All the vulnerabilites related to A10 - Thunder ADC
cve-2023-42130
Vulnerability from cvelistv5
Published
2024-05-03 02:13
Modified
2024-09-18 18:30
Severity ?
EPSS score ?
Summary
A10 Thunder ADC FileMgmtExport Directory Traversal Arbitrary File Read and Deletion Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1496/ | x_research-advisory | |
https://support.a10networks.com/support/security_advisory/a10-acos-file-access-vulnerability/ | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | A10 | Thunder ADC |
Version: vThunder 5.2.1-p3, build 70 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:a10networks:thunder_adc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "thunder_adc", "vendor": "a10networks", "versions": [ { "lessThanOrEqual": "6.0.1", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "5.2.1-p8", "status": "affected", "version": "5.2.1-p1", "versionType": "custom" }, { "lessThanOrEqual": "5.2.1", "status": "affected", "version": "5.1.0", "versionType": "custom" }, { "lessThanOrEqual": "4.1.4-gr1-p12", "status": "affected", "version": "4.1.4-gr1-p6", "versionType": "custom" }, { "lessThanOrEqual": "4.1.4-gr1-p5", "status": "affected", "version": "4.1.4", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-42130", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-05T18:52:50.057233Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-05T18:57:36.797Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T19:16:50.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1496", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1496/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://support.a10networks.com/support/security_advisory/a10-acos-file-access-vulnerability/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Thunder ADC", "vendor": "A10", "versions": [ { "status": "affected", "version": "vThunder 5.2.1-p3, build 70" } ] } ], "dateAssigned": "2023-09-06T16:25:45.562-05:00", "datePublic": "2023-10-04T14:32:57.885-05:00", "descriptions": [ { "lang": "en", "value": "A10 Thunder ADC FileMgmtExport Directory Traversal Arbitrary File Read and Deletion Vulnerability. This vulnerability allows remote attackers to read and delete arbitrary files on affected installations of A10 Thunder ADC. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the FileMgmtExport class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to read and delete files in the context of the service account.\n. Was ZDI-CAN-17905." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T18:30:16.120Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1496", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1496/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://support.a10networks.com/support/security_advisory/a10-acos-file-access-vulnerability/" } ], "source": { "lang": "en", "value": "Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative" }, "title": "A10 Thunder ADC FileMgmtExport Directory Traversal Arbitrary File Read and Deletion Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-42130", "datePublished": "2024-05-03T02:13:34.969Z", "dateReserved": "2023-09-06T21:14:24.437Z", "dateUpdated": "2024-09-18T18:30:16.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30368
Vulnerability from cvelistv5
Published
2024-06-06 17:52
Modified
2024-08-02 01:32
Severity ?
EPSS score ?
Summary
A10 Thunder ADC CsrRequestView Command Injection Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-524/ | x_research-advisory | |
https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369 | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | A10 | Thunder ADC |
Version: 6.0.2, build 68 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:a10networks:thunder_adc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "thunder_adc", "vendor": "a10networks", "versions": [ { "lessThan": "6.0.3-p1", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "5.2.1-p10", "status": "affected", "version": "5.1.0", "versionType": "custom" }, { "lessThan": "4.1.4-gr1-p14", "status": "affected", "version": "4.1.4", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-30368", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-10T14:03:11.116287Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-10T14:03:17.026Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.216Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-24-524", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-524/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Thunder ADC", "vendor": "A10", "versions": [ { "status": "affected", "version": "6.0.2, build 68" } ] } ], "dateAssigned": "2024-03-26T14:40:42.702-05:00", "datePublic": "2024-05-29T15:09:21.851-05:00", "descriptions": [ { "lang": "en", "value": "A10 Thunder ADC CsrRequestView Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of A10 Thunder ADC. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the CsrRequestView class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of a10user. Was ZDI-CAN-22517." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T17:52:47.342Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-524", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-524/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "A10 Thunder ADC CsrRequestView Command Injection Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-30368", "datePublished": "2024-06-06T17:52:47.342Z", "dateReserved": "2024-03-26T18:52:36.418Z", "dateUpdated": "2024-08-02T01:32:07.216Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30369
Vulnerability from cvelistv5
Published
2024-06-06 17:53
Modified
2024-08-02 01:32
Severity ?
