Overview
- Description
- Vulnerability in rconfig “remote_text_file” enables an attacker with user level access to the CLI to inject user level commands into Fidelis Network and Deception CommandPost, Collector, Sensor, and Sandbox components as well as neighboring Fidelis components. The vulnerability is present in Fidelis Network and Deception versions prior to 9.4.5. Patches and updates are available to address this vulnerability.
- Source
- security@fidelissecurity.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:fidelissecurity:deception:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B47023FD-5C7C-4A2C-BFF7-7800FB6A33FF", "versionEndExcluding": "9.4.5" }, { "criteria": "cpe:2.3:a:fidelissecurity:network:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AF6ED2D-5AB3-4D21-AF34-9F0F517C46DD", "versionEndExcluding": "9.4.5" } ], "operator": "OR" } ] } ]