which contains a known vulnerability.

Version Vector Score
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score: 9.8
CVSS v2 AV:N/AC:L/Au:N/C:C/I:C/A:C Base Score: 10.0

Impact

  • A remote attacker may execute an arbitrary OS command.
  • A remote attacker may obtain and/or alter sensitive information.
  • A remote attackerr may be able to cause a denial-of-service (DoS).

Solution

Update the Firmware
Update the firmware to the latest version according to the information provided by the developer.
These vulnerabilities have been already addressed in the following firmware versions.

  • IPCOM EX2 V01L05 NF0501

  • IPCOM EX2 V01L20 NF0301

  • IPCOM EX2 V02L21 NF0201

  • IPCOM EX E20L33 NF1101

  • IPCOM EX E30L11 NF0501

  • IPCOM VE2 V01L05 NF0303

  • IPCOM VA2/VE1 E20L33 NF0902
    Apply the Workaround
    Apply one of the following workarounds to prevent unauthorized access from other than authorized Operation management terminal:

  • Prepare a dedicated network to deploy Operation management interface and allow access to the Operation management interface only from the network

  • Set individual permissions for Operation management terminal
    For more information, refer to the information provided by the developer. (Text in Japanese)

Products Affected

  • IPCOM EX2 series
  • IPCOM EX series
  • IPCOM VE2 series
  • IPCOM VA2/VE1 series

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.833

Percentile

98.5%