The web service for ONS-S8 - Spectra Aggregation Switch includes functions which do not properly validate user input, allowing an attacker to traverse directories, bypass authentication, and execute remote code.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-39277 The web service for ONS-S8 - Spectra Aggregation Switch includes functions which do not properly validate user input, allowing an attacker to traverse directories, bypass authentication, and execute remote code.
Fixes

Solution

No solution given by the vendor.


Workaround

Optigo Networks recommends users always use a unique management VLAN for the port on the ONS-S8 that is used to connect to OneView. Optigo Networks also recommends users implement at least one of the following additional mitigations: * Use a dedicated NIC on the BMS computer and exclusively this computer for connecting to OneView to manage your OT network configuration. * Set up a router firewall with a white list for the devices permitted to access OneView. * Connect to OneView via secure VPN.

History

Fri, 04 Oct 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Optigo
Optigo ons-s8 Firmware
CPEs cpe:2.3:o:optigo:ons-s8_firmware:*:*:*:*:*:*:*:*
Vendors & Products Optigo
Optigo ons-s8 Firmware
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 03 Oct 2024 22:30:00 +0000

Type Values Removed Values Added
Description The web service for ONS-S8 - Spectra Aggregation Switch includes functions which do not properly validate user input, allowing an attacker to traverse directories, bypass authentication, and execute remote code.
Title Optigo Networks ONS-S8 Spectra Aggregation Switch PHP Remote File Inclusion
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-10-04T14:25:26.785Z

Reserved: 2024-09-16T16:21:37.465Z

Link: CVE-2024-41925

cve-icon Vulnrichment

Updated: 2024-10-04T14:25:22.682Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-03T23:15:02.970

Modified: 2024-10-04T13:50:43.727

Link: CVE-2024-41925

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses