From c0e43a1bb889bf324590c140d2fce2c802a2556c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 17 Sep 2021 17:00:50 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/3xxx/CVE-2021-3815.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40825.json | 64 ++++++++++++++++++++++++++++++---- 2021/41xxx/CVE-2021-41319.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41320.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41321.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41322.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41323.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41324.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41325.json | 18 ++++++++++ 9 files changed, 202 insertions(+), 6 deletions(-) create mode 100644 2021/3xxx/CVE-2021-3815.json create mode 100644 2021/41xxx/CVE-2021-41319.json create mode 100644 2021/41xxx/CVE-2021-41320.json create mode 100644 2021/41xxx/CVE-2021-41321.json create mode 100644 2021/41xxx/CVE-2021-41322.json create mode 100644 2021/41xxx/CVE-2021-41323.json create mode 100644 2021/41xxx/CVE-2021-41324.json create mode 100644 2021/41xxx/CVE-2021-41325.json diff --git a/2021/3xxx/CVE-2021-3815.json b/2021/3xxx/CVE-2021-3815.json new file mode 100644 index 00000000000..fc1f1e5994e --- /dev/null +++ b/2021/3xxx/CVE-2021-3815.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3815", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40825.json b/2021/40xxx/CVE-2021-40825.json index 36b557ac7e8..8c12a22333a 100644 --- a/2021/40xxx/CVE-2021-40825.json +++ b/2021/40xxx/CVE-2021-40825.json @@ -1,18 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-40825", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-40825", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "nLight ECLYPSE (nECY) system Controllers running software prior to 1.17.21245.754 contain a default key vulnerability. The nECY does not force a change to the key upon the initial configuration of an affected device. nECY system controllers utilize an encrypted channel to secure SensorViewTM configuration and monitoring software and nECY to nECY communications. Impacted devices are at risk of exploitation. A remote attacker with IP access to an impacted device could submit lighting control commands to the nECY by leveraging the default key. A successful attack may result in the attacker gaining the ability to modify lighting conditions or gain the ability to update the software on lighting devices. The impacted key is referred to as the SensorView Password in the nECY nLight Explorer Interface and the Gateway Password in the SensorView application. An attacker cannot authenticate to or modify the configuration or software of the nECY system controller." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.acuitybrands.com/products/detail/588952/nlight/necy-system-controller/nlight-eclypset-system-controller", + "refsource": "MISC", + "name": "https://www.acuitybrands.com/products/detail/588952/nlight/necy-system-controller/nlight-eclypset-system-controller" + }, + { + "refsource": "MISC", + "name": "https://insights.acuitybrands.com/psirt-blog-2369078/nlight-eclypse-default-key-vulnerabiliy", + "url": "https://insights.acuitybrands.com/psirt-blog-2369078/nlight-eclypse-default-key-vulnerabiliy" + } + ] + }, + "source": { + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41319.json b/2021/41xxx/CVE-2021-41319.json new file mode 100644 index 00000000000..3ccce9c1250 --- /dev/null +++ b/2021/41xxx/CVE-2021-41319.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41319", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41320.json b/2021/41xxx/CVE-2021-41320.json new file mode 100644 index 00000000000..c1748e9148e --- /dev/null +++ b/2021/41xxx/CVE-2021-41320.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41320", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41321.json b/2021/41xxx/CVE-2021-41321.json new file mode 100644 index 00000000000..3c953d6b2b5 --- /dev/null +++ b/2021/41xxx/CVE-2021-41321.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41321", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41322.json b/2021/41xxx/CVE-2021-41322.json new file mode 100644 index 00000000000..25a5ebc63de --- /dev/null +++ b/2021/41xxx/CVE-2021-41322.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41322", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41323.json b/2021/41xxx/CVE-2021-41323.json new file mode 100644 index 00000000000..91ca3f2a589 --- /dev/null +++ b/2021/41xxx/CVE-2021-41323.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41323", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41324.json b/2021/41xxx/CVE-2021-41324.json new file mode 100644 index 00000000000..345f3bc69fc --- /dev/null +++ b/2021/41xxx/CVE-2021-41324.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41324", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41325.json b/2021/41xxx/CVE-2021-41325.json new file mode 100644 index 00000000000..a219ec9e8c9 --- /dev/null +++ b/2021/41xxx/CVE-2021-41325.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41325", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file