← Back to CVEs
CVE-2020-11733
MEDIUM6.7
Description
An issue was discovered on Spirent TestCenter and Avalanche appliance admin interface firmware. An attacker, who already has access to an SSH restricted shell, can achieve root access via shell metacharacters. The attacker can then, for example, read sensitive files such as appliance admin configuration source code. This affects Spirent TestCenter and Avalanche products which chassis version <= 5.08. The SSH restricted shell is available with default credentials.
CVE Details
CVSS v3.1 Score6.7
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published8/13/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
spirent:avalanchespirent:c100-mpspirent:testcenter
Weaknesses (CWE)
CWE-78
References
https://gist.github.com/a05110511t/65d07bc776d7c11b4ccf112a09cca4ab(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/a05110511t/CVE/blob/master/CVE-2020-11733.md(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.