2024-12-08 03:06:42 +00:00

126 lines
3.9 KiB
JSON

{
"id": "CVE-2021-20121",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2021-10-11T17:15:07.450",
"lastModified": "2024-11-21T05:45:57.780",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Telus Wi-Fi Hub (PRV65B444A-S-TS) with firmware version 3.00.20 is vulnerable to an authenticated arbitrary file read. An authenticated user with physical access to the device can read arbitrary files from the device by preparing and connecting a specially prepared USB drive to the device, and making a series of crafted requests to the device's web interface."
},
{
"lang": "es",
"value": "Telus Wi-Fi Hub (PRV65B444A-S-TS) con versi\u00f3n de firmware 3.00.20, es vulnerable a una lectura de archivos arbitraria autenticada. Un usuario autenticado con acceso f\u00edsico al dispositivo puede leer archivos arbitrarios desde el dispositivo preparando y conectando una unidad USB especialmente preparada al dispositivo, y realizando una serie de peticiones dise\u00f1adas a la interfaz web del dispositivo"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.4,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"baseScore": 1.9,
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:telus:prv65b444a-s-ts_firmware:3.00.20:*:*:*:*:*:*:*",
"matchCriteriaId": "80DB4F46-06BC-438F-A685-C4C1A2ACA69B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:telus:prv65b444a-s-ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BE94241-E1DE-41E0-B9F3-E479A181A743"
}
]
}
]
}
],
"references": [
{
"url": "https://www.tenable.com/security/research/tra-2021-41",
"source": "vulnreport@tenable.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2021-41",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}