CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
22.9%
An OS command injection vulnerability in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30 with firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109 allows an administrator to execute arbitrary OS commands via a file name parameter in a patch application function. The Zultys MX Administrator client has a “Patch Manager” section that allows administrators to apply patches to the device. The user supplied filename for the patch file is passed to a shell script without validation. Including bash command substitution characters in a patch file name results in execution of the provided command.
Vendor | Product | Version | CPE |
---|---|---|---|
zultys | mx-se_firmware | * | cpe:2.3:o:zultys:mx-se_firmware:*:*:*:*:*:*:*:* |
zultys | mx-se | - | cpe:2.3:h:zultys:mx-se:-:*:*:*:*:*:*:* |
zultys | mx-se_ii_firmware | * | cpe:2.3:o:zultys:mx-se_ii_firmware:*:*:*:*:*:*:*:* |
zultys | mx-se_ii | - | cpe:2.3:h:zultys:mx-se_ii:-:*:*:*:*:*:*:* |
zultys | mx-e_firmware | * | cpe:2.3:o:zultys:mx-e_firmware:*:*:*:*:*:*:*:* |
zultys | mx-e | - | cpe:2.3:h:zultys:mx-e:-:*:*:*:*:*:*:* |
zultys | mx-virtual_firmware | * | cpe:2.3:o:zultys:mx-virtual_firmware:*:*:*:*:*:*:*:* |
zultys | mx-virtual | - | cpe:2.3:h:zultys:mx-virtual:-:*:*:*:*:*:*:* |
zultys | mx250_firmware | * | cpe:2.3:o:zultys:mx250_firmware:*:*:*:*:*:*:*:* |
zultys | mx250 | - | cpe:2.3:h:zultys:mx250:-:*:*:*:*:*:*:* |