First published: Fri Dec 27 2019(Updated: )
An issue was discovered on Alcatel-Lucent OmniVista 4760 devices. A remote unauthenticated attacker can chain a directory traversal (which helps to bypass authentication) with an insecure file upload to achieve Remote Code Execution as SYSTEM. The directory traversal is in the __construct() whereas the insecure file upload is in SetSkinImages().
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Al-enterprise Omnivista 4760 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-20049.
CVE-2019-20049 has a severity rating of 9.8, which is classified as critical.
The affected software is Alcatel-Lucent OmniVista 4760.
This vulnerability allows a remote unauthenticated attacker to achieve remote code execution as SYSTEM on Alcatel-Lucent OmniVista 4760 devices.
An attacker can exploit this vulnerability by chaining a directory traversal with an insecure file upload to bypass authentication and execute arbitrary code.