vulnerability
pfSense: pfSense-SA-18_09.webgui: Authenticated Arbitrary Code Execution
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:S/C:P/I:P/A:P) | Nov 15, 2018 | Dec 3, 2018 | Mar 27, 2026 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
Nov 15, 2018
Added
Dec 3, 2018
Modified
Mar 27, 2026
Description
An exploitable command injection vulnerability exists in the way Netgate pfSense CE 2.4.4-RELEASE processes the parameters of a specific POST request. The attacker can exploit this and gain the ability to execute arbitrary commands on the system. An attacker needs to be able to send authenticated POST requests to the administration web interface. Command injection is possible in the `powerd_normal_mode` parameter.
Solution
pfsense-upgrade-latest
References
- CVE-2018-4019
- https://attackerkb.com/topics/CVE-2018-4019
- CVE-2018-4020
- https://attackerkb.com/topics/CVE-2018-4020
- CVE-2018-4021
- https://attackerkb.com/topics/CVE-2018-4021
- CWE-78
- EUVD-EUVD-2018-15805
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2018-15805
- https://pfsense.org/security/advisories/pfSense-SA-18_09.webgui.asc
- https://www.netgate.com/docs/pfsense/development/system-patches.html
- https://www.netgate.com/docs/pfsense/install/upgrade-guide.html
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.