CVE-2021-21805
Advantech R-SeeNet vulnerability analysis and mitigation

Overview

An OS Command Injection vulnerability (CVE-2021-21805) was discovered in Advantech R-SeeNet version 2.4.12 (20.10.2020). The vulnerability exists in the ping.php script functionality of the software's web applications. R-SeeNet is a monitoring system used for Advantech routers that collects information from network routers and stores it in a SQL database (Talos Report).

Technical details

The vulnerability is present in the ping.php script where the hostname parameter from HTTP requests is processed without proper sanitization. The script accepts the hostname parameter via HTTP request and is accessible without any authorization. The parameter is directly used in a popen function without sanitization, making it vulnerable to OS Command Injection. The vulnerability has received a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating high severity across confidentiality, integrity, and availability impacts (NVD, Talos Report).

Impact

A successful exploitation of this vulnerability could allow an attacker to execute arbitrary OS commands on the affected system. The attack can be triggered by sending a specially crafted HTTP request to the target system, potentially leading to complete system compromise (Talos Report).

Mitigation and workarounds

Talos disclosed this vulnerability after the 90-day deadline passed without an official update from Advantech. Users are encouraged to update the affected products as soon as possible. Additionally, Snort rules 57290-57293, 57305-57309, 57338, and 57339 can detect exploitation attempts against this vulnerability (Talos Blog).

Additional resources


SourceThis report was generated using AI

Related Advantech R-SeeNet vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-5642CRITICAL9.8
  • Advantech R-SeeNetAdvantech R-SeeNet
  • cpe:2.3:a:advantech:r-seenet
NoYesOct 18, 2023
CVE-2023-2611CRITICAL9.8
  • Advantech R-SeeNetAdvantech R-SeeNet
  • cpe:2.3:a:advantech:r-seenet
NoYesJun 22, 2023
CVE-2022-3386CRITICAL9.8
  • Advantech R-SeeNetAdvantech R-SeeNet
  • cpe:2.3:a:advantech:r-seenet
NoYesOct 27, 2022
CVE-2023-3256HIGH8.1
  • Advantech R-SeeNetAdvantech R-SeeNet
  • cpe:2.3:a:advantech:r-seenet
NoYesJun 22, 2023
CVE-2022-3387MEDIUM5.3
  • Advantech R-SeeNetAdvantech R-SeeNet
  • cpe:2.3:a:advantech:r-seenet
NoYesOct 27, 2022

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management