Unauthenticated Remote Command Execution via Web Console in METIS DFS
翻译中…平台
linux
组件
metis-dfs
修复版本
2.1.235
CVE-2026-2249 affects METIS DFS devices running oscore versions up to 2.1.234-r18. This vulnerability allows an attacker to execute arbitrary operating system commands on the device without authentication. The impact is severe, potentially leading to complete system compromise and unauthorized access to sensitive data. A patch is available in version 2.1.236.
影响与攻击场景翻译中…
The exposed web-based shell at the /console endpoint provides a direct pathway for remote code execution (RCE). An attacker can leverage this vulnerability to gain 'daemon' level privileges, effectively controlling the METIS DFS device. This allows for a wide range of malicious activities, including reading and modifying configuration files, exfiltrating sensitive data stored on the device, disrupting services, and potentially pivoting to other systems on the network. Given the lack of authentication, the vulnerability is easily exploitable and poses a significant risk to organizations relying on METIS DFS for data storage and management.
利用背景翻译中…
CVE-2026-2249 was publicly disclosed on 2026-02-11. Exploitation probability is considered high due to the ease of access and the lack of authentication. Public proof-of-concept (PoC) code is likely to emerge given the vulnerability's simplicity. It is not currently listed on CISA KEV, but its criticality warrants monitoring. Active exploitation campaigns are possible.
哪些人处于风险中翻译中…
Organizations utilizing METIS DFS devices in environments with limited network segmentation are particularly at risk. Shared hosting environments where multiple customers share the same METIS DFS instance are also vulnerable. Legacy deployments using older, unpatched versions of METIS DFS are especially susceptible.
检测步骤翻译中…
• linux / server:
journalctl -u metisdfs | grep /console• linux / server:
ss -tulnp | grep /console• generic web:
curl -I <METIS_DFS_IP>/console• generic web:
grep -r /console /var/log/apache2/access.log攻击时间线
- Disclosure
disclosure
威胁情报
漏洞利用状态
EPSS
0.29% (52% 百分位)
CISA SSVC
CVSS 向量
这些指标意味着什么?
- Attack Vector
- 网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
- Attack Complexity
- 低 — 无需特殊条件,可以稳定地利用漏洞。
- Privileges Required
- 无 — 无需认证,无需凭证即可利用。
- User Interaction
- 无 — 攻击自动且无声,受害者无需任何操作。
- Scope
- 未改变 — 影响仅限于脆弱组件本身。
- Confidentiality
- 高 — 完全丧失机密性,攻击者可读取所有数据。
- Integrity
- 高 — 攻击者可写入、修改或删除任何数据。
- Availability
- 高 — 完全崩溃或资源耗尽,完全拒绝服务。
受影响的软件
弱点分类 (CWE)
时间线
- 已保留
- 发布日期
- 修改日期
- EPSS 更新日期
缓解措施和替代方案翻译中…
The primary mitigation for CVE-2026-2249 is to immediately upgrade METIS DFS devices to version 2.1.236 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds such as restricting network access to the /console endpoint using firewalls or access control lists. While not a complete solution, this can reduce the attack surface. Monitor network traffic for suspicious activity targeting the /console endpoint. After upgrading, confirm the vulnerability is resolved by attempting to access the /console endpoint and verifying that authentication is required.
修复方法翻译中…
Actualice el software METIS DFS a una versión posterior a oscore 2.1.234-r18 y oscore 2.1.235-r19. Consulte el sitio web del proveedor para obtener la última versión y las instrucciones de actualización. Deshabilite o restrinja el acceso al endpoint /console si no es necesario.
CVE 安全通讯
漏洞分析和关键警报直接发送到您的邮箱。
常见问题翻译中…
What is CVE-2026-2249 — Unauth Web Shell in METIS DFS?
CVE-2026-2249 is a critical vulnerability in METIS DFS versions up to 2.1.234-r18 that allows unauthenticated remote code execution via the /console endpoint, potentially leading to full system compromise.
Am I affected by CVE-2026-2249 in METIS DFS?
You are affected if you are running METIS DFS with oscore versions less than or equal to 2.1.234-r18. Check your version and upgrade immediately if vulnerable.
How do I fix CVE-2026-2249 in METIS DFS?
Upgrade your METIS DFS device to version 2.1.236 or later. As a temporary workaround, restrict network access to the /console endpoint using firewalls or access control lists.
Is CVE-2026-2249 being actively exploited?
While no active exploitation has been confirmed, the vulnerability's ease of exploitation suggests a high probability of exploitation. Monitor your systems closely.
Where can I find the official METIS DFS advisory for CVE-2026-2249?
Refer to the official METIS DFS security advisory for detailed information and updates regarding CVE-2026-2249.