High Vulnerabilities
Total Page:16
File Type:pdf, Size:1020Kb
Vulnerability Summary for the Week of February 8, 2021 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: • High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 • Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9 • Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9 Entries may include additional information provided by organizations and efforts sponsored by Ug-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of Ug-CERT analysis. High Vulnerabilities Primary CVSS Source & Description Published Vendor -- Product Score Patch Info Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Write vulnerability CVE- when parsing a crafted jpeg file. An 2021-02- 2021- adobe -- acrobat 9.3 unauthenticated attacker could leverage 11 21044 this vulnerability to achieve arbitrary code MISC execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Primary CVSS Source & Description Published Vendor -- Product Score Patch Info Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and CVE- 2017.011.30188 (and earlier) are affected 2021-02- 2021- adobe -- acrobat by an improper access control 9.3 11 21045 vulnerability. An unauthenticated attacker MISC could leverage this vulnerability to elevate privileges in the context of the current user. CVE- Advantech iView versions prior to 2021- v5.7.03.6112 are vulnerable to a SQL 2021-02- advantech -- iview 7.5 22658 injection, which may allow an attacker to 11 MISC escalate privileges to 'Administrator'. MISC Denial of service in ASUSWRT ASUS CVE- RT-AX3000 firmware versions 2021-3229 3.0.0.4.384_10177 and earlier versions 2021-02- asus -- rt-ax3000_firmware 7.8 MISC allows an attacker to disrupt the use of 05 MISC device setup services via continuous login MISC error. CarrierWave is an open-source RubyGem CVE- 2021-02- carrierwave_project -- carrierwave which provides a simple and flexible way 7.5 2021- 08 to upload files from Ruby applications. In 21305 Primary CVSS Source & Description Published Vendor -- Product Score Patch Info CarrierWave before versions 1.3.2 and MISC 2.1.1, there is a code injection MISC vulnerability. The "#manipulate!" method MISC inappropriately evals the content of CONFIRM mutation option(:read/:write), allowing MISC attackers to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). This is fixed in versions 1.3.2 and 2.1.1. College Management System Php 1.0 suffers from SQL injection vulnerabilities CVE- college_management_system_project - in the index.php page from POST 2021-02- 2020- 7.5 - college_management_system parameters 'unametxt' and 'pwdtxt', which 08 26051 are not filtered before passing a SQL MISC query. Dell PowerScale OneFS versions 8.1.0 – 9.1.0 contain a "use of SSH key past account expiration" vulnerability. A user CVE- on the network with the 2021-02- 2021- dell -- emc_powerscale_onefs 7.5 ISI_PRIV_AUTH_SSH RBAC privilege 09 21502 that has an expired account may potentially MISC exploit this vulnerability, giving them access to the same things they had before Primary CVSS Source & Description Published Vendor -- Product Score Patch Info account expiration. This may by a high privileged account and hence Dell recommends customers upgrade at the earliest opportunity. Dell EMC PowerScale OneFS versions 8.1.0 - 9.1.0 contain an improper input validation vulnerability. A user with the CVE- ISI_PRIV_CLUSTER privilege may 2021-02- 2020- dell -- emc_powerscale_onefs 7.2 exploit this vulnerability, leading to the 09 26193 execution of arbitrary OS commands on MISC the application's underlying OS, with the privileges of the vulnerable application. Dynamoose is an open-source modeling tool for Amazon's DynamoDB. In Dynamoose from version 2.0.0 and before version 2.7.0 there was a prototype CVE- pollution vulnerability in the internal 2021- utility method "lib/utils/object/set.ts". This 21304 2021-02- dynamoosejs -- dynamoose method is used throughout the codebase 7.5 MISC 08 for various operations throughout MISC Dynamoose. We have not seen any CONFIRM evidence of this vulnerability being MISC exploited. There is no evidence this vulnerability impacts versions 1.x.x since the vulnerable method was added as part of Primary CVSS Source & Description Published Vendor -- Product Score Patch Info the v2 rewrite. This vulnerability also impacts v2.x.x beta/alpha versions. Version 2.7.0 includes a patch for this vulnerability. CVE- ELECOM WRC-300FEBK-S allows an 2021- attacker with administrator rights to 2021-02- elecom -- wrc-300febk-s_firmware 7.7 20648 execute arbitrary OS commands via 12 MISC unspecified vectors. MISC An issue was discovered in Epikur before 20.1.1. The Epikur server contains the checkPasswort() function that, upon user login, checks the submitted password CVE- against the user password's MD5 hash 2021-02- 2020- epikur -- epikur stored in the database. It is also compared 7.5 05 10539 to a second MD5 hash, which is the same MISC for every user (aka a "Backdoor Password" of 3p1kursupport). If the submitted password matches either one, access is granted. An issue was discovered on FiberHome 2021-02- CVE- fiberhome -- hg6245d_firmware 7.5 HG6245D devices through RP2613. The 10 2021- Primary CVSS Source & Description Published Vendor -- Product Score Patch Info web daemon contains the hardcoded admin 27145 / lnadmin credentials for an ISP. MISC An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware 7.5 web daemon contains the hardcoded admin 10 27147 / admin credentials for an ISP. MISC An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware web daemon contains the hardcoded 7.5 10 27148 telecomadmin / nE7jA%5m credentials for MISC an ISP. An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware web daemon contains the hardcoded 7.5 10 27149 adminpldt / z6dUABtl270qRxt7a2uGTiw MISC credentials for an ISP. An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware 7.5 web daemon contains the hardcoded admin 10 27146 / CUadmin credentials for an ISP. MISC Primary CVSS Source & Description Published Vendor -- Product Score Patch Info An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware 7.5 web daemon contains the hardcoded 10 27151 rootmet / m3tr0r00t credentials for an ISP. MISC An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware web daemon contains the hardcoded 7.5 10 27152 awnfibre / fibre@dm!n credentials for an MISC ISP. An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware web daemon contains the hardcoded 7.5 10 27153 trueadmin / admintrue credentials for an MISC ISP. An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware 7.5 web daemon contains the hardcoded admin 10 27154 / G0R2U1P2ag credentials for an ISP. MISC An issue was discovered on FiberHome 2021-02- CVE- fiberhome -- hg6245d_firmware HG6245D devices through RP2613. The 7.5 10 2021- web daemon contains the hardcoded admin Primary CVSS Source & Description Published Vendor -- Product Score Patch Info / 3UJUh2VemEfUtesEchEC2d2e 27155 credentials for an ISP. MISC An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware web daemon contains credentials for an 7.5 10 27156 ISP that equal the last part of the MAC MISC address of the br0 interface. An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware 7.5 web daemon contains the hardcoded admin 10 27157 / 888888 credentials for an ISP. MISC An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware web daemon contains the hardcoded 7.5 10 27158 L1vt1m4eng / 888888 credentials for an MISC ISP. An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware 7.5 web daemon contains the hardcoded 10 27159 useradmin / 888888 credentials for an ISP. MISC Primary CVSS Source & Description Published Vendor -- Product Score Patch Info An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware 7.5 web daemon contains the hardcoded user / 10 27160 888888 credentials for an ISP. MISC An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware 7.5 web daemon contains the hardcoded admin 10 27161 / 1234 credentials for an ISP. MISC An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware 7.5 web daemon contains the hardcoded user / 10 27162 tattoo@home credentials for an ISP. MISC An issue was discovered on FiberHome CVE- HG6245D devices through RP2613. The 2021-02- 2021- fiberhome -- hg6245d_firmware 7.5 web daemon contains the hardcoded admin 10 27163 / tele1234 credentials for an ISP.