Valmet DNA Remote Code Execution
CVE-2021-26726
Summary |
A remote code execution vulnerability affecting a Valmet DNA service listening on TCP port 1517 allows an attacker to execute commands with SYSTEM privileges |
Impact |
An un-authenticated network user can craft specific packets targeting a Valmet DNA service, listening by default on TCP port 1517. By exploiting a predictable encryption key, the attacker can trigger commands that will be executed on the remote machine with the SYSTEM privileges. |
Issue date |
February 16, 2022 |
Affects |
The vulnerability affects the following Valmet DNA versions: Valmet DNA versions from Collection 2012 to Collection 2021 |
CVE Name |
CVE-2021-26726 |
CVSS Details |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C/CR:H/ IR:H/AR:H/MAV:A/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H |
CVSS Score |
8.8 |
Solution |
The fix is available from Valmet Automation Customer Service |
Mitigations |
A properly configured firewall helps to prevent unauthorized access from untrusted networks to the system. |
Acknowledgements |
Ivan Speziale of Nozomi Networks |