SB2023112112 - Multiple vulnerabilities in NEC Corporation EXPRESSCLUSTER X and EXPRESSCLUSTER SingleServerSafe 



SB2023112112 - Multiple vulnerabilities in NEC Corporation EXPRESSCLUSTER X and EXPRESSCLUSTER SingleServerSafe

Published: November 21, 2023

Security Bulletin ID SB2023112112
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 20% Medium 60% Low 20%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Missing Authorization (CVE-ID: CVE-2023-39544)

The vulnerability allows a remote attacker to bypass authorization checks.

The vulnerability exists due to missing authorization. A remote user can execute arbitrary commands on the system.


2) Files or Directories Accessible to External Parties (CVE-ID: CVE-2023-39545)

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to files or directories accessible to external parties. A local user can obtain files containing credentials via HTTP API.


3) Use of Password Hash Instead of Password for Authentication (CVE-ID: CVE-2023-39546)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to use of password hash instead of password for authentication. A remote attacker can perform a Pass The Hash attack and atempt to log in to the product's WebUI as an administrator.


4) Authentication Bypass by Capture-replay (CVE-ID: CVE-2023-39547)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to authentication bypass by capture-replay. A remote attacker on the local network can gain access to sensitive information such as configuration files.


5) Arbitrary file upload (CVE-ID: CVE-2023-39548)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload. A remote attacker can upload a malicious file and execute it on the server.


Remediation

Install update from vendor's website.