[Japanese]
|
JVNDB-2021-000097
|
Multiple vulnerabilities in CLUSTERPRO X and EXPRESSCLUSTER X
|
CLUSTERPRO X and EXPRESSCLUSTER X provided by NEC Corporation contain multiple vulnerabilities listed below.
* Buffer overflow in the Disk Agent (CWE-119) - CVE-2021-20700, CVE-2021-20701
* Buffer overflow in the Transaction Server (CWE-119) - CVE-2021-20702, CVE-2021-20703
* Buffer overflow in the compatible API with previous versions (Ver 8.0 and earlier) (CWE-119) - CVE-2021-20704
* Remote file upload in the WebManager (CWE-20) - CVE-2021-20705, CVE-2021-20706
* Read files in the Transaction Server (CWE-20) - CVE-2021-20707
NEC Corporation reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JPCERT/CC and NEC Corporation coordinated under the Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 9.8 (Critical) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
CVSS V2 Severity: Base Metrics 10.0 (High) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Complete
- Integrity Impact: Complete
- Availability Impact: Complete
The above CVSS base scores have been assigned for CVE-2021-20700, CVE-2021-20701
|
CVSS V3 Severity:
Base Metrics
9.8 (Critical) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: High
-
Availability Impact: High
CVSS V2 Severity:Base Metrics
10.0 (High)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: Complete
-
Integrity Impact: Complete
-
Availability Impact: Complete
The above CVSS base scores have been assigned for CVE-2021-20702, CVE-2021- 20703
|
CVSS V3 Severity:
Base Metrics
9.8 (Critical) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: High
-
Availability Impact: High
CVSS V2 Severity:Base Metrics
10.0 (High)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: Complete
-
Integrity Impact: Complete
-
Availability Impact: Complete
The above CVSS base scores have been assigned for CVE-2021-20704
|
CVSS V3 Severity:
Base Metrics
7.5 (High) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: None
-
Integrity Impact: High
-
Availability Impact: None
CVSS V2 Severity:Base Metrics
7.8 (High)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: None
-
Integrity Impact: Complete
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2021-20705, CVE-2021-20706
|
CVSS V3 Severity:
Base Metrics
7.5 (High) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: None
-
Availability Impact: None
CVSS V2 Severity:Base Metrics
7.8 (High)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: Complete
-
Integrity Impact: None
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2021-20707
|
|
NEC Corporation
- EXPRESSCLUSTER X 4.3 for Windows and later (CLUSTERPRO X 4.3 for Windows and later)
- EXPRESSCLUSTER X 4.3 SingleServerSafe for Windows and later (CLUSTERPRO X 4.3 SingleServerSafe for Windows and later)
|
|
* Receiving a specially crafted packet sent by a remote attacker may allow arbitrary code execution - CVE-2021-20700, CVE-2021-20701, CVE-2021-20702, CVE-2021-20703, CVE-2021-20704
* A specially crafted upload request sent by a remote attacker may be accepted - CVE-2021-20705, CVE-2021-20706
* Receiving specially crafted packet sent by a remote attacker may allow an arbitrary file being read - CVE-2021-20707
|
[Update the software]
Update the software to the latest version according to the information provided by the developer.
The developer has released the following updates for CLUSTERPRO X and EXPRESSCLUSTER X that address the vulnerabilities.
- CLUSTERPRO X 4.3 for Windows additional update (CPRO-XWA40-13)
- CLUSTERPRO X SingleServerSafe 4.3 for Windows additional update (CPRO-XWA40-13)
- CLUSTERPRO X 3.3 for Windows additional update (CPRO-XWA30-96E)
- CLUSTERPRO X SingleServerSafe 3.3 for Windows additional update (CPRO-XWA30-96E)
[Apply Workarounds]
Apply the following workarounds to avoid the impacts of these vulnerabilities.
- Enable a firewall and block unnecesary communication
- Allow only hosts belonging to the cluster to accept connection requests for the following ports:
- Data transfer (Default: 29002)
- Communication between disk agents (Default: 29004)
- Allow only trusted clients to accept connection requests for the following port:
- HTTP port of WebManager (Default: 29003)
- Allow only local hosts to accept connection requests for the process
clpoldapi.exe
|
NEC Corporation
|
- Buffer Errors(CWE-119) [IPA Evaluation]
- Improper Input Validation(CWE-20) [IPA Evaluation]
|
- CVE-2021-20700
- CVE-2021-20701
- CVE-2021-20702
- CVE-2021-20703
- CVE-2021-20704
- CVE-2021-20705
- CVE-2021-20706
- CVE-2021-20707
|
- JVN : JVN#69304877
- National Vulnerability Database (NVD) : CVE-2021-20700
- National Vulnerability Database (NVD) : CVE-2021-20701
- National Vulnerability Database (NVD) : CVE-2021-20702
- National Vulnerability Database (NVD) : CVE-2021-20703
- National Vulnerability Database (NVD) : CVE-2021-20704
- National Vulnerability Database (NVD) : CVE-2021-20705
- National Vulnerability Database (NVD) : CVE-2021-20706
- National Vulnerability Database (NVD) : CVE-2021-20707
|
- [2021/10/29]
Web page was published
- [2021/11/10]
Affected Products : Products were added
Solution was modified
- [2021/11/30]
Affected Products : Products were added
Solution was modified
- [2022/04/20]
Solution was modified
|