cvelist/2021/34xxx/CVE-2021-34546.json

82 lines
2.8 KiB
JSON
Raw Normal View History

2021-06-10 14:00:51 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2021-06-10 16:00:50 +00:00
"ID": "CVE-2021-34546",
"STATE": "PUBLIC"
2021-06-10 14:00:51 +00:00
},
2021-06-10 16:00:50 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-06-10 14:00:51 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-06-10 16:00:50 +00:00
"value": "An unauthenticated attacker with physical access to a computer with NetSetMan Pro before 5.0 installed, that has the pre-logon profile switch button within the Windows logon screen enabled, is able to drop to an administrative shell and execute arbitrary commands as SYSTEM via the \"save log to file\" feature. To accomplish this, the attacker can navigate to cmd.exe."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.secuvera.de/advisories/secuvera-SA-2021-01.txt",
"refsource": "MISC",
"name": "https://www.secuvera.de/advisories/secuvera-SA-2021-01.txt"
},
{
"url": "https://www.secuvera.de",
"refsource": "MISC",
"name": "https://www.secuvera.de"
},
{
"url": "https://www.netsetman.com",
"refsource": "MISC",
"name": "https://www.netsetman.com"
2021-06-11 13:00:47 +00:00
},
{
"refsource": "FULLDISC",
"name": "20210611 secuvera-SA-2021-01: Privilege Escalation in NetSetMan Pro 4.7.2",
"url": "http://seclists.org/fulldisclosure/2021/Jun/17"
2021-06-11 17:00:51 +00:00
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163097/NetSetManPro-4.7.2-Privilege-Escalation.html",
"url": "http://packetstormsecurity.com/files/163097/NetSetManPro-4.7.2-Privilege-Escalation.html"
2021-06-10 14:00:51 +00:00
}
]
}
}