An remote code execution vulnerability due to SSTI vulnerability and insufficient file name parameter validation was discovered in Genian NAC. Remote attackers are able to execute arbitrary malicious code with SYSTEM privileges on all connected nodes in NAC through this vulnerability.
References
Link | Resource |
---|---|
https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66580 | Broken Link Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
26 Jun 2023, 18:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 |
31 Mar 2022, 13:20
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-20 | |
CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:genians:genian_nac:*:*:*:*:*:*:*:* |
|
References | (MISC) https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66580 - Broken Link, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 10.0 |
25 Mar 2022, 19:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-03-25 19:15
Updated : 2024-02-04 22:29
NVD link : CVE-2021-26622
Mitre link : CVE-2021-26622
CVE.ORG link : CVE-2021-26622
JSON object : View
Products Affected
genians
- genian_nac
microsoft
- windows