2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-20999" ,
"sourceIdentifier" : "info@cert.vde.com" ,
"published" : "2021-05-13T14:15:18.150" ,
2023-11-07 21:03:21 +00:00
"lastModified" : "2023-11-07T03:29:14.943" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
2023-11-07 21:03:21 +00:00
"value" : "In Weidm\u00fcller u-controls and IoT-Gateways in versions up to 1.12.1 a network port intended only for device-internal usage is accidentally accessible via external network interfaces. By exploiting this vulnerability the device may be manipulated or the operation may be stopped."
2023-04-24 12:24:31 +02:00
} ,
{
"lang" : "es" ,
"value" : "En Weidm\u00fcller u-controls and IoT-Gateway en versiones hasta 1.12.1, se puede acceder accidentalmente a un puerto de red destinado \u00fanicamente para uso interno del dispositivo por medio de interfaces de red externas. Al explotar esta vulnerabilidad, el dispositivo puede ser manipulado o la operaci\u00f3n puede ser detenida"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
} ,
{
2024-04-04 08:46:00 +00:00
"source" : "info@cert.vde.com" ,
2023-04-24 12:24:31 +02:00
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.4 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.5
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 7.5
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
} ,
{
2024-04-04 08:46:00 +00:00
"source" : "info@cert.vde.com" ,
2023-04-24 12:24:31 +02:00
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-668"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:uc20-wl2000-ac_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.3.0" ,
"versionEndExcluding" : "1.9.1" ,
"matchCriteriaId" : "5A1E7682-E240-4D15-AC34-626C77BE41B1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:uc20-wl2000-ac_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.10.0" ,
"versionEndExcluding" : "1.10.3" ,
"matchCriteriaId" : "0FF8472B-BBE3-4793-AF5F-E3AB4FB3D0E1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:uc20-wl2000-ac_firmware:1.11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1AF70A61-6C4A-4B07-B263-5E19CBCAD607"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:uc20-wl2000-ac_firmware:1.12.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A69023EC-EFA5-444C-9636-9855565AFF80"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:weidmueller:uc20-wl2000-ac:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BAD85D18-1A66-487D-80B3-C5E1285685DD"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:uc20-wl2000-iot_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.3.0" ,
"versionEndExcluding" : "1.9.1" ,
"matchCriteriaId" : "3AE0D482-A42D-4545-A5C5-15B0ADD36A8C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:uc20-wl2000-iot_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.10.0" ,
"versionEndExcluding" : "1.10.3" ,
"matchCriteriaId" : "00BD211A-944F-4074-9605-A78FFEB9F375"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:uc20-wl2000-iot_firmware:1.11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3567D99A-8FC6-4663-8BFB-7AC1B5718D74"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:uc20-wl2000-iot_firmware:1.12.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "52E0A330-8B6D-4610-9F90-AA455E0C30A7"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:weidmueller:uc20-wl2000-iot:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B98578B6-9F39-4616-A240-0A09832A0A92"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:iot-gw30_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.3.0" ,
"versionEndExcluding" : "1.9.1" ,
"matchCriteriaId" : "7D37EA6C-392B-404D-8A2D-2038D45B9736"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:iot-gw30_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.10.0" ,
"versionEndExcluding" : "1.10.3" ,
"matchCriteriaId" : "82C07A83-6181-40D6-BAC5-0BFD2EB0775F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:iot-gw30_firmware:1.11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7D00D166-D270-4CA8-AF12-D00E936C09D2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:iot-gw30_firmware:1.12.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "799AAC8C-E0D9-4C56-A46E-5833E2FF4F36"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:weidmueller:iot-gw30:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B247B94B-4845-4FCC-81E1-4880A7B2B0FE"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:iot-gw30-4g-eu_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.3.0" ,
"versionEndExcluding" : "1.9.1" ,
"matchCriteriaId" : "FF37BFDC-99AC-4FE6-AE00-AAE5BCBC9A35"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:iot-gw30-4g-eu_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.10.0" ,
"versionEndExcluding" : "1.10.3" ,
"matchCriteriaId" : "01983454-B4AE-4C7A-BC09-705FF0F1DB2B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:iot-gw30-4g-eu_firmware:1.11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6850EBC4-41BB-4845-9A87-AE3E7D9061B8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:weidmueller:iot-gw30-4g-eu_firmware:1.12.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B93938B2-19B4-46D6-AB0B-1BC4FE559D91"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:weidmueller:iot-gw30-4g-eu:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4BD44BDA-E67A-4088-AF77-55C0BEC5782B"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://cert.vde.com/en-us/advisories/vde-2021-016" ,
"source" : "info@cert.vde.com" ,
"tags" : [
"Third Party Advisory"
]
}
]
}