CVE-2020-15642 – Marvell QConvergeConsole isHPSmartComponent Command Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-15642
This vulnerability allows remote attackers to execute arbitrary code on affected installations of installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the isHPSmartComponent method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. • https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf https://www.zerodayinitiative.com/advisories/ZDI-20-970 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2020-17387 – Marvell QConvergeConsole writeObjectToConfigFile Directory Traversal Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-17387
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the writeObjectToConfigFile method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. • https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf https://www.zerodayinitiative.com/advisories/ZDI-20-974 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2020-17389 – Marvell QConvergeConsole GWTTestServiceImpl decryptFile Directory Traversal Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-17389
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the decryptFile method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. • https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf https://www.zerodayinitiative.com/advisories/ZDI-20-976 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2019-13582
https://notcve.org/view.php?id=CVE-2019-13582
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution. Se descubrió un problema en el firmware de Marvell 88W8688 Wi-Fi versiones anteriores a p52, como es usado en los vehículos Tesla Model S/X fabricados antes de marzo de 2018, por medio del módulo Parrot Faurecia Automotive FC6050W. Un desbordamiento de pila podría conllevar a una denegación de servicio o una ejecución de código arbitrario. • https://www.marvell.com/documents/ioaj5dntk2ubykssa78s • CWE-787: Out-of-bounds Write •
CVE-2019-13581
https://notcve.org/view.php?id=CVE-2019-13581
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary code via malformed Wi-Fi packets. Se descubrió un problema en el firmware de Marvell 88W8688 Wi-Fi versiones anteriores a p52, como es usado en los vehículos Tesla Model S/X fabricados antes de marzo de 2018, por medio del módulo Parrot Faurecia Automotive FC6050W. Un desbordamiento de búfer en la región heap de la memoria permite a atacantes remotos causar una denegación de servicio o ejecutar código arbitrario por medio de paquetes de Wi-Fi malformados. • https://keenlab.tencent.com/en/2020/01/02/exploiting-wifi-stack-on-tesla-model-s https://www.marvell.com/documents/ioaj5dntk2ubykssa78s • CWE-787: Out-of-bounds Write •