SB2020072919 - Improper Authorization in Huawei FusionCompute 



SB2020072919 - Improper Authorization in Huawei FusionCompute

Published: July 29, 2020 Updated: August 24, 2020

Security Bulletin ID SB2020072919
Severity
Medium
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 13% Medium 25% Low 63%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Improper Authorization (CVE-ID: CVE-2020-9248)

The vulnerability allows a local user to bypass authorization checks.

The vulnerability exists due to the affected module does not verify some input correctly and authorizes files with incorrect access. A local administrator can launch privilege escalation attack.


2) Information disclosure (CVE-ID: CVE-2020-9229)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A local administrator can gain unauthorized access to sensitive information on the system.


3) Information disclosure (CVE-ID: CVE-2020-9228)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote attacker can gain unauthorized access to sensitive information on the system.


4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-9078)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.


5) Improper access control (CVE-ID: CVE-2020-9236)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to a module interface of the impacted product does not deal with some operations properly. A remote authenticated attacker can bypass implemented security restrictions and perform malicious operation to compromise module service.


6) OS Command Injection (CVE-ID: CVE-2020-9242)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A remote administrator can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Improper Authentication (CVE-ID: CVE-2020-9233)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests. A remote attacker can bypass authentication process to delete some files and cause some services abnormal.


8) Information disclosure (CVE-ID: CVE-2020-9246)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a module does not launch strict access control and information protection. An authenticated attacker on the local network can gain unauthorized access to sensitive information on the system.


Remediation

Install update from vendor's website.