2024-07-14 02:06:08 +00:00

304 lines
9.8 KiB
JSON

{
"id": "CVE-2021-20999",
"sourceIdentifier": "info@cert.vde.com",
"published": "2021-05-13T14:15:18.150",
"lastModified": "2023-11-07T03:29:14.943",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Weidm\u00fcller u-controls and IoT-Gateways in versions up to 1.12.1 a network port intended only for device-internal usage is accidentally accessible via external network interfaces. By exploiting this vulnerability the device may be manipulated or the operation may be stopped."
},
{
"lang": "es",
"value": "En Weidm\u00fcller u-controls and IoT-Gateway en versiones hasta 1.12.1, se puede acceder accidentalmente a un puerto de red destinado \u00fanicamente para uso interno del dispositivo por medio de interfaces de red externas. Al explotar esta vulnerabilidad, el dispositivo puede ser manipulado o la operaci\u00f3n puede ser detenida"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "info@cert.vde.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "info@cert.vde.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-668"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:uc20-wl2000-ac_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.3.0",
"versionEndExcluding": "1.9.1",
"matchCriteriaId": "5A1E7682-E240-4D15-AC34-626C77BE41B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:uc20-wl2000-ac_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.10.0",
"versionEndExcluding": "1.10.3",
"matchCriteriaId": "0FF8472B-BBE3-4793-AF5F-E3AB4FB3D0E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:uc20-wl2000-ac_firmware:1.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1AF70A61-6C4A-4B07-B263-5E19CBCAD607"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:uc20-wl2000-ac_firmware:1.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A69023EC-EFA5-444C-9636-9855565AFF80"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:weidmueller:uc20-wl2000-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAD85D18-1A66-487D-80B3-C5E1285685DD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:uc20-wl2000-iot_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.3.0",
"versionEndExcluding": "1.9.1",
"matchCriteriaId": "3AE0D482-A42D-4545-A5C5-15B0ADD36A8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:uc20-wl2000-iot_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.10.0",
"versionEndExcluding": "1.10.3",
"matchCriteriaId": "00BD211A-944F-4074-9605-A78FFEB9F375"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:uc20-wl2000-iot_firmware:1.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3567D99A-8FC6-4663-8BFB-7AC1B5718D74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:uc20-wl2000-iot_firmware:1.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52E0A330-8B6D-4610-9F90-AA455E0C30A7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:weidmueller:uc20-wl2000-iot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B98578B6-9F39-4616-A240-0A09832A0A92"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:iot-gw30_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.3.0",
"versionEndExcluding": "1.9.1",
"matchCriteriaId": "7D37EA6C-392B-404D-8A2D-2038D45B9736"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:iot-gw30_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.10.0",
"versionEndExcluding": "1.10.3",
"matchCriteriaId": "82C07A83-6181-40D6-BAC5-0BFD2EB0775F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:iot-gw30_firmware:1.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7D00D166-D270-4CA8-AF12-D00E936C09D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:iot-gw30_firmware:1.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "799AAC8C-E0D9-4C56-A46E-5833E2FF4F36"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:weidmueller:iot-gw30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B247B94B-4845-4FCC-81E1-4880A7B2B0FE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:iot-gw30-4g-eu_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.3.0",
"versionEndExcluding": "1.9.1",
"matchCriteriaId": "FF37BFDC-99AC-4FE6-AE00-AAE5BCBC9A35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:iot-gw30-4g-eu_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.10.0",
"versionEndExcluding": "1.10.3",
"matchCriteriaId": "01983454-B4AE-4C7A-BC09-705FF0F1DB2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:iot-gw30-4g-eu_firmware:1.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6850EBC4-41BB-4845-9A87-AE3E7D9061B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:weidmueller:iot-gw30-4g-eu_firmware:1.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B93938B2-19B4-46D6-AB0B-1BC4FE559D91"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:weidmueller:iot-gw30-4g-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD44BDA-E67A-4088-AF77-55C0BEC5782B"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.vde.com/en-us/advisories/vde-2021-016",
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
]
}
]
}