First published: Mon Feb 15 2021(Updated: )
A directory traversal vulnerability exists in the file upload function of the GateManager that allows an authenticated attacker with administrative permissions to read and write arbitrary files in the Linux file system. This issue affects: GateManager all versions prior to 9.2c.
Credit: VulnerabilityReporting@secomea.com
Affected Software | Affected Version | How to fix |
---|---|---|
Secomea Gatemanager 8250 Firmware | <9.2c | |
Secomea Gatemanager 8250 Firmware | ||
Secomea Gatemanager 4250 Firmware | <9.0i | |
Secomea GateManager | ||
Secomea Gatemanager | <9.0i | |
Secomea GateManager | ||
Secomea GateManager | <9.0i | |
Secomea GateManager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-29026.
CVE-2020-29026 has a severity level of critical.
CVE-2020-29026 affects all versions of GateManager prior to 9.2c.
CVE-2020-29026 allows an authenticated attacker with administrative permissions to read and write arbitrary files in the Linux file system.
To mitigate CVE-2020-29026, it is recommended to update GateManager to version 9.2c or later.