CVE-2020-24054

The administration console of the Moog EXO Series EXVF5C-2 and EXVP7C2-3 units features a 'statusbroadcast' command that can spawn a given process repeatedly at a certain time interval as 'root'. One of the limitations of this feature is that it only takes a path to a binary without arguments; however, this can be circumvented using special shell variables, such as '${IFS}'. As a result, an attacker can execute arbitrary commands as 'root' on the units.
References
Link Resource
https://ioac.tv/3hy1xu6 Exploit Third Party Advisory
https://ioactive.com/moog-exo-series-multiple-vulnerabilities/ Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:moog:exvf5c-2_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:moog:exvf5c-2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:moog:exvp7c2-3_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:moog:exvp7c2-3:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-08-21 15:15

Updated : 2024-02-28 17:47


NVD link : CVE-2020-24054

Mitre link : CVE-2020-24054

CVE.ORG link : CVE-2020-24054


JSON object : View

Products Affected

moog

  • exvp7c2-3_firmware
  • exvp7c2-3
  • exvf5c-2
  • exvf5c-2_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')