HIGH · 8.8

CVE-2020-21999

iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell c...

Vulnerability Description

iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.

CVSS Score

8.8

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
IwtFacesentry Access Control System Firmware5.7.0
IwtFacesentry Access Control System-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-21999?

CVE-2020-21999 is a vulnerability with a CVSS score of 8.8 (HIGH). iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell c...

How severe is CVE-2020-21999?

CVE-2020-21999 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-21999?

Check the references section above for vendor advisories and patch information. Affected products include: Iwt Facesentry Access Control System Firmware, Iwt Facesentry Access Control System.