A directory traversal vulnerability on Telos Z/IP One devices through 4.0.0r grants an unauthenticated individual root level access to the device's file system. This can be used to identify configuration settings, password hashes for built-in accounts, and the cleartext password for remote configuration of the device through the WebUI.
References
Link | Resource |
---|---|
https://sra.io/blog-post/ | Broken Link |
https://sra.io/blog/this-traversal-had-a-face-for-radio-cve-2020-17383/ | Exploit Patch Third Party Advisory |
https://www.telosalliance.com/downloads?search=software-updates#downloadListing | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-01-24T19:08:43
Updated: 2022-01-24T19:08:43
Reserved: 2020-08-07T00:00:00
Link: CVE-2020-17383
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-01-24T20:15:07.923
Modified: 2022-01-28T18:42:15.553
Link: CVE-2020-17383
JSON object: View
Redhat Information
No data.
CWE