Description
The server-request receiver function of Shockwall system has an improper authentication vulnerability. An authenticated attacker of an agent computer within the local area network can use the local registry information to launch server-side request forgery (SSRF) attack on another agent computer, resulting in arbitrary code execution for controlling the system or disrupting service.
No analysis available yet.
Remediation
Vendor Solution
Contact tech support from SUN & MOON RISE CO., LTD.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-32632 | The server-request receiver function of Shockwall system has an improper authentication vulnerability. An authenticated attacker of an agent computer within the local area network can use the local registry information to launch server-side request forgery (SSRF) attack on another agent computer, resulting in arbitrary code execution for controlling the system or disrupting service. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-5433-77f6f-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-16T20:32:34.721Z
Reserved: 2021-12-29T00:00:00.000Z
Link: CVE-2021-45917
No data.
Status : Modified
Published: 2022-01-03T10:15:08.390
Modified: 2024-11-21T06:33:16.283
Link: CVE-2021-45917
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD