Advisory Details

June 26th, 2017

ARRIS VAP2500 config_wds Command Injection Remote Code Execution Vulnerability

ZDI-16-691
ZDI-CAN-3868

CVE ID
CVSS SCORE 9.0, AV:N/AC:L/Au:S/C:C/I:C/A:C
AFFECTED VENDORS ARRIS
AFFECTED PRODUCTS VAP2500
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['24325']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ARRIS VAP2500. Authentication is required to exploit this vulnerability.

The specific flaw exists within the handling of the various txt_mac parameters provided to the config_wds.php management portal page. The issue lies in the failure to properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of root.

ADDITIONAL DETAILS


"ARRIS has taken the security vulnerabilities reported by the Zero Day Initiative for the ARRIS VAP2500 product seriously. The ARRIS VAP2500 product team worked quickly to develop a software update to resolve the reported vulnerabilities and shared the update with our service provider customers in October, 2016. As with many of the products we make, this update ultimately is delivered to the end user's equipment by their respective service provider. The reported vulnerabilities did not compromise video content or end users' personal data, but could have the potential to cause device stability problems in some unlikely circumstances."


DISCLOSURE TIMELINE
  • 2016-08-09 - Vulnerability reported to vendor
  • 2017-06-26 - Coordinated public release of advisory
CREDIT Ricky "HeadlessZeke" Lawshae
BACK TO ADVISORIES