The server-request receiver function of Shockwall system has an improper authentication vulnerability. An authenticated attacker of an agent computer within the local area network can use the local registry information to launch server-side request forgery (SSRF) attack on another agent computer, resulting in arbitrary code execution for controlling the system or disrupting service.
CVE Status: Modified
Attribute | Value |
---|---|
Attack Complexity | LOW |
Attack Vector | ADJACENT_NETWORK |
Availability Impact | HIGH |
Base Score | 8 |
Base Severity | HIGH |
Confidentiality Impact | HIGH |
Integrity Impact | HIGH |
Privileges Required | LOW |
Scope | UNCHANGED |
User Interaction | NONE |
Vector String | CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Exploitability Score | 2.1 |
Impact Score | 5.9 |
Source | [email protected] |
Type | Secondary |