iTnews Asia
  • Home
  • News
  • Security

Singapore researchers discover remote execution bugs

Singapore researchers discover remote execution bugs

Riverbed spinoff Aternity ships emergency software patch.

By Richard Chirgwin on Mar 14, 2022 12:22PM

Riverbed’s performance monitoring spinoff Aternity has published seven security advisories describing now-patched vulnerabilities in its AppInternals monitoring agent software.

The most serious of the bugs gave attackers remote code execution with system-level privilege.

Researchers from the Singaporean Government’s Cyber Security Group analysed the Riverbed SteelCentral AppInternals Agent, finding six vulnerabilities in the Dynamic Sampling Agent and one in the AppInternals Agent’s /DsaDataTest endpoint.

The agent software is deployed on data centre machines to gather performance data that’s then returned using HTTP over Port 2111, so the operator can get a uniform view of system performance.

It’s designed to monitor modern cloud environments based on - or using elements of - Docker, Kubernetes, Pivotal, Red Hat OpenShift, OpenStack, Amazon Web Services, Google Cloud Platform, and Azure.

Riverbed has shipped AppInternals Agent versions 11.8.8 and 12.14.0, which include patches for the bugs.

Four of the bugs are rated critical.

For each of the critical bugs – CVE-2021-42786, CVE-2021-42787, CVE-2021-42853, and CVE-2021-42854, as well as the medium-severity CVE-2021-42857 – the researchers discovered that a lack of input validation allowed an attacker to inject malicious code. 

CVE-2021-42855 is a local privilege escalation bug, and CVE-2021-42856 allows a reflected cross-site scripting attack.

For the technically-minded, one of the researchers, Kang Hao Leng, detailed the researchers' bug-hunting process here.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
bug cloud patch rce remote code execution security software vulnerability

Related Articles

  • Are third-party blind spots the weakest link in enterprise cybersecurity chain?
  • Fulbright University Vietnam adopts AI assistant to cut service delays
  • Many Singapore and APAC enterprises held back by poor software quality
  • How making identity a priority can help bring clarity to AI chaos
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Are third-party blind spots the weakest link in enterprise cybersecurity chain?

Are third-party blind spots the weakest link in enterprise cybersecurity chain?

Philippine education ministry hit by data leak exposing 210,020 records

Philippine education ministry hit by data leak exposing 210,020 records

Indonesia's national data centre suffers ransomware attack

Indonesia's national data centre suffers ransomware attack

Malaysia's Maxis Berhad investigates claims on alleged data breach

Malaysia's Maxis Berhad investigates claims on alleged data breach

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.