Published:2022/03/15 Last Updated:2022/03/15
JVN#87751554
Multiple vulnerabilities in pfSense
Overview
pfSense contains multiple vulnerabilities.
Products Affected
CVE-2021-20729
- pfSense CE software versions 2.5.2 and earlier
- pfSense Plus software versions 21.05 and earlier
- pfSense CE software versions prior to 2.6.0
- pfSense Plus software versions prior to 22.01
Description
pfSense software provided by Netgate contains multiple vulnerabilities listed below.
- Cross-site scripting (CWE-79) - CVE-2021-20729
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Base Score: 6.1 CVSS v2 AV:N/AC:M/Au:N/C:N/I:P/A:N Base Score: 4.3 - Improper access control (CWE-284) - CVE-2022-26019
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Base Score: 7.2 CVSS v2 AV:N/AC:L/Au:S/C:C/I:C/A:C Base Score: 9.0 - Improper input validation (CWE-20) - CVE-2022-24299
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Base Score: 5.4 CVSS v2 AV:N/AC:L/Au:S/C:P/I:P/A:N Base Score: 5.5
Impact
- An arbitrary script may be executed on a user's web browser when following a malicious URL to visit the captive portal login page - CVE-2021-20729
- A user with the privilege to change NTP GPS settings may rewrite existing files on the file system, resulting to arbitrary command execution - CVE-2022-26019
- A user with the privilege to change OpenVPN client or server settings may execute arbitrary commands - CVE-2022-24299
Solution
Update the software
Update the software to the latest version according to the information provided by the developer.
Vendor Status
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Yutaka WATANABE of Ierae Security Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2021-20729 |
CVE-2022-26019 |
|
CVE-2022-24299 |
|
JVN iPedia |
JVNDB-2022-000020 |