First published: Thu Mar 04 2021(Updated: )
Upload of Code Without Integrity Check vulnerability in firmware archive of Secomea GateManager allows authenticated attacker to execute malicious code on server. This issue affects: Secomea GateManager all versions prior to 9.4.621054022
Credit: VulnerabilityReporting@secomea.com
Affected Software | Affected Version | How to fix |
---|---|---|
Secomea Gatemanager 8250 Firmware | <9.4.621054022 | |
Secomea Gatemanager 8250 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29032 is a vulnerability in the firmware archive of Secomea GateManager that allows an authenticated attacker to execute malicious code on the server.
The severity of CVE-2020-29032 is high, with a CVSS score of 7.2.
All versions of Secomea GateManager prior to 9.4.621054022 are affected by CVE-2020-29032.
An authenticated attacker can exploit CVE-2020-29032 by uploading malicious code to the firmware archive without integrity checks.
Yes, you can find more information about CVE-2020-29032 at the following references: [Reference 1](https://www.secomea.com/support/cybersecurity-advisory/#3737), [Reference 2](https://www.tenable.com/security/research/tra-2021-06).