Headline
CVE-2021-20699: Vulnerabilities in public displays | Sharp NEC Display Solutions
Sharp NEC Displays ((UN462A R1.300 and prior to it, UN462VA R1.300 and prior to it, UN492S R1.300 and prior to it, UN492VS R1.300 and prior to it, UN552A R1.300 and prior to it, UN552S R1.300 and prior to it, UN552VS R1.300 and prior to it, UN552 R1.300 and prior to it, UN552V R1.300 and prior to it, UX552S R1.300 and prior to it, UX552 R1.300 and prior to it, V864Q R2.000 and prior to it, C861Q R2.000 and prior to it, P754Q R2.000 and prior to it, V754Q R2.000 and prior to it, C751Q R2.000 and prior to it, V984Q R2.000 and prior to it, C981Q R2.000 and prior to it, P654Q R2.000 and prior to it, V654Q R2.000 and prior to it, C651Q R2.000 and prior to it, V554Q R2.000 and prior to it, P404 R3.200 and prior to it, P484 R3.200 and prior to it, P554 R3.200 and prior to it, V404 R3.200 and prior to it, V484 R3.200 and prior to it, V554 R3.200 and prior to it, V404-T R3.200 and prior to it, V484-T R3.200 and prior to it, V554-T R3.200 and prior to it, C501 R2.000 and prior to it, C551 R2.000 and prior to it, C431 R2.000 and prior to it) allows an attacker a buffer overflow and to execute remote code by sending long parameters that contains specific characters in http request.
CVE Identifier: CVE-2021-20698, CVE-2021-20699
Description
The following Public Displays allows an attacker arbitrary command or program execution.
Products****Models
UN462A, UN462VA, UN492S, UN492VS, UN552A, UN552S, UN552VS, UN552, UN552V, UX552S, UX552
Firmware version
R1.300 and prior to it
Models
V864Q, C861Q, P754Q, V754Q, C751Q, V984Q, C981Q, P654Q, V654Q, C651Q, V554Q
Firmware version
R2.000 and prior to it
Models
P404, P484, P554, V404, V484, V554, V404-T, V484-T, V554-T
Firmware version
R3.201 and prior to it
Models
C501, C551, C431
Firmware version
R2.000 and prior to it
Workaround
Please refer the below URL to update the latest firmware.
https://www.sharp-nec-displays.com/dl/en/dp_soft/pd_fm_update/index.html
Alternative:
Apply following workaround to avoid the effects of this vulnerability.
- Use the product only in a safe intranet protected by a firewall and do not connect the product to the Internet.
The above workaround prevent illegal access to the product. Therefore, it does not require to update the firmware.
If it is difficult to take the above workaround due to a network configuration and etc., please update the firmware.
Reference
- CVE-2021-20698
- CVE-2021-20699
Acknowledgements
Thanks to Mr. Howard McGreehan of the Aon’s Cyber Solutions for reporting this vulnerability.