Advisory Details

September 17th, 2024

Cohesive Networks VNS3 Command Injection Remote Code Execution Vulnerability

ZDI-24-1233
ZDI-CAN-24178

CVE ID CVE-2024-8809
CVSS SCORE 8.8, AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Cohesive Networks
AFFECTED PRODUCTS VNS3
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cohesive Networks VNS3. Authentication is required to exploit this vulnerability.

The specific flaw exists within the web service, which listens on TCP port 8000 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.

ADDITIONAL DETAILS Cohesive Networks has issued an update to correct this vulnerability. More details can be found at:
https://cohesive.net/support/security-responses/
DISCLOSURE TIMELINE
  • 2024-07-25 - Vulnerability reported to vendor
  • 2024-09-17 - Coordinated public release of advisory
  • 2024-09-17 - Advisory Updated
CREDIT Mehmet INCE (@mdisec) from PRODAFT.com
BACK TO ADVISORIES