CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."
References
Link | Resource |
---|---|
https://github.com/roughb8722/CVE-2021-3122-Details/blob/main/CVE-2021-3122 | Third Party Advisory |
https://rdf2.alohaenterprise.com/client/CMCInst.zip | Third Party Advisory |
https://www.tetradefense.com/incident-response-services/active-exploit-a-remote-code-execution-rce-vulnerability-for-ncr-aloha-point-of-sale/ | Third Party Advisory |
https://github.com/roughb8722/CVE-2021-3122-Details/blob/main/CVE-2021-3122 | Third Party Advisory |
https://rdf2.alohaenterprise.com/client/CMCInst.zip | Third Party Advisory |
https://www.tetradefense.com/incident-response-services/active-exploit-a-remote-code-execution-rce-vulnerability-for-ncr-aloha-point-of-sale/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/roughb8722/CVE-2021-3122-Details/blob/main/CVE-2021-3122 - Third Party Advisory | |
References | () https://rdf2.alohaenterprise.com/client/CMCInst.zip - Third Party Advisory | |
References | () https://www.tetradefense.com/incident-response-services/active-exploit-a-remote-code-execution-rce-vulnerability-for-ncr-aloha-point-of-sale/ - Third Party Advisory |
Information
Published : 2021-02-07 20:15
Updated : 2024-11-21 06:20
NVD link : CVE-2021-3122
Mitre link : CVE-2021-3122
CVE.ORG link : CVE-2021-3122
JSON object : View
Products Affected
ncr
- command_center_agent
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')