ID

VAR-202003-1764


CVE

CVE-2019-9507


TITLE

Vertiv Avocent UMG-4000 vulnerable to command injection and cross-site scripting vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#944837

DESCRIPTION

The web interface of the Vertiv Avocent UMG-4000 version 4.2.1.19 is vulnerable to command injection because the application incorrectly neutralizes code syntax before executing. Since all commands within the web application are executed as root, this could allow a remote attacker authenticated with an administrator account to execute arbitrary commands as root. The Vertiv Avocent Universal Management Gateway Model UMG-4000 is a data center management appliance. Vertiv Avocent UMG-4000 To OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. The product supports real-time management, monitoring, access and control of IT equipment and infrastructure

Trust: 2.88

sources: NVD: CVE-2019-9507 // CERT/CC: VU#944837 // JVNDB: JVNDB-2019-014981 // CNVD: CNVD-2020-25834

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-25834

AFFECTED PRODUCTS

vendor:vertivmodel:avocent umg-4000scope:eqversion:4.2.1.19

Trust: 2.4

vendor:vertivmodel: - scope: - version: -

Trust: 0.8

sources: CERT/CC: VU#944837 // CNVD: CNVD-2020-25834 // JVNDB: JVNDB-2019-014981 // NVD: CVE-2019-9507

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-9507
value: HIGH

Trust: 1.0

cret@cert.org: CVE-2019-9507
value: HIGH

Trust: 1.0

NVD: JVNDB-2019-014981
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-25834
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202003-1720
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2019-9507
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2019-014981
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-25834
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:L/AU:M/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-9507
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

cret@cert.org: CVE-2019-9507
baseSeverity: HIGH
baseScore: 8.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 5.5
version: 3.1

Trust: 1.0

NVD: JVNDB-2019-014981
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-25834 // JVNDB: JVNDB-2019-014981 // CNNVD: CNNVD-202003-1720 // NVD: CVE-2019-9507 // NVD: CVE-2019-9507

PROBLEMTYPE DATA

problemtype:CWE-95

Trust: 1.0

problemtype:CWE-77

Trust: 1.0

problemtype:CWE-78

Trust: 0.8

sources: JVNDB: JVNDB-2019-014981 // NVD: CVE-2019-9507

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202003-1720

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202003-1720

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-014981

PATCH

title:Avocent Universal Management Gateway Appliance Software Downloadsurl:https://www.vertiv.com/en-us/support/software-download/it-management/avocent-universal-management-gateway-appliance--software-downloads/

Trust: 0.8

title:Trellis Enterprise Software Downloadsurl:https://www.vertiv.com/en-us/support/software-download/software/trellis-enterprise-and-quick-start-solutions-software-downloads/

Trust: 0.8

title:Patch for Vertiv Avocent UMG-4000 Web Interface Operating System Command Injection Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/215971

Trust: 0.6

title:Vertiv Avocent UMG-4000 Web Fixing measures of interface operating system command injection vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=115359

Trust: 0.6

sources: CNVD: CNVD-2020-25834 // JVNDB: JVNDB-2019-014981 // CNNVD: CNNVD-202003-1720

EXTERNAL IDS

db:NVDid:CVE-2019-9507

Trust: 3.0

db:CERT/CCid:VU#944837

Trust: 1.4

db:JVNid:JVNVU91247183

Trust: 0.8

db:JVNDBid:JVNDB-2019-014981

Trust: 0.8

db:CNVDid:CNVD-2020-25834

Trust: 0.6

db:CNNVDid:CNNVD-202003-1720

Trust: 0.6

sources: CERT/CC: VU#944837 // CNVD: CNVD-2020-25834 // JVNDB: JVNDB-2019-014981 // CNNVD: CNNVD-202003-1720 // NVD: CVE-2019-9507

REFERENCES

url:https://www.vertiv.com/en-us/support/software-download/software/trellis-enterprise-and-quick-start-solutions-software-downloads/

Trust: 2.4

url:https://www.vertiv.com/en-us/support/software-download/it-management/avocent-universal-management-gateway-appliance--software-downloads/

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-9507

Trust: 1.4

url:https://www.vertiv.com/globalassets/documents/firmware/universal-management-gateway-release-notes-v4.3.0.23_vertiv_update.pdf https://www.vertiv.com/en-us/support/software-download/it-management/avocent-universal-management-gateway-appliance--software-downloads/

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/95.html

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.8

url:https://www.owasp.org/index.php/cross-site_scripting_(xss)#stored_and_reflected_xss_attacks

Trust: 0.8

url:https://cheatsheetseries.owasp.org/cheatsheets/os_command_injection_defense_cheat_sheet.html

Trust: 0.8

url:https://www.vertiv.com/globalassets/documents/firmware/universal-management-gateway-release-notes-v4.3.0.23_vertiv_update.pdf

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9507

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91247183/

Trust: 0.8

url:https://www.kb.cert.org/vuls/id/944837

Trust: 0.6

sources: CERT/CC: VU#944837 // JVNDB: JVNDB-2019-014981 // CNNVD: CNNVD-202003-1720 // NVD: CVE-2019-9507

SOURCES

db:CERT/CCid:VU#944837
db:CNVDid:CNVD-2020-25834
db:JVNDBid:JVNDB-2019-014981
db:CNNVDid:CNNVD-202003-1720
db:NVDid:CVE-2019-9507

LAST UPDATE DATE

2024-11-23T21:51:36.465000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#944837date:2020-03-30T00:00:00
db:CNVDid:CNVD-2020-25834date:2020-04-30T00:00:00
db:JVNDBid:JVNDB-2019-014981date:2020-04-01T00:00:00
db:CNNVDid:CNNVD-202003-1720date:2021-11-04T00:00:00
db:NVDid:CVE-2019-9507date:2024-11-21T04:51:45.423

SOURCES RELEASE DATE

db:CERT/CCid:VU#944837date:2020-03-30T00:00:00
db:CNVDid:CNVD-2020-25834date:2020-04-30T00:00:00
db:JVNDBid:JVNDB-2019-014981date:2020-04-01T00:00:00
db:CNNVDid:CNNVD-202003-1720date:2020-03-30T00:00:00
db:NVDid:CVE-2019-9507date:2020-03-30T22:15:14.180