"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-09-23 14:00:55 +00:00
parent cadbf87cd3
commit 5b12911b29
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
6 changed files with 857 additions and 36 deletions

View File

@ -1,18 +1,154 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2021-32959",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "AVEVA SuiteLink Server Buffer Overflow"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AVEVA System Platform 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA InTouch 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA Historian 2020 ",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA Communication Drivers Pack 2020 ",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2"
}
]
}
},
{
"product_name": "AVEVA Batch Management 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "2020"
}
]
}
},
{
"product_name": "AVEVA MES 2014",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2"
}
]
}
}
]
},
"vendor_name": "AVEVA Software, LLC"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Sharon Brizinov of Claroty reported these vulnerabilities to AVEVA"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Heap-based buffer overflow in SuiteLink server while processing commands 0x05/0x06"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122 Heap-based Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-003.pdf",
"refsource": "CONFIRM",
"url": "https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-003.pdf"
}
]
},
"solution": [
{
"lang": "eng",
"value": "AVEVA recommends organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation.\n\nUsers with affected versions of these products should apply the corresponding security update. Note a subset of the updates requires activation-based licensing.\n\nPlease see AVEVA security bulletin AVEVA-2021-003 for more information."
}
],
"source": {
"advisory": "ICSA-21-231-01",
"discovery": "UNKNOWN"
}
}

View File

@ -1,18 +1,155 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2021-08-19T15:00:00.000Z",
"ID": "CVE-2021-32963",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "AVEVA SuiteLink Server Null Pointer Dereference"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AVEVA System Platform 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA InTouch 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA Historian 2020 ",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA Communication Drivers Pack 2020 ",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2"
}
]
}
},
{
"product_name": "AVEVA Batch Management 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "2020"
}
]
}
},
{
"product_name": "AVEVA MES 2014",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2"
}
]
}
}
]
},
"vendor_name": "AVEVA Software, LLC"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Sharon Brizinov of Claroty reported these vulnerabilities to AVEVA"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Null pointer dereference in SuiteLink server while processing commands 0x03/0x10"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-476 NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-003.pdf",
"refsource": "CONFIRM",
"url": "https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-003.pdf"
}
]
},
"solution": [
{
"lang": "eng",
"value": "AVEVA recommends organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation.\n\nUsers with affected versions of these products should apply the corresponding security update. Note a subset of the updates requires activation-based licensing.\n\nPlease see AVEVA security bulletin AVEVA-2021-003 for more information."
}
],
"source": {
"advisory": "ICSA-21-231-01",
"discovery": "UNKNOWN"
}
}

View File

@ -1,18 +1,155 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2021-08-19T15:00:00.000Z",
"ID": "CVE-2021-32971",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "AVEVA SuiteLink Server Null Pointer Dereference"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AVEVA System Platform 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA InTouch 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA Historian 2020 ",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA Communication Drivers Pack 2020 ",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2"
}
]
}
},
{
"product_name": "AVEVA Batch Management 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "2020"
}
]
}
},
{
"product_name": "AVEVA MES 2014",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2"
}
]
}
}
]
},
"vendor_name": "AVEVA Software, LLC"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Sharon Brizinov of Claroty reported these vulnerabilities to AVEVA"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Null pointer dereference in SuiteLink server while processing command 0x07"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-476 NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-003.pdf",
"refsource": "CONFIRM",
"url": "https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-003.pdf"
}
]
},
"solution": [
{
"lang": "eng",
"value": "AVEVA recommends organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation.\n\nUsers with affected versions of these products should apply the corresponding security update. Note a subset of the updates requires activation-based licensing.\n\nPlease see AVEVA security bulletin AVEVA-2021-003 for more information."
}
],
"source": {
"advisory": "ICSA-21-231-01",
"discovery": "UNKNOWN"
}
}

View File

@ -1,18 +1,155 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2021-08-19T15:00:00.000Z",
"ID": "CVE-2021-32979",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "AVEVA SuiteLink Server Null Pointer Dereference"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AVEVA System Platform 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA InTouch 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA Historian 2020 ",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA Communication Drivers Pack 2020 ",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2"
}
]
}
},
{
"product_name": "AVEVA Batch Management 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "2020"
}
]
}
},
{
"product_name": "AVEVA MES 2014",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2"
}
]
}
}
]
},
"vendor_name": "AVEVA Software, LLC"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Sharon Brizinov of Claroty reported these vulnerabilities to AVEVA"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Null pointer dereference in SuiteLink server while processing commands 0x04/0x0a"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-476 NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-003.pdf",
"refsource": "CONFIRM",
"url": "https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-003.pdf"
}
]
},
"solution": [
{
"lang": "eng",
"value": "AVEVA recommends organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation.\n\nUsers with affected versions of these products should apply the corresponding security update. Note a subset of the updates requires activation-based licensing.\n\nPlease see AVEVA security bulletin AVEVA-2021-003 for more information."
}
],
"source": {
"advisory": "ICSA-21-231-01",
"discovery": "UNKNOWN"
}
}

View File

@ -1,18 +1,155 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2021-08-19T15:00:00.000Z",
"ID": "CVE-2021-32987",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "AVEVA SuiteLink Server Null Pointer Dereference"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AVEVA System Platform 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA InTouch 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA Historian 2020 ",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA Communication Drivers Pack 2020 ",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2"
}
]
}
},
{
"product_name": "AVEVA Batch Management 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "2020"
}
]
}
},
{
"product_name": "AVEVA MES 2014",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2"
}
]
}
}
]
},
"vendor_name": "AVEVA Software, LLC"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Sharon Brizinov of Claroty reported these vulnerabilities to AVEVA"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Null pointer dereference in SuiteLink server while processing command 0x0b"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-476 NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-003.pdf",
"refsource": "CONFIRM",
"url": "https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-003.pdf"
}
]
},
"solution": [
{
"lang": "eng",
"value": "AVEVA recommends organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation.\n\nUsers with affected versions of these products should apply the corresponding security update. Note a subset of the updates requires activation-based licensing.\n\nPlease see AVEVA security bulletin AVEVA-2021-003 for more information."
}
],
"source": {
"advisory": "ICSA-21-231-01",
"discovery": "UNKNOWN"
}
}

View File

@ -1,18 +1,155 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2021-08-19T15:00:00.000Z",
"ID": "CVE-2021-32999",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "AVEVA SuiteLink Server Improper Handling of Exceptional Conditions"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AVEVA System Platform 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA InTouch 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA Historian 2020 ",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2 P01"
}
]
}
},
{
"product_name": "AVEVA Communication Drivers Pack 2020 ",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2"
}
]
}
},
{
"product_name": "AVEVA Batch Management 2020",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "2020"
}
]
}
},
{
"product_name": "AVEVA MES 2014",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "R2"
}
]
}
}
]
},
"vendor_name": "AVEVA Software, LLC"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Sharon Brizinov of Claroty reported these vulnerabilities to AVEVA"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Improper handling of exceptional conditions in SuiteLink server while processing command 0x01"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-755 Improper Handling of Exceptional Conditions"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-003.pdf",
"refsource": "CONFIRM",
"url": "https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-003.pdf"
}
]
},
"solution": [
{
"lang": "eng",
"value": "AVEVA recommends organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation.\n\nUsers with affected versions of these products should apply the corresponding security update. Note a subset of the updates requires activation-based licensing.\n\nPlease see AVEVA security bulletin AVEVA-2021-003 for more information."
}
],
"source": {
"advisory": "ICSA-21-231-01",
"discovery": "UNKNOWN"
}
}