JVN#41646618
Huawei EchoLife HG8045Q vulnerable to OS command injection
Overview
EchoLife HG8045Q provided by Huawei contains an OS command injection vulnerability.
Products Affected
- Hardware model: HG8045Q
- Software version: V300R016C00SPC110
- Software version: V300R018C10
Description
EchoLife HT8045Q provided by Huawei is an ONT (Optical Network Terminal) device.
It is equipped with the command line interface for network operators' maintenance purpose, which is disabled by default.
When the command line interface is enabled, operators can interact with a certain restricted set of commands.
The command-line interface fails to process properly a certain crafted inputs, which enables some BusyBox-implemented commands executed (CWE-78).
Impact
When the command line interface is enabled, an administrator user may execute a certain set of OS commands on the device.
Solution
Update the Software
Update the software to the latest version according to the information provided by the developer. The developer has released the following version that addresses the vulnerability.
- Software version: V300R016C00SPC130 (for V300R016C00SPC110)
- Software version: R18C10SPC152 (for V300R018C10)
Vendor Status
Vendor | Link |
HUAWEI TECHNOLOGIES CO., LTD. | HUAWEI |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2021-37028 |
JVN iPedia |
JVNDB-2021-000077 |