CVE-2021-43339

8.8 HIGH

📋 TL;DR

CVE-2021-43339 is a command injection vulnerability in Ericsson Network Location software that allows authenticated attackers to execute arbitrary commands via the file_name parameter in export functionality. This could lead to remote code execution, including creating new admin users. Organizations using Ericsson Network Location before July 2021 are affected.

💻 Affected Systems

Products:
  • Ericsson Network Location
Versions: All versions before 2021-07-31
Operating Systems: Not OS-specific - affects the application itself
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the export functionality. The vulnerability is in the application's file handling mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining administrative control, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Unauthorized administrative access, data manipulation, and potential ransomware deployment within the affected system.

🟢

If Mitigated

Limited impact due to network segmentation and strict access controls, potentially only affecting the vulnerable application instance.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers can exploit this vulnerability remotely after authentication.
🏢 Internal Only: MEDIUM - Requires authenticated access, but insider threats or compromised credentials could lead to exploitation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Multiple public exploit scripts exist. Exploitation requires authenticated access but is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions from 2021-07-31 onward

Vendor Advisory: Not publicly documented in vendor advisory

Restart Required: Yes

Instructions:

1. Update Ericsson Network Location to version dated 2021-07-31 or later. 2. Restart the application services. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable export functionality

all

Temporarily disable the export feature that contains the vulnerable file_name parameter

Application-specific configuration changes required

Implement input validation

all

Add strict input validation for file_name parameter to reject special characters

Application code modification required

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Ericsson Network Location systems
  • Enforce multi-factor authentication and strong credential policies for all admin accounts

🔍 How to Verify

Check if Vulnerable:

Check Ericsson Network Location version date. If before 2021-07-31, the system is vulnerable.

Check Version:

Application-specific command or check version in admin interface

Verify Fix Applied:

Verify the application version shows 2021-07-31 or later date. Test export functionality with malicious input to confirm sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual export operations
  • Commands with special characters in file_name parameter
  • New admin user creation logs

Network Indicators:

  • Unexpected outbound connections from Ericsson Network Location system
  • Command and control traffic patterns

SIEM Query:

source="ericsson_network_location" AND (event="export" AND file_name CONTAINS "|" OR file_name CONTAINS ";" OR file_name CONTAINS "$")

🔗 References

📤 Share & Export