{"containers":{"cna":{"affected":[{"product":"ECOS","vendor":"Silver Peak Systems, Inc.","versions":[{"status":"affected","version":"All current ECOS versions prior to 8.1.9.15"},{"status":"affected","version":"8.3.0.8"},{"status":"affected","version":"8.3.1.2"},{"status":"affected","version":"8.3.2.0"},{"status":"affected","version":"9.0.2.0"},{"status":"affected","version":"and 9.1.0.0"}]}],"credits":[{"lang":"en","value":"This vulnerability was reported to Silver Peak by Alexander Smye and Jonathan Letham from the security team at NCC Group."}],"datePublic":"2020-11-30T00:00:00.000Z","descriptions":[{"lang":"en","value":"A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-78","description":"CWE-78 OS Command Injection","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2020-12-15T16:13:57.000Z","orgId":"83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c","shortName":"Silver Peak"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.silver-peak.com/support/user-documentation/security-advisories"}],"source":{"advisory":"2020-11-15-01-001","discovery":"EXTERNAL"},"title":"OS Command Injection - nslookup API","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"sirt@silver-peak.com","DATE_PUBLIC":"2020-11-30T17:30:00.000Z","ID":"CVE-2020-12148","STATE":"PUBLIC","TITLE":"OS Command Injection - nslookup API"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"ECOS","version":{"version_data":[{"version_value":"All current ECOS versions prior to 8.1.9.15"},{"version_value":"8.3.0.8"},{"version_value":"8.3.1.2"},{"version_value":"8.3.2.0"},{"version_value":"9.0.2.0"},{"version_value":"and 9.1.0.0"}]}}]},"vendor_name":"Silver Peak Systems, Inc."}]}},"credit":[{"lang":"eng","value":"This vulnerability was reported to Silver Peak by Alexander Smye and Jonathan Letham from the security team at NCC Group."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to : 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"}]},{"description":[{"lang":"eng","value":"CWE-78 OS Command Injection"}]}]},"references":{"reference_data":[{"name":"https://www.silver-peak.com/support/user-documentation/security-advisories","refsource":"MISC","url":"https://www.silver-peak.com/support/user-documentation/security-advisories"}]},"source":{"advisory":"2020-11-15-01-001","discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T11:48:58.361Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.silver-peak.com/support/user-documentation/security-advisories"}]}]},"cveMetadata":{"assignerOrgId":"83cc1b1a-46b0-4ac1-94f2-bbef3319bc4c","assignerShortName":"Silver Peak","cveId":"CVE-2020-12148","datePublished":"2020-12-11T15:24:23.056Z","dateReserved":"2020-04-24T00:00:00.000Z","dateUpdated":"2024-09-16T23:05:48.430Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}