{ "id": "CVE-2021-39280", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-06T21:15:07.837", "lastModified": "2022-02-11T03:19:35.557", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Certain Korenix JetWave devices allow authenticated users to execute arbitrary code as root via /syscmd.asp. This affects 2212X before 1.9.1, 2212S before 1.9.1, 2212G before 1.8, 3220 V3 before 1.5.1, 3420 V3 before 1.5.1, and 2311 through 2022-01-31." }, { "lang": "es", "value": "Algunos dispositivos Korenix JetWave permiten a usuarios autenticados ejecutar c\u00f3digo arbitrario como root por medio del archivo /syscmd.asp. Esto afecta al 2212X versiones anteriores a 1.9.1, al 2212S versiones anteriores a 1.9.1, al 2212G versiones anteriores a 1.8, al 3220 V3 versiones anteriores a 1.5.1, al 3420 V3 versiones anteriores a 1.5.1 y al 2311 hasta el 31-01-2022" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 9.0 }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:korenix:jetwave_2212s_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.9.1", "matchCriteriaId": "6476B909-64EC-474E-B14C-C0B96B79D48A" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:korenix:jetwave_2212s:-:*:*:*:*:*:*:*", "matchCriteriaId": "22491473-357B-4E88-9006-6688DCA38D67" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:korenix:jetwave_2212g_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.8", "matchCriteriaId": "B75752AC-0017-4D03-AD40-C9F0111A343A" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:korenix:jetwave_2212g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8CF79B1-A8F9-4A3E-998A-8A7440659560" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:korenix:jetwave_2311_firmware:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.2", "matchCriteriaId": "876F3CB2-88AD-4DD5-9F63-48D2AF31E12C" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:korenix:jetwave_2311:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFCA04DB-7738-4076-9D6B-22CE1C283806" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:korenix:jetwave_3220_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.5.1", "matchCriteriaId": "5DF98100-C46B-4F3A-BE1E-55DAB1833855" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:korenix:jetwave_3220:3:*:*:*:*:*:*:*", "matchCriteriaId": "05B58CEF-952D-42E1-BC24-2708EA61D8DB" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:korenix:jetwave_3420_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.5.1", "matchCriteriaId": "5443D47C-DB22-4182-B1F1-80DB5726DE9C" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:korenix:jetwave_3420:3:*:*:*:*:*:*:*", "matchCriteriaId": "D703E252-53AA-4811-8677-1CB49EE7CDF2" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:korenix:jetwave_2212x_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.9.1", "matchCriteriaId": "EA11DDA4-4506-4E79-AD06-82E730FFBA94" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:korenix:jetwave_2212x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1DB499F-F9EB-457F-9FFA-AAB262C503B9" } ] } ] } ], "references": [ { "url": "http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://www.korenix.com/en/product/search.aspx?kw=JetWave", "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ] } ] }