mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
138 lines
5.4 KiB
JSON
138 lines
5.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cert@cert.org",
|
|
"DATE_PUBLIC": "2021-09-27T00:00:00.000Z",
|
|
"ID": "CVE-2021-27856",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": " FatPipe software administrative account with no password"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "WARP ",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.1",
|
|
"version_value": "10.1.2r60p91"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.2",
|
|
"version_value": "10.2.2r42"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "IPVPN",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.1",
|
|
"version_value": "10.1.2r60p91"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.2",
|
|
"version_value": "10.2.2r42"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "MPVPN",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.1",
|
|
"version_value": "10.1.2r60p91"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.2",
|
|
"version_value": "10.2.2r42"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "FatPipe"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 includes an account named \"cmuser\" that has administrative privileges and no password. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA002."
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Default administrative account with no password"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5684.php",
|
|
"refsource": "MISC",
|
|
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5684.php"
|
|
},
|
|
{
|
|
"name": "https://www.fatpipeinc.com/support/cve-list.php",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.fatpipeinc.com/support/cve-list.php"
|
|
},
|
|
{
|
|
"name": "https://www.zeroscience.mk/codes/fatpipe_backdoor.txt",
|
|
"refsource": "MISC",
|
|
"url": "https://www.zeroscience.mk/codes/fatpipe_backdoor.txt"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "FPSA002",
|
|
"discovery": "EXTERNAL"
|
|
}
|
|
} |