CVE-2020-12148

A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*
OR cpe:2.3:a:arubanetworks:vx-1000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-2000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-3000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-500:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-5000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-6000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-7000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-8000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-9000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-10700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-11700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-1700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-2700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-3700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-5700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-6700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-7700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-8700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-9700:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:59

Type Values Removed Values Added
References () https://www.silver-peak.com/support/user-documentation/security-advisories - Vendor Advisory () https://www.silver-peak.com/support/user-documentation/security-advisories - Vendor Advisory

07 Nov 2023, 21:20

Type Values Removed Values Added
CPE cpe:2.3:h:silver-peak:nx-8700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-3700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-1000:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-8000:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-11700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:unity_edgeconnect:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-3000:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-10700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-1700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-7000:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-5700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-9700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-7700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-2700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-500:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-5000:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-6000:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-6700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-9000:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-2000:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:ecos:*:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-8700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-6700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-6000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-5000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-2700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-1700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-9000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-3000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-11700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-10700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-2000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-7000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-9700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-8000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-3700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-500:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-5700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-7700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-1000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*
First Time Arubanetworks vx-3000
Arubanetworks nx-3700
Arubanetworks nx-1700
Arubanetworks nx-8700
Arubanetworks nx-5700
Arubanetworks nx-2700
Arubanetworks nx-10700
Arubanetworks
Arubanetworks vx-9000
Arubanetworks nx-6700
Arubanetworks edgeconnect Enterprise
Arubanetworks nx-9700
Arubanetworks vx-7000
Arubanetworks vx-500
Arubanetworks nx-11700
Arubanetworks nx-7700
Arubanetworks nx-700
Arubanetworks vx-6000
Arubanetworks vx-5000
Arubanetworks vx-2000
Arubanetworks vx-8000
Arubanetworks vx-1000

Information

Published : 2020-12-11 16:15

Updated : 2024-11-21 04:59


NVD link : CVE-2020-12148

Mitre link : CVE-2020-12148

CVE.ORG link : CVE-2020-12148


JSON object : View

Products Affected

arubanetworks

  • nx-7700
  • nx-10700
  • vx-8000
  • vx-1000
  • nx-1700
  • vx-500
  • vx-7000
  • nx-8700
  • vx-6000
  • nx-6700
  • vx-9000
  • vx-5000
  • nx-700
  • vx-2000
  • vx-3000
  • nx-3700
  • nx-11700
  • nx-5700
  • edgeconnect_enterprise
  • nx-9700
  • nx-2700
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')