{"vuid":"VU#168751","idnumber":"168751","name":"Emerson Network Power Avocent MergePoint Unity 2016 KVM and possibly other model switches contain a directory traversal vulnerability","keywords":["Emerson","KVM","Avocent","MPU2016","MergePoint Unity","directory traversal","CWE-23"],"overview":"Emerson Network Power Avocent MergePoint Unity 2016 KVM and possibly other model switches running firmware version 1.9.16473 and possibly previous versions contain a directory traversal vulnerability (CWE-23).","clean_desc":"CWE-23: Relative Path Traversal Emerson Network Power Avocent MergePoint Unity 2016 (MPU2016) KVM and possibly other model switches running firmware version 1.9.16473 and possibly previous versions contain a directory traversal vulnerability. This vulnerability is caused from a failure to sanitize the user-supplied input parameter \"filename\" within the download.php file. An attacker can use directory traversal to download critical files such as /etc/passwd to obtain the credentials for the device. It has been reported that Emerson Network Power Avocent MergePoint Unity KVM firmware version 1.2.3 through 1.10.10 are affected. It also has been reported that this firmware is shared among the entire MergePoint Unity KVM switch line. MPU104E\nMPU108E\nMPU1016\nMPU2016\nMPU2032\nMPU4032\nMPU8032","impact":"A remote authenticated attacker can download the configuration files of the device and use the obtained administrator credentials to access the interface. The attacker may then modify the settings of the device with unrestricted access.","resolution":"Update Users are advised to upgrade to Emerson Network Power Avocent MergePoint Unity KVM firmware version 1.14 or 1.18 or higher.","workarounds":"Restrict access to the KVM switch interface Restrict access to the MPU2016 KVM switch web interface to trusted networks. If possible, configure management and transit networks for separate VLANs, or restrict access to the device using IP access lists.","sysaffected":"","thanks":"Thanks to Shady Liu (Shady.liu@dbappsecurity.com.cn) of DBAppSecurity Co.Ltd for reporting this vulnerability and Alfredo Ramirez for providing additional vulnerability information.","author":"This document was written by Adam Rauf.","public":["http://www.emersonnetworkpower.com/en-US/Products/InfrastructureManagement/DigitalKVMAppliances/Pages/AvocentMergePointUnityAppliances.aspx","http://www.avocent.com/Support_Firmware/MergePoint_Unity/MergePoint_Unity_Switch.aspx","http://cwe.mitre.org/data/definitions/23.html"," http://www.avocent.com/Support_Firmware/MergePoint_Unity/MergePoint_Unity_Switch_-_Previous_Releases.aspx"],"cveids":["CVE-2013-6030"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-09-25T15:49:33Z","publicdate":"2014-01-23T00:00:00Z","datefirstpublished":"2014-01-23T11:34:04Z","dateupdated":"2014-02-07T14:26:27Z","revision":37,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"N","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"UC","cvss_collateraldamagepotential":"L","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4","cvss_basevector":"AV:N/AC:L/Au:S/C:P/I:N/A:N","cvss_temporalscore":"2.8","cvss_environmentalscore":"0.883687289389","cvss_environmentalvector":"CDP:L/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}