mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 09:41:31 +00:00
229 lines
6.8 KiB
JSON
229 lines
6.8 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2021-21723",
|
||
|
"sourceIdentifier": "psirt@zte.com.cn",
|
||
|
"published": "2021-01-26T18:16:18.803",
|
||
|
"lastModified": "2021-02-02T21:19:32.980",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Some ZTE products have a DoS vulnerability. Due to the improper handling of memory release in some specific scenarios, a remote attacker can trigger the vulnerability by performing a series of operations, resulting in memory leak, which may eventually lead to device denial of service. This affects: ZXR10 9904, ZXR10 9908, ZXR10 9916, ZXR10 9904-S, ZXR10 9908-S; all versions up to V1.01.10.B12."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Algunos productos ZTE presentan una vulnerabilidad de DoS. Debido al manejo inapropiado de la liberaci\u00f3n de la memoria en algunos escenarios espec\u00edficos, un atacante remoto puede desencadenar la vulnerabilidad al llevar a cabo una serie de operaciones, resultando en una p\u00e9rdida de memoria, que eventualmente puede conllevar a una denegaci\u00f3n de servicio del dispositivo. Esto afecta a: ZXR10 9904, ZXR10 9908, ZXR10 9916, ZXR10 9904-S, ZXR10 9908-S; todas las versiones hasta V1.01.10.B12"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 7.5,
|
||
|
"baseSeverity": "HIGH"
|
||
|
},
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 3.6
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "MEDIUM",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "PARTIAL",
|
||
|
"baseScore": 4.3
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 8.6,
|
||
|
"impactScore": 2.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-401"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:zte:zxr10_9904_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndIncluding": "v1.01.10.b12",
|
||
|
"matchCriteriaId": "4944E354-3041-46F1-A74B-82CC750273D8"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:zte:zxr10_9904:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D1747E7A-AB46-4D3C-BD82-659DAA58C43A"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:zte:zxr10_9908_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndIncluding": "v1.01.10.b12",
|
||
|
"matchCriteriaId": "722F3591-8D28-4D42-BF33-C67169F21BC3"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:zte:zxr10_9908:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F83A1243-E923-4735-AC8D-875605530747"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:zte:zxr10_9916_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndIncluding": "v1.01.10.b12",
|
||
|
"matchCriteriaId": "2F35755D-7919-4CC5-B9CA-E88FD4483D4C"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:zte:zxr10_9916:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E1DE8F4A-8A42-4C1C-82EA-85543F5E805D"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:zte:zxr10_9904-s_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndIncluding": "v1.01.10.b12",
|
||
|
"matchCriteriaId": "85884147-B665-404A-8117-4519732F7C1D"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:zte:zxr10_9904-s:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "78D0B84F-0C58-41C3-8083-BD74E9D0118D"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:zte:zxr10_9908-s_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndIncluding": "v1.01.10.b12",
|
||
|
"matchCriteriaId": "0602358F-5958-4172-AB42-8C77853A5347"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:zte:zxr10_9908-s:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "813FBCBD-4900-49C7-B0E2-C75DD3788694"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014424",
|
||
|
"source": "psirt@zte.com.cn",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|