vulnerability
pfSense: pfSense-SA-18_09.webgui: Authenticated Arbitrary Code Execution
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:S/C:P/I:P/A:P) | Nov 15, 2018 | Dec 3, 2018 | Feb 18, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
Nov 15, 2018
Added
Dec 3, 2018
Modified
Feb 18, 2025
Description
An exploitable command injection vulnerability exists in the way Netgate pfSense CE 2.4.4-RELEASE processes the parameters of a specific POST request. The attacker can exploit this and gain the ability to execute arbitrary commands on the system. An attacker needs to be able to send authenticated POST requests to the administration web interface. Command injection is possible in the `powerd_battery_mode` POST parameter.
Solution
pfsense-upgrade-latest
References
- CVE-2018-4019
- https://attackerkb.com/topics/CVE-2018-4019
- CVE-2018-4020
- https://attackerkb.com/topics/CVE-2018-4020
- CVE-2018-4021
- https://attackerkb.com/topics/CVE-2018-4021
- URL-https://pfsense.org/security/advisories/pfSense-SA-18_09.webgui.asc
- URL-https://www.netgate.com/docs/pfsense/development/system-patches.html
- URL-https://www.netgate.com/docs/pfsense/install/upgrade-guide.html
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.