본문내용 바로가기 메인메뉴 바로가기

하단내용 바로가기

Security Advisory (Korean)

Security Advisory Detail
CVE-2018-5198, CVE-2018-5199 | WIZVERA Veraport Remote Code Execution2018.12.19
□ Overview
o A vulnerabilities in the WIZVERA Veraport could allow a remote attacker to cause arbitrary file execution.
o The vulnerability is due to lack of proper input validation of the remote installation.
Vulerability Type Impact Severity CVE ID
Race condition Code execution High CVE-2018-5198
Remote code execution Code execution High CVE-2018-5199

□ Description
o (CVE-2018-5198) A race condition when calling Veraport API allow remote attacker to cause arbitrary file download and execution. This results in remote code execution.
o (CVE-2018-5199) Due to insufficient domain validation, It is possible to overwrite installation file to malicious file. A remote unauthenticated attacker may use this vulnerability to execute arbitrary file.

□ Affected Products
Product Version PlatForm
Veraport G3 ALL MacOS

□ Solution
o Update to patched release version(3.7.3.3)

□ Reference site
o https://www.wizvera.com/#section-home

□ Acknowledgements 
o Thanks to Youngsung Kim for reporting this vulerabilities through KrCERT/CC's Vulnerability Reward Program.