First published: Thu Mar 31 2022(Updated: )
Improper access control vulnerability in pfSense CE and pfSense Plus (pfSense CE software versions prior to 2.6.0 and pfSense Plus software versions prior to 22.01) allows a remote attacker with the privilege to change NTP GPS settings to rewrite existing files on the file system, which may result in arbitrary command execution.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Netgate pfSense | <2.6.0 | |
Netgate pfSense Plus | <22.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26019 is an improper access control vulnerability in pfSense CE and pfSense Plus, which allows a remote attacker to rewrite existing files on the file system.
The severity of CVE-2022-26019 is high (8.8).
CVE-2022-26019 affects pfSense CE software versions prior to 2.6.0 and pfSense Plus software versions prior to 22.01.
A remote attacker with the privilege to change NTP GPS settings can exploit CVE-2022-26019 by rewriting existing files on the file system.
Yes, you can find official references for CVE-2022-26019 at the following links: [Netgate pfSense Security Advisory](https://docs.netgate.com/downloads/pfSense-SA-22_01.webgui.asc), [JVN](https://jvn.jp/en/jp/JVN87751554/index.html).