CWE
94 20
Advisory Published
Updated

CVE-2020-8349: Code Injection

First published: Wed Oct 14 2020(Updated: )

An internal security review has identified an unauthenticated remote code execution vulnerability in Cloud Networking Operating System (CNOS)’ optional REST API management interface. This interface is disabled by default and not vulnerable unless enabled. When enabled, it is only vulnerable where attached to a VRF and as allowed by defined ACLs. Lenovo strongly recommends upgrading to a non-vulnerable CNOS release. Where not possible, Lenovo recommends disabling the REST API management interface or restricting access to the management VRF and further limiting access to authorized management stations via ACL.

Credit: psirt@lenovo.com

Affected SoftwareAffected VersionHow to fix
Lenovo Cloud Networking Operating System<10.10.6.0
Lenovo Rackswitch G8272
Lenovo Rackswitch G8296
Lenovo Rackswitch G8332
Lenovo Rackswitch Ne0152t
Lenovo Rackswitch Ne10032
Lenovo Rackswitch Ne1032
Lenovo Rackswitch Ne1032t
Lenovo Rackswitch Ne1072t
Lenovo Rackswitch Ne2572

Remedy

Upgrade to the CNOS version 10.10.6.0 or later.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203