NEC EXPRESSCLUSTER X Transaction Server 0x32 File Read












EIP-2015-0022


An arbitrary file read vulnerability has been found in NEC EXPRESSCLUSTER X that can allow an attacker to read files off the target system. The Transaction Server (clptrnsv.exe) is a system service configured to utilize port 29002 by default to facilitate transactions such as sending and receiving licensing data. This vulnerability occurs during the processing of opcode 0x32, an attacker is able to introduce crafted data into the clptrnsv service to expose arbitrary paths through fopen, fseek, and fread.


Vulnerability Identifiers


Exodus Intelligence: EIP-2015-0022
MITRE CVE: CVE-2021-20707

Vulnerability Metrics


CVSSv2 Score: 7.8

Vendor References


https://jpn.nec.com/security-info/secinfo/nv21-015.html

Discovery Credit


Exodus Intelligence

Disclosure Timeline


Disclosed to affected vendor: February 25th, 2021
Disclosed to public: October 29th, 2021

Further Information


Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected].


Researchers who are interested in monetizing their 0Day and NDay can work with us through our Research Sponsorship Program.












The post NEC EXPRESSCLUSTER X Transaction Server 0x32 File Read appeared first on Exodus Intelligence.



Support the originator by clicking the read the rest link below.