A command injection vulnerability exists in EdgeSwitch firmware <v1.9.0 that allowed an authenticated read-only user to execute arbitrary shell commands over the HTTP interface, allowing them to escalate privileges.
2020-08-17T16:15:13.857
2024-11-21T05:38:33.437
Modified
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:L/Au:S/C:C/I:C/A:C
8.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | ui | edgeswitch_firmware | < 1.9.0 | Yes |
Hardware | ui | ep-16-xg | - | No |
Hardware | ui | ep-s16 | - | No |
Hardware | ui | es-12f | - | No |
Hardware | ui | es-16-150w | - | No |
Hardware | ui | es-24-250w | - | No |
Hardware | ui | es-24-500w | - | No |
Hardware | ui | es-24-lite | - | No |
Hardware | ui | es-48-500w | - | No |
Hardware | ui | es-48-750w | - | No |
Hardware | ui | es-48-lite | - | No |
Hardware | ui | es-8-150w | - | No |
Application | opensuse | backports_sle | 15.0 | Yes |
Application | opensuse | backports_sle | 15.0 | Yes |
Operating System | opensuse | leap | 15.1 | Yes |
Operating System | opensuse | leap | 15.2 | Yes |