First published: Mon Nov 30 2020(Updated: )
An issue was discovered on Fujitsu Eternus Storage DX200 S4 devices through 2020-11-25. After logging into the portal as a root user (using any web browser), the portal can be accessed with root privileges when the URI cgi-bin/csp?cspid={XXXXXXXXXX}&csppage=cgi_PgOverview&csplang=en is visited from a different web browser.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fujitsu Eternus Storage Dx200 S4 Firmware | <=2020-11-25 | |
Fujitsu Eternus Storage DX200 S4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29127 refers to an issue discovered on Fujitsu Eternus Storage DX200 S4 devices, which allows access to the portal with root privileges after logging in as a root user.
CVE-2020-29127 affects Fujitsu Eternus Storage DX200 S4 devices by allowing unauthorized access to the portal with root privileges.
CVE-2020-29127 has a severity rating of 9.8 out of 10, indicating a critical vulnerability.
To fix CVE-2020-29127, it is recommended to apply the latest firmware update provided by Fujitsu for the Eternus Storage DX200 S4 devices.
You can find more information about CVE-2020-29127 on the following references: [Link 1](http://packetstormsecurity.com/files/160255/Fujitsu-Eternus-Storage-DX200-S4-Broken-Authentication.html), [Link 2](https://cxsecurity.com/issue/WLB-2020110215), [Link 3](https://seccops.com/fujitsu-eternus-storage-dx200-s4-broken-authentication/)