EPSS score ?
Summary
A10 Thunder ADC Incorrect Permission Assignment Local Privilege Escalation Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-525/ | x_research-advisory | |
https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369 | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | A10 | Thunder ADC |
Version: 6.0.2, build 68 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:a10networks:thunder_adc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "thunder_adc", "vendor": "a10networks", "versions": [ { "lessThan": "6.0.3-p1", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "5.2.1-p10", "status": "affected", "version": "5.1.0", "versionType": "custom" }, { "lessThan": "4.1.4-gr1-p14", "status": "affected", "version": "4.1.4", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-30369", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-06T19:06:03.019548Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T19:30:08.524Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.045Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-24-525", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-525/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Thunder ADC", "vendor": "A10", "versions": [ { "status": "affected", "version": "6.0.2, build 68" } ] } ], "dateAssigned": "2024-03-26T14:40:42.708-05:00", "datePublic": "2024-05-29T15:09:26.200-05:00", "descriptions": [ { "lang": "en", "value": "A10 Thunder ADC Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of A10 Thunder ADC. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the installer. The issue results from incorrect permissions on a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-22754." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732: Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T17:53:01.730Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-525", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-525/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "A10 Thunder ADC Incorrect Permission Assignment Local Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-30369", "datePublished": "2024-06-06T17:53:01.730Z", "dateReserved": "2024-03-26T18:52:36.418Z", "dateUpdated": "2024-08-02T01:32:07.045Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-42129
Vulnerability from cvelistv5
Published
2024-05-03 02:13
Modified
2024-09-18 18:30
Severity ?
EPSS score ?
Summary
A10 Thunder ADC ShowTechDownloadView Directory Traversal Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1495/ | x_research-advisory | |
https://support.a10networks.com/support/security_advisory/a10-acos-file-access-vulnerability/ | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | A10 | Thunder ADC |
Version: 5.2.1-p3, build 70 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:a10networks:thunder_adc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "thunder_adc", "vendor": "a10networks", "versions": [ { "lessThanOrEqual": "6.0.1", "status": "affected", "version": "6.0.0", "versionType": "semver" }, { "lessThanOrEqual": "5.2.1", "status": "affected", "version": "5.1.0", "versionType": "semver" }, { "lessThanOrEqual": "4.1.4-GR1-P5", "status": "affected", "version": "4.1.4", "versionType": "custom" }, { "lessThanOrEqual": "5.2.1-P8", "status": "affected", "version": "5.2.1-P1", "versionType": "custom" }, { "lessThanOrEqual": "4.1.4-GR1-P12", "status": "affected", "version": "4.1.4-GR1-P6", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-42129", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-03T17:05:14.410175Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:25:03.264Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T19:16:50.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1495", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1495/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://support.a10networks.com/support/security_advisory/a10-acos-file-access-vulnerability/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Thunder ADC", "vendor": "A10", "versions": [ { "status": "affected", "version": "5.2.1-p3, build 70" } ] } ], "dateAssigned": "2023-09-06T16:25:45.556-05:00", "datePublic": "2023-10-04T14:32:54.692-05:00", "descriptions": [ { "lang": "en", "value": "A10 Thunder ADC ShowTechDownloadView Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of A10 Thunder ADC. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the ShowTechDownloadView class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the service account.\n. Was ZDI-CAN-17899." } ], "metrics": [ { "cvssV3_0": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T18:30:15.330Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1495", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1495/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://support.a10networks.com/support/security_advisory/a10-acos-file-access-vulnerability/" } ], "source": { "lang": "en", "value": "Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative" }, "title": "A10 Thunder ADC ShowTechDownloadView Directory Traversal Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-42129", "datePublished": "2024-05-03T02:13:34.257Z", "dateReserved": "2023-09-06T21:14:24.437Z", "dateUpdated": "2024-09-18T18:30:15.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }