EdgeMAX EdgeSwitch X software release v1.1.1

by Ubiquiti Employee 4 weeks ago

We released new version of the EdgeSwitch X firmware today which fixes security issues reported by third parties:

 

HackerOne report #508256:
A privileged user can execute arbitrary shell commands over the SSH CLI interface. This allows to execute shell commands under the root user.

HackerOne report #511025:
Any authenticated user can execute arbitrary shell commands over the SSH interface which allows them to execute shell commands under the root user.

HackerOne report #512958:
An unauthenticated user can use the "local port forwarding" and "dynamic port forwarding" (SOCKS proxy) functionalities. Remote attackers without credentials can exploit this bug to access local services or forward traffic through the device if SSH is enabled in the system settings.


You can download it from https://dl.ubnt.com/firmwares/edgemax/EdgeSwitchX/v1.1.1/ESX.1.1.1.bix
(SHA256: 83615d7e627392b45d8d3e8f182d9d77c084aac992a752a7851d28ba47576fd4)
Note: This firmware is only for EdgeSwitch X models ES-10X and ES-10XP, not for legacy EdgeSwitch XP devices (formerly known as TOUGHSwitch).

List of changes since firmware release v1.1.0:

  • Disabled SSH port forwarding to default system user accounts (HackerOne report #512958).
  • Disabled execution of shell commands provided by SSH client (HackerOne report #511025).
  • Fixed command injection in 'copy running-config' CLI command (HackerOne report #508256).