8.5
CWE
78
Advisory Published
Updated

CVE-2020-12149: OS Command Injection - Management File Upload

First published: Fri Dec 11 2020(Updated: )

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

Credit: sirt@silver-peak.com sirt@silver-peak.com

Affected SoftwareAffected VersionHow to fix
Silver-peak Ecos>=8.1<8.1.9.15
Silver-peak Ecos>=8.3.0<8.3.0.8
Silver-peak Ecos>=8.3.1<8.3.1.2
Silver-peak Ecos>=9.0<9.0.2.0
Silver-peak Vx-1000
Silver-peak Vx-2000
Silver-peak Vx-3000
Silver-peak Vx-500
Silver-peak Vx-5000
Silver-peak Vx-6000
Silver-peak Vx-7000
Silver-peak Vx-8000
Silver-peak Vx-9000
Silver-peak Nx-10700
Silver-peak Nx-11700
Silver-peak Nx-1700
Silver-peak Nx-2700
Silver-peak Nx-3700
Silver-peak Nx-5700
Silver-peak Nx-6700
Silver-peak Nx-700
Silver-peak Nx-7700
Silver-peak Nx-8700
Silver-peak Nx-9700
Silver-peak Unity Edgeconnect
All of
Any of
Arubanetworks Edgeconnect Enterprise>=8.1<8.1.9.15
Arubanetworks Edgeconnect Enterprise>=8.3.0<8.3.0.8
Arubanetworks Edgeconnect Enterprise>=8.3.1<8.3.1.2
Arubanetworks Edgeconnect Enterprise>=9.0<9.0.2.0
Any of
Arubanetworks Vx-1000
Arubanetworks Vx-2000
Arubanetworks Vx-3000
Arubanetworks Vx-500
Arubanetworks Vx-5000
Arubanetworks Vx-6000
Arubanetworks Vx-7000
Arubanetworks Vx-8000
Arubanetworks Vx-9000
Arubanetworks Nx-10700
Arubanetworks Nx-11700
Arubanetworks Nx-1700
Arubanetworks Nx-2700
Arubanetworks Nx-3700
Arubanetworks Nx-5700
Arubanetworks Nx-6700
Arubanetworks Nx-700
Arubanetworks Nx-7700
Arubanetworks Nx-8700
Arubanetworks Nx-9700
Silver-peak Unity Edgeconnect

Remedy

The backup/restore functions in the patched versions of ECOS software have been modified to only accept alphanumeric characters, along with the period, hyphen, and underscore characters. This change ensures that OS commands cannot be injected via filename.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-12149?

    CVE-2020-12149 is a vulnerability in Silver Peak Unity ECOSTM (ECOS) appliance software that allows an attacker to manipulate shell commands.

  • Which version of Silver Peak ECOS software is affected by CVE-2020-12149?

    Versions 8.1 to 9.0.2.0 of Silver Peak ECOS software are affected by CVE-2020-12149.

  • What is the severity level of CVE-2020-12149?

    CVE-2020-12149 has a severity level of 6.8, which is considered high.

  • How can an attacker exploit CVE-2020-12149?

    An attacker can exploit CVE-2020-12149 by injecting valid OS command input.

  • Where can I find more information about CVE-2020-12149?

    You can find more information about CVE-2020-12149 in the Silver Peak support documentation and security advisories.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203