NewStart CGSL MAIN 7.02 : pcp Multiple Vulnerabilities (NS-SA-2025-0080)

medium Nessus Plugin ID 238016

Synopsis

The remote NewStart CGSL host is affected by multiple vulnerabilities.

Description

The remote NewStart CGSL host, running version MAIN 7.02, has pcp packages installed that are affected by multiple vulnerabilities:

- A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation. (CVE-2023-6917)

- A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually.
The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer. (CVE-2024-3019)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the vulnerable CGSL pcp packages. Note that updated packages may not be available yet. Please contact ZTE for more information.

See Also

https://security.gd-linux.com/notice/NS-SA-2025-0080

https://security.gd-linux.com/info/CVE-2023-6917

https://security.gd-linux.com/info/CVE-2024-3019

Plugin Details

Severity: Medium

ID: 238016

File Name: newstart_cgsl_NS-SA-2025-0080_pcp.nasl

Version: 1.2

Type: local

Published: 6/9/2025

Updated: 6/18/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:L/AC:L/Au:M/C:C/I:C/A:C

CVSS Score Source: CVE-2023-6917

CVSS v3

Risk Factor: Medium

Base Score: 6.7

Temporal Score: 5.8

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:zte:cgsl_main:pcp-pmda-dm, p-cpe:/a:zte:cgsl_main:pcp-pmda-gpfs, p-cpe:/a:zte:cgsl_main:pcp, p-cpe:/a:zte:cgsl_main:pcp-pmda-lustre, p-cpe:/a:zte:cgsl_main:pcp-pmda-named, p-cpe:/a:zte:cgsl_main:pcp-pmda-postfix, p-cpe:/a:zte:cgsl_main:pcp-pmda-bonding, p-cpe:/a:zte:cgsl_main:pcp-pmda-roomtemp, p-cpe:/a:zte:cgsl_main:pcp-pmda-lmsensors, p-cpe:/a:zte:cgsl_main:pcp-pmda-ds389, p-cpe:/a:zte:cgsl_main:pcp-pmda-gluster, p-cpe:/a:zte:cgsl_main:pcp-pmda-mounts, p-cpe:/a:zte:cgsl_main:pcp-pmda-nginx, p-cpe:/a:zte:cgsl_main:pcp-pmda-mysql, p-cpe:/a:zte:cgsl_main:pcp-pmda-gfs2, p-cpe:/a:zte:cgsl_main:pcp-pmda-lustrecomm, p-cpe:/a:zte:cgsl_main:pcp-pmda-bash, p-cpe:/a:zte:cgsl_main:pcp-pmda-trace, p-cpe:/a:zte:cgsl_main:pcp-conf, p-cpe:/a:zte:cgsl_main:pcp-pmda-memcache, p-cpe:/a:zte:cgsl_main:pcp-pmda-mailq, p-cpe:/a:zte:cgsl_main:pcp-pmda-apache, p-cpe:/a:zte:cgsl_main:pcp-pmda-dbping, p-cpe:/a:zte:cgsl_main:pcp-pmda-json, p-cpe:/a:zte:cgsl_main:pcp-pmda-elasticsearch, p-cpe:/a:zte:cgsl_main:pcp-pmda-ds389log, p-cpe:/a:zte:cgsl_main:pcp-pmda-zswap, p-cpe:/a:zte:cgsl_main:pcp-pmda-cisco, p-cpe:/a:zte:cgsl_main:pcp-pmda-logger, p-cpe:/a:zte:cgsl_main:pcp-pmda-pdns, p-cpe:/a:zte:cgsl_main:python3-pcp, p-cpe:/a:zte:cgsl_main:pcp-pmda-unbound, p-cpe:/a:zte:cgsl_main:pcp-pmda-nvidia-gpu, p-cpe:/a:zte:cgsl_main:pcp-pmda-nfsclient, p-cpe:/a:zte:cgsl_main:pcp-pmda-news, p-cpe:/a:zte:cgsl_main:pcp-selinux, p-cpe:/a:zte:cgsl_main:pcp-pmda-sendmail, p-cpe:/a:zte:cgsl_main:pcp-libs, p-cpe:/a:zte:cgsl_main:pcp-pmda-shping, cpe:/o:zte:cgsl_main:7, p-cpe:/a:zte:cgsl_main:pcp-pmda-netfilter, p-cpe:/a:zte:cgsl_main:pcp-system-tools, p-cpe:/a:zte:cgsl_main:perl-pcp-pmda, p-cpe:/a:zte:cgsl_main:pcp-pmda-weblog, p-cpe:/a:zte:cgsl_main:pcp-export-pcp2graphite, p-cpe:/a:zte:cgsl_main:pcp-pmda-summary

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 5/28/2025

Vulnerability Publication Date: 2/28/2024

Reference Information

CVE: CVE-2023-6917, CVE-2024-3019