First published: Thu Jan 26 2023(Updated: )
Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no ip static route destination A.B.C.D gateway A.B.C.D mask A.B.C.D metric <0-10> interface (lan|wan|vpn) description WORD' command template.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siretta Quartz-gold Firmware | =g5.0.1.5-210720-141020 | |
Siretta QUARTZ-GOLD |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41006 refers to several stack-based buffer overflow vulnerabilities in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020.
CVE-2022-41006 has a severity rating of 9.8 (Critical).
CVE-2022-41006 can lead to arbitrary command execution when a specially-crafted network packet is sent, potentially allowing an attacker to take control of the system.
Yes, Siretta QUARTZ-GOLD G5.0.1.5-210720-141020 is vulnerable to CVE-2022-41006.
There is currently no known fix or patch available for the vulnerabilities in the DetranCLI command parsing functionality. It is recommended to contact the vendor for further guidance and mitigation steps.