CVE-2021-3122
high-risk
Published 2021-02-07
CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."
Do I need to act?
!
90.4% chance of exploitation in next 30 days
EPSS score — higher than 10% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
https://github.com/roughb8722/CVE-2021-3122-Details/blob/main/CVE-2021-3122
Third Party Advisory
https://rdf2.alohaenterprise.com/client/CMCInst.zip
Third Party Advisory
https://www.tetradefense.com/incident-response-services/active-exploit-a-remote-...
Third Party Advisory
https://github.com/roughb8722/CVE-2021-3122-Details/blob/main/CVE-2021-3122
Third Party Advisory
https://rdf2.alohaenterprise.com/client/CMCInst.zip
Third Party Advisory
https://www.tetradefense.com/incident-response-services/active-exploit-a-remote-...
57
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
20/34 · Moderate
Exposure
5/34 · Minimal