Python Code Injection in Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1
CVE-2020-15348
9.8CRITICAL
Summary
Zyxel CloudCNM SecuManager versions 3.1.0 and 3.1.1 are susceptible to a code injection vulnerability that allows attackers to execute arbitrary Python code. By exploiting the endpoint for deleting CPEs by IDs, unauthorized users can manipulate the eval function, leading to potential system compromise. It is crucial for users of the affected versions to apply the necessary security updates to mitigate this risk.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved