Learn about CVE-2021-46704 affecting GenieACS 1.2.x, enabling unauthenticated OS command execution. Find mitigation steps and system protection strategies.
GenieACS 1.2.x before 1.2.8 is susceptible to unauthenticated OS command injection via the ping host argument, allowing attackers to execute arbitrary commands.
Understanding CVE-2021-46704
This CVE describes a vulnerability in GenieACS version 1.2.x that enables unauthenticated users to execute OS commands through the UI interface API.
What is CVE-2021-46704?
In GenieACS 1.2.x before 1.2.8, a security flaw in the UI interface API permits unauthenticated OS command injection via the ping host argument, originating from inadequate input validation and a missing authorization check.
The Impact of CVE-2021-46704
Technical Details of CVE-2021-46704
GenieACS 1.2.x is affected by a critical vulnerability as outlined below:
Vulnerability Description
The vulnerability in GenieACS 1.2.x allows unauthenticated users to perform OS command injection via the ping host argument due to insufficient input validation and authorization checks.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
To address CVE-2021-46704, consider the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates