First published: Tue Aug 25 2020(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the isHPSmartComponent method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10501.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Marvell QConvergeConsole | <5.5.00.73 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15642 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64.
CVE-2020-15642 has a severity rating of 8.8 (critical).
Marvell QConvergeConsole versions 5.5.0.64 up to exclusive version 5.5.00.73 are affected by CVE-2020-15642.
Remote attackers can exploit CVE-2020-15642 by executing arbitrary code on vulnerable installations of Marvell QConvergeConsole.
Although authentication is required to exploit CVE-2020-15642, the existing authentication mechanism can be bypassed.