2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-37400" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2021-12-28T13:15:08.207" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T06:15:05.053" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded."
} ,
{
"lang" : "es" ,
"value" : "Un atacante puede obtener las credenciales de usuario de la comunicaci\u00f3n entre el PLC y el software. Como resultado, el programa de usuario del PLC puede ser cargado, alterado y/o descargado"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-522"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:idec:data_file_manager:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.12.1" ,
"matchCriteriaId" : "5E7A2720-6B29-4BD1-B85B-293850D804A8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:idec:windedit:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.3.1" ,
"matchCriteriaId" : "FA314D4B-B187-4238-B341-E2B9F94EBEBA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:idec:windldr:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "8.19.1" ,
"matchCriteriaId" : "7ED0922F-93CB-41B3-A468-44845F428945"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:idec:microsmart_plus_fc6b_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.31" ,
"matchCriteriaId" : "950DD61E-60D8-4102-A18F-18A4706DE647"
2023-04-24 12:24:31 +02:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:idec:microsmart_plus_fc6b:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2FF6D25F-C546-4C37-B01E-E71BD2AF09EB"
2023-04-24 12:24:31 +02:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:idec:microsmart_plus_fc6a_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.91" ,
"matchCriteriaId" : "01FFD59B-27E0-4D27-A339-FE78D7407C02"
2023-04-24 12:24:31 +02:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:idec:microsmart_plus_fc6a:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6CFD58FF-AAE9-47F8-971C-442E2E8C4499"
2023-04-24 12:24:31 +02:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:idec:microsmart_fc6b_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.31" ,
"matchCriteriaId" : "24BEE40B-C239-4A38-B9EE-0AAD7699D53E"
2023-04-24 12:24:31 +02:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:idec:microsmart_fc6b:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "051DFC18-8576-40AF-96A0-2434230234F4"
2023-04-24 12:24:31 +02:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:idec:microsmart_fc6a_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.32" ,
"matchCriteriaId" : "59A9BAF0-7AFD-4918-81E2-6949B71E4208"
2023-04-24 12:24:31 +02:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:idec:microsmart_fc6a:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "892DE7A7-7D54-4EE5-97B7-2B8A0B190DFB"
2023-04-24 12:24:31 +02:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:idec:ft1a_smartaxix_pro_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.31" ,
"matchCriteriaId" : "7F546B0A-0B08-4B79-87A8-1286F334339E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:idec:ft1a_smartaxix_pro:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B13D383E-A48F-4C5A-B592-3356523FEEB1"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:idec:ft1a_smartaxix_lite_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.31" ,
"matchCriteriaId" : "401ED91B-67F5-4319-8B66-C028B1AB09A6"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:idec:ft1a_smartaxix_lite:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2FA6299D-C20C-4C04-B6F1-CE3DE1167770"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://jvn.jp/en/vu/JVNVU92279973/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://us.idec.com/idec-us/en/USD/Programmable-Logic-Controller/Micro-PLC/FC6A-MicroSmart/c/MicroSmart_FC6A" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://us.idec.com/idec-us/en/USD/Software-Downloads-Automation-Organizer" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://www.idec.com/home/lp/pdf/2021-12-24-PLC.pdf" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://jvn.jp/en/vu/JVNVU92279973/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://us.idec.com/idec-us/en/USD/Programmable-Logic-Controller/Micro-PLC/FC6A-MicroSmart/c/MicroSmart_FC6A" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://us.idec.com/idec-us/en/USD/Software-Downloads-Automation-Organizer" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://www.idec.com/home/lp/pdf/2021-12-24-PLC.pdf" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}