René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

117 lines
3.5 KiB
JSON

{
"id": "CVE-2021-28913",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-09-09T18:15:09.030",
"lastModified": "2021-09-20T20:26:57.880",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow unauthenticated attackers access to /webif/SecurityModule to validate the so called and hard coded unique 'eibPort String' which acts as the root SSH key passphrase. This is usable and part of an attack chain to gain SSH root access."
},
{
"lang": "es",
"value": "BAB TECHNOLOGIE GmbH eibPort versiones V3 anteriores a 3.9.1, permite a atacantes no autenticados acceder a /webif/SecurityModule para comprender la llamada y codificada cadena \u00fanica \"eibPort String\" que act\u00faa como la frase de contrase\u00f1a de la clave SSH root. Esto es usable y forma parte de una cadena de ataque para conseguir acceso root SSH"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:bab-technologie:eibport_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.9.1",
"matchCriteriaId": "E1608441-C7C0-45B8-8141-8B1A0477749E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bab-technologie:eibport:v3:*:*:*:*:*:*:*",
"matchCriteriaId": "36B8476A-E1CC-4C60-9EC1-05AD71A3EF56"
}
]
}
]
}
],
"references": [
{
"url": "https://psytester.github.io/CVE-2021-28913",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}