An remote code execution vulnerability due to SSTI vulnerability and insufficient file name parameter validation was discovered in Genian NAC. Remote attackers are able to execute arbitrary malicious code with SYSTEM privileges on all connected nodes in NAC through this vulnerability.
References
Link | Resource |
---|---|
https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66580 | Broken Link Third Party Advisory |
https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66580 | Broken Link Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66580 - Broken Link, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.6 |
26 Jun 2023, 18:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 |
Information
Published : 2022-03-25 19:15
Updated : 2024-11-21 05:56
NVD link : CVE-2021-26622
Mitre link : CVE-2021-26622
CVE.ORG link : CVE-2021-26622
JSON object : View
Products Affected
genians
- genian_nac
microsoft
- windows