Vulnerability Details : CVE-2020-11733
An issue was discovered on Spirent TestCenter and Avalanche appliance admin interface firmware. An attacker, who already has access to an SSH restricted shell, can achieve root access via shell metacharacters. The attacker can then, for example, read sensitive files such as appliance admin configuration source code. This affects Spirent TestCenter and Avalanche products which chassis version <= 5.08. The SSH restricted shell is available with default credentials.
Products affected by CVE-2020-11733
- cpe:2.3:a:spirent:avalanche:*:*:*:*:*:*:*:*
- cpe:2.3:a:spirent:testcenter:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-11733
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 11 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-11733
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
6.7
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.8
|
5.9
|
NIST |
CWE ids for CVE-2020-11733
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-11733
-
https://gist.github.com/a05110511t/65d07bc776d7c11b4ccf112a09cca4ab
Spirent TestCenter and Avalanche Products Privilege Escalation · GitHubThird Party Advisory
-
https://github.com/a05110511t/CVE/blob/master/CVE-2020-11733.md
CVE/CVE-2020-11733.md at master · a05110511t/CVE · GitHubThird Party Advisory
Jump to