6 FatPipe CVE IDs

This commit is contained in:
Art Manion 2021-12-09 22:47:22 -05:00
parent 08c45934ca
commit 9b9d51f321
No known key found for this signature in database
GPG Key ID: 0305B3A0A408D124
6 changed files with 614 additions and 36 deletions

View File

@ -1,18 +1,137 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2021-27855",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": " FatPipe software allows privilege escalation"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WARP ",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
},
{
"product_name": "IPVPN",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
},
{
"product_name": "MPVPN",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
}
]
},
"vendor_name": "FatPipe"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote, authenticated attacker with read-only privileges to grant themselves administrative privileges. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA001."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862: Missing Authorization"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5685.php",
"refsource": "MISC",
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5685.php"
},
{
"name": "https://www.fatpipeinc.com/support/cve-list.php",
"refsource": "CONFIRM",
"url": "https://www.fatpipeinc.com/support/cve-list.php"
},
{
"name": "https://www.zeroscience.mk/codes/fatpipe_privesc.txt",
"refsource": "MISC",
"url": "https://www.zeroscience.mk/codes/fatpipe_privesc.txt"
}
]
},
"source": {
"advisory": "FPSA001",
"discovery": "EXTERNAL"
}
}

View File

@ -1,18 +1,125 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2021-27856",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": " FatPipe software administrative account with no password"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WARP ",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
},
{
"product_name": "IPVPN",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
},
{
"product_name": "MPVPN",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
}
]
},
"vendor_name": "FatPipe"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 includes an account named \"cmuser\" that has administrative privileges and no password. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA002."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"references": {
"reference_data": [
{
"name": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5684.php",
"refsource": "MISC",
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5684.php"
},
{
"name": "https://www.fatpipeinc.com/support/cve-list.php",
"refsource": "CONFIRM",
"url": "https://www.fatpipeinc.com/support/cve-list.php"
},
{
"name": "https://www.zeroscience.mk/codes/fatpipe_backdoor.txt",
"refsource": "MISC",
"url": "https://www.zeroscience.mk/codes/fatpipe_backdoor.txt"
}
]
},
"source": {
"advisory": "FPSA002",
"discovery": "EXTERNAL"
}
}

View File

@ -1,18 +1,137 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2021-27857",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": " FatPipe software allows unauthenticated configuration download"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WARP ",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
},
{
"product_name": "IPVPN",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
},
{
"product_name": "MPVPN",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
}
]
},
"vendor_name": "FatPipe"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A missing authorization vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote, unauthenticated attacker to download a configuration archive. The attacker needs to know or correctly guess the hostname of the target system since the hostname is used as part of the configuration archive file name. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA003."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862: Missing Authorization"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5683.php",
"refsource": "MISC",
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5683.php"
},
{
"name": "https://www.fatpipeinc.com/support/cve-list.php",
"refsource": "CONFIRM",
"url": "https://www.fatpipeinc.com/support/cve-list.php"
},
{
"name": "https://www.zeroscience.mk/codes/fatpipe_configdl.txt",
"refsource": "MISC",
"url": "https://www.zeroscience.mk/codes/fatpipe_configdl.txt"
}
]
},
"source": {
"advisory": "FPSA003",
"discovery": "EXTERNAL"
}
}

View File

@ -1,18 +1,137 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2021-27858",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Missing authorization vulnerability in FatPipe software"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WARP ",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
},
{
"product_name": "IPVPN",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
},
{
"product_name": "MPVPN",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
}
]
},
"vendor_name": "FatPipe"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A missing authorization vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote attacker to access at least the URL \"/fpui/jsp/index.jsp\" leading to unknown impact, presumably some violation of confidentiality. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA004."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862: Missing Authorization"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5682.php",
"refsource": "MISC",
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5682.php"
},
{
"name": "https://www.fatpipeinc.com/support/cve-list.php",
"refsource": "CONFIRM",
"url": "https://www.fatpipeinc.com/support/cve-list.php"
},
{
"name": "https://www.zeroscience.mk/codes/fatpipe_auth.txt",
"refsource": "MISC",
"url": "https://www.zeroscience.mk/codes/fatpipe_auth.txt"
}
]
},
"source": {
"advisory": "FPSA004",
"discovery": "EXTERNAL"
}
}

View File

@ -1,18 +1,137 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2021-27859",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Missing authorization vulnerability in FatPipe software"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WARP ",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
},
{
"product_name": "IPVPN",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
},
{
"product_name": "MPVPN",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.1",
"version_value": "10.1.2r60p91"
},
{
"version_affected": "<",
"version_name": "10.2",
"version_value": "10.2.2r42"
}
]
}
}
]
},
"vendor_name": "FatPipe"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A missing authorization vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows an authenticated, remote attacker with read-only privileges to create an account with administrative privileges. Older versions of FatPipe software may also be vulnerable. This does not appear to be a CSRF vulnerability. The FatPipe advisory identifier for this vulnerability is FPSA005."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862: Missing Authorization"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5681.php",
"refsource": "MISC",
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5681.php"
},
{
"name": "https://www.fatpipeinc.com/support/cve-list.php",
"refsource": "CONFIRM",
"url": "https://www.fatpipeinc.com/support/cve-list.php"
},
{
"name": "https://www.zeroscience.mk/codes/fatpipe_csrf.txt",
"refsource": "MISC",
"url": "https://www.zeroscience.mk/codes/fatpipe_csrf.txt"
}
]
},
"source": {
"advisory": "FPSA005",
"discovery": "EXTERNAL"
}
}

View File

@ -76,7 +76,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p92 and 10.2.2r44p1 could allow a remote, unauthenticated attacker to upload a file to any location on the filesystem. The FatPipe advisory identifier for this vulnerability is FPSA006.\n\n"
"value": "A vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p92 and 10.2.2r44p1 allows a remote, unauthenticated attacker to upload a file to any location on the filesystem. The FatPipe advisory identifier for this vulnerability is FPSA006."
}
]
},
@ -113,11 +113,6 @@
},
"references": {
"reference_data": [
{
"name": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5681.php",
"refsource": "MISC",
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5681.php"
},
{
"name": "https://www.fatpipeinc.com/support/cve-list.php",
"refsource": "CONFIRM",