Vulnerability Description
iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Iwt | Facesentry Access Control System Firmware | 5.7.0 |
| Iwt | Facesentry Access Control System | - |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/47066ExploitThird Party AdvisoryVDB Entry
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5525.phpExploitThird Party Advisory
- https://www.exploit-db.com/exploits/47066ExploitThird Party AdvisoryVDB Entry
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5525.phpExploitThird Party Advisory
FAQ
What is CVE-2020-21999?
CVE-2020-21999 is a vulnerability with a CVSS score of 8.8 (HIGH). iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell c...
How severe is CVE-2020-21999?
CVE-2020-21999 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-21999?
Check the references section above for vendor advisories and patch information. Affected products include: Iwt Facesentry Access Control System Firmware, Iwt Facesentry Access Control System.