CVE-2021-26622

An remote code execution vulnerability due to SSTI vulnerability and insufficient file name parameter validation was discovered in Genian NAC. Remote attackers are able to execute arbitrary malicious code with SYSTEM privileges on all connected nodes in NAC through this vulnerability.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:genians:genian_nac:*:*:*:*:*:*:*:*
cpe:2.3:a:genians:genian_nac:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:56

Type Values Removed Values Added
References () https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66580 - Broken Link, Third Party Advisory () https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66580 - Broken Link, Third Party Advisory
CVSS v2 : 10.0
v3 : 10.0
v2 : 10.0
v3 : 9.6

26 Jun 2023, 18:22

Type Values Removed Values Added
CWE CWE-20 CWE-94

Information

Published : 2022-03-25 19:15

Updated : 2024-11-21 05:56


NVD link : CVE-2021-26622

Mitre link : CVE-2021-26622

CVE.ORG link : CVE-2021-26622


JSON object : View

Products Affected

genians

  • genian_nac

microsoft

  • windows
CWE
CWE-20

Improper Input Validation

CWE-94

Improper Control of Generation of Code ('Code Injection')