CVE-2020-11733

An issue was discovered on Spirent TestCenter and Avalanche appliance admin interface firmware. An attacker, who already has access to an SSH restricted shell, can achieve root access via shell metacharacters. The attacker can then, for example, read sensitive files such as appliance admin configuration source code. This affects Spirent TestCenter and Avalanche products which chassis version <= 5.08. The SSH restricted shell is available with default credentials.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:spirent:avalanche:*:*:*:*:*:*:*:*
cpe:2.3:a:spirent:testcenter:*:*:*:*:*:*:*:*
cpe:2.3:h:spirent:c100-mp:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-08-13 14:15

Updated : 2024-02-28 17:47


NVD link : CVE-2020-11733

Mitre link : CVE-2020-11733

CVE.ORG link : CVE-2020-11733


JSON object : View

Products Affected

spirent

  • avalanche
  • c100-mp
  • testcenter
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')