Vendor: Silver Peak Vendor URL: https://www.silver-peak.com Versions affected: All EdgeConnect OS versions prior to 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, and 188.8.131.52. Systems Affected: Unity EdgeConnect Appliance & Orchestrator CVE Identifier: CVE-2020-12148 (nslookup API), CVE-2020-12148 (Management File Upload) Advisory URL: https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_command_injection_mgmt_file_upload_cve_2020_12149-1.pdf, https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_command_injection_via_api_cve_2020_12148-1.pdf Risk: Medium – 6.8 (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H) (nsLookup API) Risk: Medium – 6.8 (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H) (Management file upload) Authors: Alexander Smye, Jonathan Letham
Silver Peak’s Unity EdgeConnect offering enables customers to easily setup and manage virtual networks using SD-WAN (Software Defined Wide Area Networking). At a high level it consists of physical or virtual EdgeConnect appliances and the Orchestrator management platform. The EdgeConnect appliances are essentially network devices that are installed at various remote sites within the customer’s estate. These devices connect to each other using encrypted transport tunnels allowing customers to connect remote sites with a virtualised network. The Orchestrator management platform is used to manage these EdgeConnect devices and the virtual network that sits on top of them.
Two command injection vulnerabilities were discovered in separate locations within the EdgeConnect device software. Both of these vulnerabilities could allow an attacker with credentials for the Orchestrator or local EdgeConnect device credentials to inject arbitrary OS commands which would be executed with elevated privileges. An attacker could exploit this vulnerability to establish an interactive channel with the device, effectively taking full control of the target device.
CVE-2020-12148 (nslookup API) – The EdgeConnect devices contain a feature which is used to perform an nslookup of an arbitrary hostname. This is intended to be used to test network connectivity and configuration. By using a specially crafted payload it was possible to inject arbitrary OS commands. This was possible from either the local web server running on the EdgeConnect device, or the Orchestrator management platform.
CVE-2020-12148 (Management File Upload) – The EdgeConnect devices have the ability to backup and restore their configuration to and from files supplied by a user. The EdgeConnect software was found to directly incorporate the filename of the uploaded file in a subsequent shell command. As a result, it was possible to craft a file with a malicious filename containing arbitrary OS commands which would be executed upon file upload. This was possible from either the local web server running on the EdgeConnect device, or the Orchestrator management platform.
Upgrade EdgeConnect appliance software to ECOS 184.108.40.206+, 220.127.116.11+, 18.104.22.168+, 22.214.171.124+, 126.96.36.199+, or 188.8.131.52+
01-10-2020 – Advisory disclosed to Silver Peak 08-10-2020 - Confirmation that Silver Peak are currently fixing issues and will apply a fix in a software update 11-12-2020 - Security advisory published by Silver Peak Vulnerability fixed in software update