search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Vertiv Avocent UMG-4000 vulnerable to command injection and cross-site scripting vulnerabilities

Vulnerability Note VU#944837

Original Release Date: 2020-03-30 | Last Revised: 2020-03-30

Overview

The Vertiv Avocent Universal Management Gateway Model UMG-4000 is a data center management appliance. The web interface of the UMG-4000 is vulnerable to command injection, stored cross-site scripting (XSS), and reflected XSS, which may allow an authenticated attacker with administrative privileges to remotely execute arbitrary code.

Description

The Vertiv Avocent UMG-4000 contains multiple vulnerabilities that could allow an authenticated attacker with administrative privileges to remotely execute arbitrary code. The web interface does not sanitize input provided from the remote client, making it vulnerable to command injection, stored cross-site scripting, and reflected cross-site scripting.

CVE-2019-9507 - CWE-95
The web interface of the Avocent UMG-4000 version 4.2.1.19 is vulnerable to command injection because the application incorrectly neutralizes code syntax before executing. Since all commands within the web application are executed as root, this could allow a remote attacker authenticated with an administrator account to execute arbitrary commands. The CVSS 2.0 score below is based on CVE-2019-9507.

CVE-2019-9508 - CWE-79
The web interface of the Avocent UMG-4000 version 4.2.1.19 is vulnerable to stored XSS. A remote attacker authenticated with an administrator account could store a maliciously named file within the web application that would execute each time a user browsed to the page.

CVE-2019-9509 - CWE-79
The web interface of the Avocent UMG-4000 version 4.2.1.19 is vulnerable to reflected XSS in an HTTP POST parameter. The web application does not neutralize user-controllable input before displaying to users in a web page, which could allow a remote attacker authenticated with a user account to execute arbitrary code.

Impact

An authenticated remote attacker could inject arbitrary scripts or persistently store malicious scripts on the web server that could be used to collect and exfiltrate sensitive information.

Solution

Apply an update

Vertiv Avocent has addressed these issues in the below versions:

Non-Trellis customers are encouraged to install Universal Management Gateway firmware version 4.2.2.21 or higher to address these vulnerabilities, located here.
Trellis users of the Universal Management Gateway running firmware version 4.2.0.23 that are operating Trellis versions 5.0.2 through 5.0.6 should install the update patch located here.
Trellis users of the Universal Management Gateway that are operating Trellis versions 5.0.6 and later should install Universal Gateway firmware version 4.3.0.23 located here.

Vendor Information

944837
 

Vertiv Affected

Notified:  February 28, 2019 Updated: March 23, 2020

Statement Date:   January 07, 2020

Status

Affected

Vendor Statement

Vertiv (Avocent) has addressed these issues.

    Non-Trellis customers are encouraged to install Universal Management Gateway firmware version 4.2.2.21 or higher to address these vulnerabilities, located here.
    Trellis users of the Universal Management Gateway running firmware version 4.2.0.34 that are operating Trellis versions 5.0.2 through 5.0.6 should install the update patch located here.
    Trellis users of the Universal Management Gateway that are operating Trellis versions 5.0.6 and later should install Universal Gateway firmware version 4.3.0.23 located here.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References


CVSS Metrics

Group Score Vector
Base 8.5 AV:N/AC:M/Au:S/C:C/I:C/A:C
Temporal 6.7 E:POC/RL:OF/RC:C
Environmental 6.7 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Acknowledgements

This document was written by Laurie Tyzenhaus.

Other Information

CVE IDs: CVE-2019-9507, CVE-2019-9508, CVE-2019-9509
Date Public: 2019-04-12
Date First Published: 2020-03-30
Date Last Updated: 2020-03-30 17:38 UTC
Document Revision: 94

Sponsored by CISA.