Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-8233


A command injection vulnerability exists in EdgeSwitch firmware <v1.9.0 that allowed an authenticated read-only user to execute arbitrary shell commands over the HTTP interface, allowing them to escalate privileges.


Published

2020-08-17T16:15:13.857

Last Modified

2024-11-21T05:38:33.437

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

10.0

Weaknesses
  • Type: Secondary
    CWE-77
  • Type: Primary
    CWE-78

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application ui edgeswitch_firmware < 1.9.0 Yes
Hardware ui ep-16-xg - No
Hardware ui ep-s16 - No
Hardware ui es-12f - No
Hardware ui es-16-150w - No
Hardware ui es-24-250w - No
Hardware ui es-24-500w - No
Hardware ui es-24-lite - No
Hardware ui es-48-500w - No
Hardware ui es-48-750w - No
Hardware ui es-48-lite - No
Hardware ui es-8-150w - No
Application opensuse backports_sle 15.0 Yes
Application opensuse backports_sle 15.0 Yes
Operating System opensuse leap 15.1 Yes
Operating System opensuse leap 15.2 Yes

References