An arbitrary file read vulnerability has been found in NEC EXPRESSCLUSTER X that can allow an attacker to read files off the target system. The Transaction Server (clptrnsv.exe) is a system service configured to utilize port 29002 by default to facilitate transactions such as sending and receiving licensing data. This vulnerability occurs during the processing of opcode 0x32, an attacker is able to introduce crafted data into the clptrnsv service to expose arbitrary paths through fopen, fseek, and fread.
- Exodus Intelligence: EIP-2015-0022
- MITRE CVE: CVE-2021-20707
- CVSSv2 Score: 7.8
- Exodus Intelligence
- Disclosed to affected vendor: February 25th, 2021
- Disclosed to public: October 29th, 2021
Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at email@example.com.
Researchers who are interested in monetizing their 0Day and NDay can work with us through our Research Sponsorship Program.