
CVE-2021-45420 Scanner
CVE-2021-45420 Scanner - Arbitrary File Write vulnerability in Emerson Dixell XWEB-500
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
17 days 15 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
Emerson Dixell XWEB-500 is a system typically used in monitoring and managing refrigeration units and HVAC (Heating, Ventilation, and Air Conditioning) systems. It is utilized by various businesses such as retail stores, warehouses, and manufacturers to ensure the efficacy of their cooling systems. Contractors and building managers use these systems for real-time data logging, alarm notifications, and system performance analysis. The system interface allows users to remotely configure and monitor connected devices, providing critical insights into energy consumption and system diagnostics. Common in facilities that prioritize energy management and optimal equipment performance, Emerson Dixell XWEB-500 plays a vital role in operational efficiency. Its deployment supports the seamless integration of refrigeration management into larger building management systems.
Arbitrary File Write vulnerabilities occur when an attacker can write or overwrite arbitrary files on a system. This vulnerability in Emerson Dixell XWEB-500 is especially critical since no authentication is required to exploit it. Attackers can gain unauthorized access through specific CGI scripts within the system, such as "/cgi-bin/logo_extra_upload.cgi". Once access is obtained, they can write files to the system. Such vulnerabilities put the entire system at risk because it allows for further exploitation such as planting malware or modifying configuration files. Consequently, the vulnerability could lead to a complete system compromise if not addressed properly.
The Arbitrary File Write vulnerability present in Emerson Dixell XWEB-500 is specifically located in CGI scripts that do not properly validate access control. Critical endpoints include "/cgi-bin/logo_extra_upload.cgi", "/cgi-bin/cal_save.cgi", and "/cgi-bin/lo_utils.cgi". These scripts allow attackers to upload crafted files without the need for authentication. The vulnerability affects the file upload mechanism, where the data written to files is not adequately sanitized. This oversight leads to the ability to overwrite important system files, thus escalating the potential for further attacks such as remote command execution or data theft.
Exploiting this vulnerability could lead to several serious implications. The attacker might upload and execute malicious files, which can disrupt normal operations and compromise sensitive data. System integrity and availability can be jeopardized, potentially bringing critical processes reliant on HVAC and refrigeration to a halt. Sensitive infrastructure data might be accessed or deleted, resulting in data breaches. Additionally, compromised systems could become conduits for further attacks within the network.
REFERENCES