First published: Fri Aug 21 2020(Updated: )
A vulnerability exists in The EdgeMax EdgeSwitch firmware <v1.9.1 where the EdgeSwitch legacy web interface SIDSSL cookie for admin can be guessed, enabling the attacker to obtain high privileges and get a root shell by a Command injection.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
EdgeMax Firmware | <1.9.1 | |
ui ep-s16 | ||
UI ES-12F | ||
Ubiquiti Networks US-16-150W | ||
UI ES-16-XG | ||
UI ES-24-250W | ||
Cisco SG500X-24P | ||
ui es-24-lite | ||
Ubiquiti Networks UISP US-48-500W | ||
UI ES-48 | ||
UI ES-48 | ||
Ubiquiti Networks US-8-150W |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-8234.
The severity rating of CVE-2020-8234 is critical with a severity value of 9.8.
An attacker can exploit CVE-2020-8234 by guessing the EdgeSwitch legacy web interface SIDSSL cookie for admin, enabling them to obtain high privileges and execute a command injection to gain a root shell.
The affected software for CVE-2020-8234 is The EdgeMax EdgeSwitch firmware prior to version 1.9.1.
To fix the CVE-2020-8234 vulnerability, update The EdgeMax EdgeSwitch firmware to version 1.9.1 or newer.