[Suggested description] An issue was discovered in QSC Q-SYS Core Manager 8.2.1. By utilizing the TFTP service running on UDP port 69, a remote attacker can perform a directory traversal and obtain operating system files via a TFTP GET request, as demonstrated by reading /etc/passwd or /proc/version. ------------------------------------------ [Vulnerability Type] Directory Traversal ------------------------------------------ [Vendor of Product] QSC LLC ------------------------------------------ [Affected Product Code Base] Q-SYS Core Manager - Version 8.2.1 ------------------------------------------ [Affected Component] TFTP Service running on UDP port 69 allows for retrieval of arbitrary files through a TFTP GET request ------------------------------------------ [Attack Type] Remote ------------------------------------------ [Impact Information Disclosure] true ------------------------------------------ [Attack Vectors] Remote while unauthenticated to the system ------------------------------------------ [Reference] https://q-syshelp.qsc.com/Content/Core_Manager/CoreManager_Overview.htm ------------------------------------------ [Discoverer] Kevin Randall