NewStart CGSL MAIN 6.06 : openssl Multiple Vulnerabilities (NS-SA-2025-0211)

high Nessus Plugin ID 266257

Synopsis

The remote NewStart CGSL host is affected by multiple vulnerabilities.

Description

The remote NewStart CGSL host, running version MAIN 6.06, has openssl packages installed that are affected by multiple vulnerabilities:

- In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze). (CVE-2022-2068)

- The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. (CVE-2014-0160)

- OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition. (CVE-2006-2937)

- OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) public exponent or (2) public modulus values in X.509 certificates that require extra time to process when using RSA signature verification. (CVE-2006-2940)

- Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers. (CVE-2006-3738)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the vulnerable CGSL openssl packages. Note that updated packages may not be available yet. Please contact ZTE for more information.

See Also

https://security.gd-linux.com/notice/NS-SA-2025-0211

https://security.gd-linux.com/info/CVE-2006-2937

https://security.gd-linux.com/info/CVE-2006-2940

https://security.gd-linux.com/info/CVE-2006-3738

https://security.gd-linux.com/info/CVE-2006-4339

https://security.gd-linux.com/info/CVE-2006-4343

https://security.gd-linux.com/info/CVE-2007-3108

https://security.gd-linux.com/info/CVE-2007-4995

https://security.gd-linux.com/info/CVE-2007-5135

https://security.gd-linux.com/info/CVE-2008-0891

https://security.gd-linux.com/info/CVE-2008-1672

https://security.gd-linux.com/info/CVE-2009-1377

https://security.gd-linux.com/info/CVE-2009-1378

https://security.gd-linux.com/info/CVE-2009-1379

https://security.gd-linux.com/info/CVE-2009-3555

https://security.gd-linux.com/info/CVE-2009-4355

https://security.gd-linux.com/info/CVE-2010-0742

https://security.gd-linux.com/info/CVE-2010-1633

https://security.gd-linux.com/info/CVE-2010-3864

https://security.gd-linux.com/info/CVE-2010-4180

https://security.gd-linux.com/info/CVE-2011-0014

https://security.gd-linux.com/info/CVE-2011-3207

https://security.gd-linux.com/info/CVE-2012-0050

https://security.gd-linux.com/info/CVE-2012-2110

https://security.gd-linux.com/info/CVE-2013-4353

https://security.gd-linux.com/info/CVE-2013-6449

https://security.gd-linux.com/info/CVE-2013-6450

https://security.gd-linux.com/info/CVE-2014-0160

https://security.gd-linux.com/info/CVE-2014-0224

https://security.gd-linux.com/info/CVE-2015-0209

https://security.gd-linux.com/info/CVE-2015-0286

https://security.gd-linux.com/info/CVE-2015-0287

https://security.gd-linux.com/info/CVE-2015-0289

https://security.gd-linux.com/info/CVE-2015-0293

https://security.gd-linux.com/info/CVE-2019-1547

https://security.gd-linux.com/info/CVE-2019-1549

https://security.gd-linux.com/info/CVE-2019-1563

https://security.gd-linux.com/info/CVE-2020-1971

https://security.gd-linux.com/info/CVE-2021-3449

https://security.gd-linux.com/info/CVE-2021-3450

https://security.gd-linux.com/info/CVE-2022-1292

https://security.gd-linux.com/info/CVE-2022-2068

Plugin Details

Severity: High

ID: 266257

File Name: newstart_cgsl_NS-SA-2025-0211_openssl.nasl

Version: 1.2

Type: local

Published: 9/30/2025

Updated: 10/1/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2022-2068

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

CVSS Score Source: CVE-2014-0160

Vulnerability Information

CPE: p-cpe:/a:zte:cgsl_main:openssl-devel, cpe:/o:zte:cgsl_main:6, p-cpe:/a:zte:cgsl_main:openssl-libs, p-cpe:/a:zte:cgsl_main:openssl

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/30/2025

Vulnerability Publication Date: 9/5/2006

CISA Known Exploited Vulnerability Due Dates: 5/25/2022

Reference Information

CVE: CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-4339, CVE-2006-4343, CVE-2007-3108, CVE-2007-4995, CVE-2007-5135, CVE-2008-0891, CVE-2008-1672, CVE-2009-1377, CVE-2009-1378, CVE-2009-1379, CVE-2009-3555, CVE-2009-4355, CVE-2010-0742, CVE-2010-1633, CVE-2010-3864, CVE-2010-4180, CVE-2011-0014, CVE-2011-3207, CVE-2012-0050, CVE-2012-2110, CVE-2013-4353, CVE-2013-6449, CVE-2013-6450, CVE-2014-0160, CVE-2014-0224, CVE-2015-0209, CVE-2015-0286, CVE-2015-0287, CVE-2015-0289, CVE-2015-0293, CVE-2019-1547, CVE-2019-1549, CVE-2019-1563, CVE-2020-1971, CVE-2021-3449, CVE-2021-3450, CVE-2022-1292, CVE-2022-2068

IAVA: 2010-A-0166-S, 2010-A-0167-S, 2011-A-0027-S, 2011-A-0122-S, 2012-A-0009-S, 2012-A-0070-S, 2014-A-0051-S, 2014-A-0083-S, 2015-A-0063-S, 2019-A-0303-S, 2020-A-0566-S, 2021-A-0149-S, 2022-A-0186-S, 2022-A-0257

IAVB: 2014-B-0092-S