CVE-2020-12149

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all ECOS versions prior to: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*
OR cpe:2.3:a:arubanetworks:vx-1000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-2000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-3000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-500:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-5000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-6000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-7000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-8000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-9000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-10700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-11700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-1700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-2700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-3700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-5700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-6700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-7700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-8700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-9700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:unity_edgeconnect:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:59

Type Values Removed Values Added
References () https://www.silver-peak.com/support/user-documentation/security-advisories - Vendor Advisory () https://www.silver-peak.com/support/user-documentation/security-advisories - Vendor Advisory

07 Nov 2023, 21:16

Type Values Removed Values Added
First Time Arubanetworks nx-5700
Arubanetworks vx-7000
Arubanetworks vx-1000
Arubanetworks vx-2000
Arubanetworks nx-3700
Arubanetworks nx-10700
Arubanetworks nx-6700
Arubanetworks nx-2700
Arubanetworks vx-9000
Arubanetworks nx-1700
Arubanetworks nx-9700
Arubanetworks nx-7700
Arubanetworks vx-3000
Arubanetworks nx-8700
Arubanetworks vx-5000
Arubanetworks nx-11700
Arubanetworks vx-500
Arubanetworks vx-6000
Arubanetworks nx-700
Arubanetworks vx-8000
CPE cpe:2.3:h:silver-peak:nx-8700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-2000:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-1700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-5700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-3000:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-5000:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-1000:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-9000:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-10700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-7700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-3700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-11700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-500:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-2700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-8000:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-6700:-:*:*:*:*:*:*:*
cpe:2.3:h:silver-peak:nx-9700:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-7000:-:*:*:*:*:*:*:*
cpe:2.3:a:silver-peak:vx-6000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-2000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-3700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-9700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-10700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-9000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-11700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-8700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-3000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-6000:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-8000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-2700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-500:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-5000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-7700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-1700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-7000:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-5700:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:nx-6700:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:vx-1000:-:*:*:*:*:*:*:*

07 Nov 2023, 20:49

Type Values Removed Values Added
First Time Arubanetworks
Arubanetworks edgeconnect Enterprise
CPE cpe:2.3:a:silver-peak:ecos:*:*:*:*:*:*:*:* cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*

Information

Published : 2020-12-11 16:15

Updated : 2024-12-12 18:27


NVD link : CVE-2020-12149

Mitre link : CVE-2020-12149

CVE.ORG link : CVE-2020-12149


JSON object : View

Products Affected

arubanetworks

  • nx-9700
  • vx-5000
  • edgeconnect_enterprise
  • vx-2000
  • nx-7700
  • vx-8000
  • vx-3000
  • nx-2700
  • vx-1000
  • nx-3700
  • nx-10700
  • nx-8700
  • vx-9000
  • vx-500
  • vx-7000
  • nx-11700
  • vx-6000
  • nx-5700
  • nx-1700
  • nx-6700
  • nx-700

silver-peak

  • unity_edgeconnect
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')