search menu icon-carat-right cmu-wordmark

CERT Coordination Center

IntelliCom NetBiter NB100 and NB200 platforms contain multiple vulnerabilities

Vulnerability Note VU#114560

Original Release Date: 2011-02-03 | Last Revised: 2011-02-23

Overview

IntelliCom NetBiter products based on the NB100 and NB200 platforms contain multiple vulnerabilities.

Description

IntelliCom NetBiter products based on the NB100 and NB200 platforms contain multiple vulnerabilities. A user who has been authenticated at the superadmin level (highest authentication level) has permission to read system files by calling read.cgi with options to read a system file. Local configuration files may be accessed by exploiting a directory traversal vulnerability. This may lead an attacker to research other potential attack vectors. An attacker may also execute arbitrary commands by uploading malicious code.

For additional information see ICS-CERT Advisory ICSA-10-316-01A.

Impact

An attacker who is authenticated at the superadmin level exploiting this directory traversal vulnerability could access local configuration files. An attacker may also execute arbitrary commands by uploading malicious code.

Solution

Apply an update

IntelliCom recommends users of WS100/WS200 products apply the "ISFR-4404-0010.npb” patch.

Restrict Access

Enable firewall rules to restrict access to only trusted sources.

Vendor Information

114560
 
Affected   Unknown   Unaffected

IntelliCom Innovation AB

Updated:  January 19, 2011

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

This document was written by Michael Orlando.

Other Information

CVE IDs: None
Severity Metric: 1.68
Date Public: 2010-10-01
Date First Published: 2011-02-03
Date Last Updated: 2011-02-23 16:43 UTC
Document Revision: 28

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.