EIP-2015-0022
An arbitrary file read vulnerability has been found in NEC EXPRESSCLUSTER X that can allow an attacker to read files off the target system. The Transaction Server (clptrnsv.exe) is a system service configured to utilize port 29002 by default to facilitate transactions such as sending and receiving licensing data. This vulnerability occurs during the processing of opcode 0x32, an attacker is able to introduce crafted data into the clptrnsv service to expose arbitrary paths through fopen, fseek, and fread.
Vulnerability Identifiers
Exodus Intelligence: EIP-2015-0022
MITRE CVE: CVE-2021-20707
Vulnerability Metrics
CVSSv2 Score: 7.8
Vendor References
https://jpn.nec.com/security-info/secinfo/nv21-015.html
Discovery Credit
Exodus Intelligence
Disclosure Timeline
Disclosed to affected vendor: February 25th, 2021
Disclosed to public: October 29th, 2021
Further Information
Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected].
Researchers who are interested in monetizing their 0Day and NDay can work with us through our Research Sponsorship Program.
The post NEC EXPRESSCLUSTER X Transaction Server 0x32 File Read appeared first on Exodus Intelligence.
Support the originator by clicking the read the rest link below.