CVE-2021-26622

An remote code execution vulnerability due to SSTI vulnerability and insufficient file name parameter validation was discovered in Genian NAC. Remote attackers are able to execute arbitrary malicious code with SYSTEM privileges on all connected nodes in NAC through this vulnerability.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:genians:genian_nac:*:*:*:*:*:*:*:*
cpe:2.3:a:genians:genian_nac:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

26 Jun 2023, 18:22

Type Values Removed Values Added
CWE CWE-20 CWE-94

31 Mar 2022, 13:20

Type Values Removed Values Added
CWE CWE-20
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:genians:genian_nac:*:*:*:*:*:*:*:*
References (MISC) https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66580 - (MISC) https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66580 - Broken Link, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 10.0
v3 : 10.0

25 Mar 2022, 19:44

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-25 19:15

Updated : 2024-02-04 22:29


NVD link : CVE-2021-26622

Mitre link : CVE-2021-26622

CVE.ORG link : CVE-2021-26622


JSON object : View

Products Affected

genians

  • genian_nac

microsoft

  • windows
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-20

Improper Input Validation