16 results (0.004 seconds)

CVSS: 8.5EPSS: 0%CPEs: 25EXPL: 0

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0. Se detectó que la función backup/restore de la configuración en el software del dispositivo Silver Peak Unity ECOSTM (ECOS) incorpora directamente el nombre de archivo de configuración controlado por el usuario en un comando shell posterior, permitiendo a un atacante manipular el comando resultante al inyectar una entrada de comando válida del sistema operativo. Esta vulnerabilidad puede ser explotada por un atacante con acceso autenticado a la Interfaz de Usuario de Orchestrator o la Interfaz de Usuario de EdgeConnect. • https://www.silver-peak.com/support/user-documentation/security-advisories • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

In Silver Peak Unity Orchestrator versions prior to 8.9.11+, 8.10.11+, or 9.0.1+, an authenticated user can access, modify, and delete restricted files on the Orchestrator server using the/debugFiles REST API. En Silver Peak Unity Orchestrator versiones anteriores a 8.9.11+, 8.10.11+ o 9.0.1+, un usuario autenticado puede acceder, modificar y eliminar archivos restringidos en el servidor de Orchestrator usando la API REST /debugFiles • https://www.silver-peak.com/support/user-documentation/security-advisories • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

In Silver Peak Unity Orchestrator versions prior to 8.9.11+, 8.10.11+, or 9.0.1+, an authenticated user can make unauthorized MySQL queries against the Orchestrator database using the /sqlExecution REST API, which had been used for internal testing. En Silver Peak Unity Orchestrator versiones anteriores a 8.9.11+, 8.10.11+ o 9.0.1+, un usuario autenticado puede llevar a cabo consultas MySQL no autorizadas en la base de datos de Orchestrator usando la API REST /sqlExecution, que había sido usada para pruebas internas • https://www.silver-peak.com/support/user-documentation/security-advisories • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

Silver Peak Unity Orchestrator versions prior to 8.9.11+, 8.10.11+, or 9.0.1+ uses HTTP headers to authenticate REST API calls from localhost. This makes it possible to log in to Orchestrator by introducing an HTTP HOST header set to 127.0.0.1 or localhost. Orchestrator instances that are hosted by customers –on-premise or in a public cloud provider –are affected by this vulnerability. Silver Peak Unity Orchestrator versiones anteriores a 8.9.11+, 8.10.11+, o 9.0.1+ usan encabezados HTTP para autentificar unas llamadas a la API REST desde el host local. Esto hace posible acceder a Orchestrator al introducir un ajuste del encabezado HTTP HOST en la versión 127.0.0.1 o localhost. • https://www.silver-peak.com/support/user-documentation/security-advisories • CWE-287: Improper Authentication •

CVSS: 4.9EPSS: 0%CPEs: 44EXPL: 0

1. IPSec UDP key material can be retrieved from machine-to-machine interfaces and human-accessible interfaces by a user with admin credentials. Such a user, with the required system knowledge, could use this material to decrypt in-flight communication. 2. The vulnerability requires administrative access and shell access to the EdgeConnect appliance. An admin user can access IPSec seed and nonce parameters using the CLI, REST APIs, and the Linux shell. 1. • https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_ipsec_udp_key_material-cve_2020_12142.pdf • CWE-668: Exposure of Resource to Wrong Sphere •