Valmet DNA Remote Code Execution
CVE-2021-26726
| Summary | A remote code execution vulnerability affecting a Valmet DNA service listening on TCP port 1517 allows an attacker to execute commands with SYSTEM privileges | 
| Impact | An un-authenticated network user can craft specific packets targeting a Valmet DNA service, listening by default on TCP port 1517. By exploiting a predictable encryption key, the attacker can trigger commands that will be executed on the remote machine with the SYSTEM privileges. | 
| Issue date | February 16, 2022 | 
| Affects | The vulnerability affects the following Valmet DNA versions: Valmet DNA versions from Collection 2012 to Collection 2021 | 
| CVE Name | CVE-2021-26726 | 
| CVSS Details | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C/CR:H/ IR:H/AR:H/MAV:A/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H | 
| CVSS Score | 8.8 | 
| Solution | The fix is available from Valmet Automation Customer Service | 
| Mitigations | A properly configured firewall helps to prevent unauthorized access from untrusted networks to the system. | 
| Acknowledgements | Ivan Speziale of Nozomi Networks |