Description
The affected On-Premise cnMaestro is vulnerable to an arbitrary file-write through improper limitation of a pathname to a restricted directory inside a specific route. If an attacker supplied path traversal charters (../) as part of a filename, the server will save the file where the attacker chooses. This could allow an attacker to write any data to any file in the server.
Published: 2022-05-17
Score: 5.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Cambium Networks recommends affected users apply one of the following upgrade packages: 3.0.3-r32 2.4.2-r29 3.0.0-r34 The security patches are available from Cambium Networks support (login required). For users of cnMaestro Cloud, these vulnerabilities have been patched by Cambium Networks and no further action is required.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-24680 The affected On-Premise cnMaestro is vulnerable to an arbitrary file-write through improper limitation of a pathname to a restricted directory inside a specific route. If an attacker supplied path traversal charters (../) as part of a filename, the server will save the file where the attacker chooses. This could allow an attacker to write any data to any file in the server.
History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Cambiumnetworks Cnmaestro
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:20:28.857Z

Reserved: 2022-04-14T00:00:00.000Z

Link: CVE-2022-1359

cve-icon Vulnrichment

Updated: 2024-08-03T00:03:05.994Z

cve-icon NVD

Status : Modified

Published: 2022-05-17T21:15:08.040

Modified: 2024-11-21T06:40:34.137

Link: CVE-2022-1359

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses