CVE-2020-12149

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*
OR cpe:2.3:a:arubanetworks:vx-1000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-2000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-3000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-500:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-5000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-6000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-7000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-8000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-9000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-10700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-11700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-1700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-2700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-3700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-5700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-6700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-7700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-8700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-9700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:unity_edgeconnect:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:59

Type Values Removed Values Added
References () https://www.silver-peak.com/support/user-documentation/security-advisories - Vendor Advisory () https://www.silver-peak.com/support/user-documentation/security-advisories - Vendor Advisory

07 Nov 2023, 21:16

Type Values Removed Values Added
CPE cpe:2.3:h:silver-peak:nx-8700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-3700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-1000:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-8000:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-11700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-3000:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-10700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-1700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-7000:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-5700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-9700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-7700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-2700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-500:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-5000:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-6000:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-6700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-9000:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-2000:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:ecos:*:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-8700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-6700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-6000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-5000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-2700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-1700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-9000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-3000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-11700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-10700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-2000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-7000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-9700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-8000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-3700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-500:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-5700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-7700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-1000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*
First Time Arubanetworks vx-3000
Arubanetworks nx-3700
Arubanetworks nx-1700
Arubanetworks nx-8700
Arubanetworks nx-5700
Arubanetworks nx-2700
Arubanetworks nx-10700
Arubanetworks
Arubanetworks vx-9000
Arubanetworks nx-6700
Arubanetworks edgeconnect Enterprise
Arubanetworks nx-9700
Arubanetworks vx-7000
Arubanetworks vx-500
Arubanetworks nx-11700
Arubanetworks nx-7700
Arubanetworks nx-700
Arubanetworks vx-6000
Arubanetworks vx-5000
Arubanetworks vx-2000
Arubanetworks vx-8000
Arubanetworks vx-1000

Information

Published : 2020-12-11 16:15

Updated : 2024-11-21 04:59


NVD link : CVE-2020-12149

Mitre link : CVE-2020-12149

CVE.ORG link : CVE-2020-12149


JSON object : View

Products Affected

arubanetworks

  • nx-7700
  • nx-10700
  • vx-8000
  • vx-1000
  • nx-1700
  • vx-500
  • vx-7000
  • nx-8700
  • vx-6000
  • nx-6700
  • vx-9000
  • vx-5000
  • nx-700
  • vx-2000
  • vx-3000
  • nx-3700
  • nx-11700
  • nx-5700
  • edgeconnect_enterprise
  • nx-9700
  • nx-2700

silver-peak

  • unity_edgeconnect
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')