2024-12-08 03:06:42 +00:00

229 lines
6.7 KiB
JSON

{
"id": "CVE-2021-44746",
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
"published": "2022-02-01T15:15:07.960",
"lastModified": "2024-11-21T06:31:31.060",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "UNIVERGE DT 820 V3.2.7.0 and prior, UNIVERGE DT 830 V5.2.7.0 and prior, UNIVERGE DT 930 V2.4.0.0 and prior, IP Phone Manager V8.9.1 and prior, Data Maintenance Tool for DT900 Series V5.3.0.0 and prior, Data Maintenance Tool for DT800 Series V4.2.0.0 and prior allows a remote attacker who can access to the internal network, the configuration information may be obtained."
},
{
"lang": "es",
"value": "UNIVERGE DT 820 versiones V3.2.7.0 y anteriores, UNIVERGE DT 830 versiones V5.2.7.0 y anteriores, UNIVERGE DT 930 versiones V2.4.0.0 y anteriores, IP Phone Manager versiones V8.9.1 y anteriores, Data Maintenance Tool for DT900 Series versiones V5.3.0.0 y anteriores, Data Maintenance Tool for DT800 Series versiones V4.2.0.0 y anteriores permiten que un atacante remoto que pueda acceder a la red interna, pueda obtener la informaci\u00f3n de configuraci\u00f3n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nec:univerge_dt830_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.2.7.0",
"matchCriteriaId": "21C737B4-8BBD-4778-B5DC-2711BF8B81D7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nec:univerge_dt830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD6A37BD-F29F-486A-B720-8A0FE0D649FA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nec:univerge_dt820_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.2.7.0",
"matchCriteriaId": "DDCC5D81-2C29-424A-9436-89F39FBDE2BC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nec:univerge_dt820:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA101E60-B52E-4968-B012-903086A152CC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nec:univerge_dt930_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.4.0.0",
"matchCriteriaId": "68D2920E-101A-4209-9AF3-7BDD3A006FFC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nec:univerge_dt930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC3A718-D46C-400F-93CE-BEE0E8C0FE6F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nec:univerge_dt900_data_maintenance_tool:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.3.0.0",
"matchCriteriaId": "69E42A84-0201-43E6-977F-8439195E1D26"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nec:univerge_dt800_data_maintenance_tool:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.2.0.0",
"matchCriteriaId": "E30375D6-06E6-4837-8738-647EDE37FEBD"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nec:univerge_ip_phone_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.9.1",
"matchCriteriaId": "A8052BA2-3EE8-42A4-B448-922DB349B2C3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.necplatforms.co.jp/en/product/security_adv/211217.html",
"source": "psirt-info@cyber.jp.nec.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.necplatforms.co.jp/en/product/security_adv/211217.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}