{ "id": "CVE-2021-28805", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2021-06-11T07:15:06.593", "lastModified": "2022-10-18T21:06:17.947", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.3 build 20210505 on QSW-M2108-2C; versions prior to 1.0.3 build 20210505 on QSW-M2108-2S; versions prior to 1.0.3 build 20210505 on QSW-M2108R-2C; versions prior to 1.0.12 build 20210506 on QSW-M408." }, { "lang": "es", "value": "Se ha reportado la inclusi\u00f3n de informaci\u00f3n confidencial en el c\u00f3digo fuente que afecta a determinados switches de QNAP que ejecutan QSS. Si es explotada, esta vulnerabilidad permite a atacantes leer datos de la aplicaci\u00f3n. Este problema afecta: QNAP Systems Inc. QSS versiones anteriores a 1.0.3 build 20210505 en QSW-M2108-2C; versiones anteriores a 1.0.3 build 20210505 en QSW-M2108-2S; versiones anteriores a 1.0.3 build 20210505 en QSW-M2108R-2C; versiones anteriores a 1.0.12 build 20210506 en QSW-M408" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 1.8, "impactScore": 3.6 }, { "source": "security@qnapsecurity.com.tw", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1 }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-200" } ] }, { "source": "security@qnapsecurity.com.tw", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-540" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:qnap:qss:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.3", "matchCriteriaId": "74B6E008-6B5D-48EB-99B4-DB9BC1120F8E" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:qnap:qsw-m2108-2c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A690794E-3F9B-47DA-A365-E8F100C730E2" }, { "vulnerable": false, "criteria": "cpe:2.3:h:qnap:qsw-m2108-2s:-:*:*:*:*:*:*:*", "matchCriteriaId": "21692724-A864-4CEB-898C-4E6691C403C1" }, { "vulnerable": false, "criteria": "cpe:2.3:h:qnap:qsw-m2108r-2c:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F5E9FC-2CE2-473F-81C1-676BCCFFBD3D" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:qnap:qss:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.12", "matchCriteriaId": "4D07C936-1C05-4269-8DC9-9AF534B5177B" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:qnap:qsw-m408:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D7605B1-0C50-4CF5-81A8-61FE897DA748" } ] } ] } ], "references": [ { "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-24", "source": "security@qnapsecurity.com.tw", "tags": [ "Vendor Advisory" ] } ] }