Share: Email | Twitter

ID

VDE-2021-057

Published

2021-12-08 13:03 (CET)

Last update

2022-03-28 13:03 (CEST)

Vendor(s)

Helmholz GmbH & Co. KG

Product(s)

Article No° Product Name Affected Version(s)
shDialup <= 3.9R0.0

Summary

Multiple Vulnerabilities in a software service of shDIALUP can lead to arbitrary code execution due to improper privilege management.

Update A, 2022-03-28

  • Updated CVSS score from CVE-2021-33527 from 7.8 to 9.8 due to new information about the vulnerability

Vulnerabilities



Last Update
Nov. 17, 2022, 10:47 a.m.
Weakness
Improper Input Validation (CWE-20)
Summary
In MB connect line mbDIALUP versions <= 3.9R0.0 a remote attacker can send a specifically crafted HTTP request to the service running with NT AUTHORITY\SYSTEM that will not correctly validate the input. This can lead to an arbitrary code execution with the privileges of the service.
Last Update
Nov. 17, 2022, 10:47 a.m.
Weakness
Improper Privilege Management (CWE-269)
Summary
In MB connect line mbDIALUP versions <= 3.9R0.0 a low privileged local attacker can send a command to the service running with NT AUTHORITY\SYSTEM instructing it to execute a malicous OpenVPN configuration resulting in arbitrary code execution with the privileges of the service.

Impact

Please consult the CVE entries.

Solution

Update shDialup to 3.9R0.5

Reported by

Noam Moshe of Claroty reported this vulnerability to MB connect line GmbH.

CERT@VDE coordinated.