CERT-In Vulnerability Note
CIVN-2022-0363
Multiple Vulnerabilities in Tacitine Firewall
Original Issue Date:September 20, 2022
Severity Rating: CRITICAL
Software Affected
- Tacitine Firewall EN6200-PRIME QUAD-35 versions 19.1.1 to 22.20.1
- Tacitine Firewall EN6200-PRIME QUAD-100 versions 19.1.1 to 22.20.1
Overview
Multiple vulnerabilities have been reported in Tacitine Firewall, which could allow an unauthenticated remote attacker to execute arbitrary commands, perform session fixation and view sensitive information on the targeted device.
Description
These vulnerabilities exist in Tacitine Firewall due to improper control of code generation, session management and insecure design in the Tacitine Firewall web-based management interface. An unauthenticated remote attacker could exploit these vulnerabilities by sending specially crafted http requests on the targeted device.
Successful exploitation of these vulnerabilities could allow an unauthenticated remote attacker to execute arbitrary commands, perform session fixation and view sensitive information on the targeted device.
Credit
This vulnerability is reported by Sreedev Kumar from Crowe India.
Solution
Update Tacitine Firewall to the latest software version 22.21.2.
Vendor Information
Tacitine
https://tacitine.com/newdownload/CVE-2022-40628.pdf
https://tacitine.com/newdownload/CVE-2022-40629.pdf
https://tacitine.com/newdownload/CVE-2022-40630.pdf
References
Tacitine
https://tacitine.com/newdownload/CVE-2022-40628.pdf
https://tacitine.com/newdownload/CVE-2022-40629.pdf
https://tacitine.com/newdownload/CVE-2022-40630.pdf
CVE Name
CVE-2022-40628
CVE-2022-40629
CVE-2022-40630
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|