First published: Tue May 26 2020(Updated: )
We have recently released new version of AirMax AirOS firmware v6.3.0 for TI, XW and XM boards that fixes vulnerabilities found on AirMax AirOS v6.2.0 and prior TI, XW and XM boards, according to the description below:There are certain end-points containing functionalities that are vulnerable to command injection. It is possible to craft an input string that passes the filter check but still contains commands, resulting in remote code execution.Mitigation:Update to the latest AirMax AirOS firmware version available at the AirMax download page.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
UI Airos | <=6.2.0 | |
HP 3PAR StoreServ P4900 | ||
HP P4900 G2 | ||
HP AG Series | ||
ui ag-hp-5g27 | ||
Ubiquiti AirGrid M2 | ||
Ubiquiti AirGrid M2 | ||
Ubiquiti AirGrid M5 | ||
UI AR-HP | ||
UI AR | ||
ui bm2-ti | ||
IBM BM2HP | ||
ui bm5-ti | ||
ui bm5hp | ||
ui is-m5 | ||
ui lbem5-23 | ||
ui litestation m5 | ||
ui locom2 | ||
M5 | ||
ui locom9 | ||
ui m2 | ||
ui m3 | ||
UI M365 | ||
M5 | ||
UI M900 | ||
ui nb-2g18 | ||
ui nb-5g22 | ||
ui nb-5g25 | ||
ui nbe-m2-13 | ||
Ubiquiti Networks AirMax NBE-M5-16 | ||
HP Envy 6000 | ||
ui nbm3 | ||
ui nbm365 | ||
ui nbm9 | ||
ui nsm2 | ||
ui nsm3 | ||
NSM 365 | ||
ui nsm | ||
ui pbe-m2-400 | ||
ui pbe-m5-300-iso | ||
ui pbe-m5-300-iso | ||
ui pbe-m5-400-iso | ||
ui pbe-m5-400-iso | ||
ui pbe-m5-620 | ||
ui pbm10 | ||
UI PBM365 | ||
ui pbm5 | ||
Picom 2 | ||
ui power ap n | ||
ui rm2-ti | ||
ui rm5-ti |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the AirMax AirOS firmware is CVE-2020-8171.
The severity of CVE-2020-8171 is critical with a CVSS score of 9.8.
CVE-2020-8171 affects AirMax AirOS firmware versions up to and including v6.2.0 for TI, XW, and XM boards.
To fix CVE-2020-8171, update your AirMax AirOS firmware to version v6.3.0.
You can find more information about CVE-2020-8171 in the references provided: [link1](https://community.ui.com/releases/Security-advisory-bulletin-011-011/d0d411a5-6dcb-4988-9709-d57f50957261), [link2](https://community.ui.com/releases/airMAX-M-v6-3-0/c8d5dec9-4030-4d7e-b23f-6a5b35ed3d83), [link3](https://www.ui.com/download/airmax-m).