- Description
- iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
- nvd@nist.gov
- CWE-78
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iwt:facesentry_access_control_system:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "EFE14646-6ED5-46DC-8A19-4F2358F784E5"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iwt:facesentry_access_control_system_firmware:5.7.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C64B12CF-265E-4FD8-9BCF-95843E5A885B"
},
{
"criteria": "cpe:2.3:o:iwt:facesentry_access_control_system_firmware:5.7.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A6913639-EBF7-4451-9052-71DB2B3DF925"
},
{
"criteria": "cpe:2.3:o:iwt:facesentry_access_control_system_firmware:6.4.8:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "26BA8B79-F65D-4D30-8827-B893F500BF8C"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]