Vulnerability Name: | CVE-2018-4021 (CCN-153727) | ||||||||||||
Assigned: | 2018-12-03 | ||||||||||||
Published: | 2018-12-03 | ||||||||||||
Updated: | 2022-06-07 | ||||||||||||
Summary: | An exploitable command injection vulnerability exists in the way Netgate pfSense CE 2.4.4-RELEASE processes the parameters of a specific POST request. The attacker can exploit this and gain the ability to execute arbitrary commands on the system. An attacker needs to be able to send authenticated POST requests to the administration web interface. Command injection is possible in the `powerd_battery_mode` POST parameter. | ||||||||||||
CVSS v3 Severity: | 7.2 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) 6.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
6.3 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-78 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-4021 Source: XF Type: UNKNOWN netgate-pfsense-cve20184021-cmd-exec(153727) Source: MISC Type: Exploit, Third Party Advisory https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690 Source: CCN Type: pfSense Web site pfSense Source: CCN Type: Talos Vulnerability Report TALOS-2018-0690 Netgate pfSense system_advanced_misc.php powerd_normal_mode remote command injection vulnerability | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |