113 lines
3.2 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2021-27572",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-07T19:31:07.153",
"lastModified": "2021-05-17T17:38:25.517",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Emote Remote Mouse through 4.0.0.0. Authentication Bypass can occur via Packet Replay. Remote unauthenticated users can execute arbitrary code via crafted UDP packets even when passwords are set."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en Emote Remote Mouse versiones hasta.0.0.0. Una Omisi\u00f3n de Autenticaci\u00f3n puede ocurrir por medio de la Reproducci\u00f3n de Paquetes. Los usuarios remotos no autenticados pueden ejecutar c\u00f3digo arbitrario por medio de paquetes UDP dise\u00f1ados incluso cuando contrase\u00f1as son establecidas"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-294"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:remotemouse:emote_remote_mouse:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.0.0.0",
"matchCriteriaId": "EEF56CD0-B786-4BAD-B2EA-14543FE28655"
}
]
}
]
}
],
"references": [
{
"url": "https://axelp.io/MouseTrap",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://remotemouse.net/blog/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}