Published:2021/08/17  Last Updated:2021/08/17

JVN#41646618
Huawei EchoLife HG8045Q vulnerable to OS command injection

Overview

EchoLife HG8045Q provided by Huawei contains an OS command injection vulnerability.

Products Affected

  • Hardware model: HG8045Q
    • Software version: V300R016C00SPC110
    • Software version: V300R018C10

Description

EchoLife HT8045Q provided by Huawei is an ONT (Optical Network Terminal) device.
It is equipped with the command line interface for network operators' maintenance purpose, which is disabled by default.
When the command line interface is enabled, operators can interact with a certain restricted set of commands.
The command-line interface fails to process properly a certain crafted inputs, which enables some BusyBox-implemented commands executed (CWE-78).

Impact

When the command line interface is enabled, an administrator user may execute a certain set of OS commands on the device.

Solution

Update the Software
Update the software to the latest version according to the information provided by the developer. The developer has released the following version that addresses the vulnerability.

  • Software version: V300R016C00SPC130 (for V300R016C00SPC110)
  • Software version: R18C10SPC152 (for V300R018C10)

Vendor Status

Vendor Link
HUAWEI TECHNOLOGIES CO., LTD. HUAWEI

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score: 6.8
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:A/AC:L/Au:S/C:C/I:C/A:C
Base Score: 7.7
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2021-37028
JVN iPedia JVNDB-2021-000077