9
CVSSv2

CVE-2021-40222

Published: 09/09/2021 Updated: 22/09/2021
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 802
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Rittal CMC PU III Web management Version affected: V3.11.00_2. Version fixed: V3.17.10 is affected by a remote code execution vulnerablity. It is possible to introduce shell code to create a reverse shell in the PU-Hostname field of the TCP/IP Configuration dialog. Web application fails to sanitize user input on Network TCP/IP configuration page. This allows the malicious user to inject commands as root on the device which will be executed once the data is received.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rittal cmc_pu_iii_7030.000_firmware

Github Repositories

Remote Code Execution at Rittal

CVE-2021-40222 Application: Rittal CMC PU III Web management Devices: CMC PU III 7030000 Software Revision: V31100_2 Hardware Revision: V300 Attack type: Remote Code Execution Solution: Update to Software Revision V31710 or later Summary: Web application fails to sanitize user input on Network TCP/IP configuration page This allows the attacker to inject commands as root

Remote Code Execution at Rittal

CVE-2021-40222 Application: Rittal CMC PU III Web management Devices: CMC PU III 7030000 Software Revision: V31100_2 Hardware Revision: V300 Attack type: Remote Code Execution Solution: Update to Software Revision V31710 or later Summary: Web application fails to sanitize user input on Network TCP/IP configuration page This allows the attacker to inject commands as root