Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-44458 : Security Advisory and Response

Learn about CVE-2021-44458 impacting Linux users running Lens 5.2.6 and earlier. Discover the high-severity vulnerability allowing remote code execution via malicious websites.

Linux users running Lens 5.2.6 and earlier versions are at risk of remote code execution by visiting malicious websites. The lack of websocket authentication in Lens allows attackers to compromise user terminals.

Understanding CVE-2021-44458

Lens, a product by Mirantis, is affected by a high-severity vulnerability that enables remote code execution.

What is CVE-2021-44458?

CVE-2021-44458 is the CVE ID assigned to the vulnerability in Lens versions 5.2.6 and below. Attackers can exploit this issue by establishing websocket connections from a victim's browser to Lens, gaining control over the local terminal feature.

The Impact of CVE-2021-44458

        Severity: High
        CVSS Base Score: 8.3
        Attack Vector: Network
        Availability Impact: High
        Confidentiality Impact: High
        Integrity Impact: High
        Privileges Required: None
        User Interaction: Required
        Scope: Changed
        Vulnerability Type: Improper Authentication (CWE-287)
        Affected Platforms: Linux

Technical Details of CVE-2021-44458

The following technical details outline the vulnerability in Lens.

Vulnerability Description

        The lack of websocket authentication in Lens allows malicious websites to establish connections and execute commands as the Lens user.

Affected Systems and Versions

Lens version 5.2.6 and earlier on Linux platforms are affected by this vulnerability.

Exploitation Mechanism

Attackers can exploit this vulnerability by tricking users into visiting a malicious website, enabling them to connect to Lens and execute arbitrary commands remotely.

Mitigation and Prevention

To address the CVE-2021-44458 vulnerability, consider the following mitigation strategies.

Immediate Steps to Take

        Upgrade Lens to version 5.2.7 or higher to patch the vulnerability.
        Avoid visiting untrusted websites while using vulnerable versions of Lens.
        Monitor network connections for any unauthorized websocket communication.

Long-Term Security Practices

        Implement strict access controls and authentication mechanisms for websockets.
        Regularly update and patch software to prevent security vulnerabilities.

Patching and Updates

        Ensure timely installation of security updates and follow best practices for secure software deployment.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now