Geutebruck.CGI.uapi.Remote.Command.Execution
Description
This indicates an attack attempt to exploit an Authentication Bypass Vulnerability in Geutebruck devices.
This vulnerability is due to improper handling of a crafted HTTP request. A remote attacker could exploit this vulnerability by sending a crafted HTTP request to the target device. Successful exploitation of the vulnerability could lead to execution of arbitrary code.
Affected Products
Geutebruck G-Cam EEC-2xxx series with firmware version 1.12.13.2, version 1.12.14.5, version 1.12.0.27, and version prior to 1.12.0.27
Geutebruck G-Code EBC-21xx series with firmware version 1.12.13.2, version 1.12.14.5, version 1.12.0.27, and version prior to 1.12.0.27
Geutebruck G-Code EFD-22xx series with firmware version 1.12.13.2, version 1.12.14.5, version 1.12.0.27, and version prior to 1.12.0.27
Geutebruck G-Code ETHC-22xx series with firmware version 1.12.13.2, version 1.12.14.5, version 1.12.0.27, and version prior to 1.12.0.27
Geutebruck G-Code EWPC-22xx series with firmware version 1.12.13.2, version 1.12.14.5, version 1.12.0.27, and version prior to 1.12.0.27
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://portal.geutebrueck.com/
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2021-10-27 | 18.186 | Sig Added |
2021-10-13 | 18.177 | Default_action:pass:drop |
2021-10-04 | 18.169 |