NetEx HyperIP 6.1.0 Post-Auth Remote Command Execution Vulnerability
NetEx HyperIP 6.1.0 Post-Auth Remote Command Execution Vulnerability
Release date:
Updated on:
Affected Systems:
NetEx HyperIP 6.1.0
Unaffected system:
NetEx HyperIP 6.1.1
Description:
HyperIP is a WAN-optimized virtual device. You can deploy a HyperIP to copy, back up, recover, and migrate data from a data center.
HyperIP has a remote command execution vulnerability. The vulnerability is caused by setting the set_val parameter as a malformed construction parameter when Post-Auth is sent through HTTP/HTTPS, which can cause remote command execution. Attackers can exploit this vulnerability to remotely execute commands or gain control over the server.
<* Source: vendor
*>
Suggestion:
Vendor patch:
NetEx
-----
In view of the currently available conceptual verification code on the network, and the NetEx official release has released the latest version to fix the above vulnerability, the affected users should update and upgrade as soon as possible for protection.
Download connection:
Http://www.netex.com/hyperip