2024-07-14 02:06:08 +00:00

122 lines
3.7 KiB
JSON

{
"id": "CVE-2021-28911",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-09-09T18:15:08.873",
"lastModified": "2021-09-20T20:37:02.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow unauthenticated attackers access to /tmp path which contains some sensitive data (e.g. device serial number). Having those info, a possible loginId can be self-calculated in a brute force attack against BMX interface. This is usable and part of an attack chain to gain SSH root access."
},
{
"lang": "es",
"value": "BAB TECHNOLOGIE GmbH eibPort versiones V3 anteriores a 3.9.1, permite a atacantes no autenticados acceder a la ruta /tmp que contiene algunos datos confidenciales (por ejemplo, el n\u00famero de serie del dispositivo). Teniendo esa informaci\u00f3n, un posible loginId puede ser auto calculado en un ataque de fuerza bruta contra la interfaz BMX. Esto es usable y forma parte de una cadena de ataque para conseguir acceso root SSH"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
},
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:bab-technologie:eibport_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.9.1",
"matchCriteriaId": "E1608441-C7C0-45B8-8141-8B1A0477749E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bab-technologie:eibport:v3:*:*:*:*:*:*:*",
"matchCriteriaId": "36B8476A-E1CC-4C60-9EC1-05AD71A3EF56"
}
]
}
]
}
],
"references": [
{
"url": "https://psytester.github.io/CVE-2021-28911",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}