René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

371 lines
10 KiB
JSON

{
"id": "CVE-2021-26620",
"sourceIdentifier": "vuln@krcert.or.kr",
"published": "2022-03-25T19:15:08.687",
"lastModified": "2022-03-31T14:34:48.607",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An improper authentication vulnerability leading to information leakage was discovered in iptime NAS2dual. Remote attackers are able to steal important information in the server by exploiting vulnerabilities such as insufficient authentication when accessing the shared folder and changing user\u2019s passwords."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad de autenticaci\u00f3n inapropiada conllevando a un filtrado de informaci\u00f3n en iptime NAS2dual. Los atacantes remotos son capaces de robar informaci\u00f3n importante en el servidor al explotar vulnerabilidades como la autenticaci\u00f3n insuficiente cuando es accedida a la carpeta compartida y son cambiadas las contrase\u00f1as de usuarios"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "vuln@krcert.or.kr",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "vuln@krcert.or.kr",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:iptime:nas101_firmware:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.4.82",
"matchCriteriaId": "884756F6-7AD4-4427-A354-7C9428716CB8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:iptime:nas101:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B46EE9BB-2CA6-49E1-BB46-9621805C89A0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:iptime:nas1dual_firmware:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.4.82",
"matchCriteriaId": "0851FBDB-7C72-4072-9EA4-905F69C36CBC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:iptime:nas1dual:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ACEC464-70B3-452B-A1A3-594C697E3AB3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:iptime:nas2dual_firmware:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.4.82",
"matchCriteriaId": "047128B3-8F89-48F0-8982-3C51B6CFC769"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:iptime:nas2dual:-:*:*:*:*:*:*:*",
"matchCriteriaId": "271D21D5-A55E-4D4F-8473-5A7A67573DEA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:iptime:nas3_firmware:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.4.82",
"matchCriteriaId": "CD158E92-E69D-47E8-BABA-16933160E1FE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:iptime:nas3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "409E183B-5919-48FF-A121-EB89E58D1956"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:iptime:nas4_firmware:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.4.82",
"matchCriteriaId": "EE790ADF-B496-49CB-AF73-9612141DA38B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:iptime:nas4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5681FB7D-A7F5-48F1-AE10-79F5B64081E5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:iptime:nas4dual_firmware:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.4.82",
"matchCriteriaId": "80AC9D9F-57CF-4BAC-8988-FCE44F53C4E8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:iptime:nas4dual:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0429CC1A-B95C-4FB0-90D6-D6CAD8E1CC14"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:iptime:nas-i_firmware:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.4.82",
"matchCriteriaId": "06940CF1-703F-44E6-9078-B2F1E64EA745"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:iptime:nas-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBE26B68-CC6F-4ABE-818A-8872A0753DC6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:iptime:nas-ii_firmware:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.4.82",
"matchCriteriaId": "78BDB206-048A-4D12-9AFC-36B06DFDD49F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:iptime:nas-ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C101E48-A4C0-418A-9FBD-AF6B9115B0A9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:iptime:nas-iie_firmware:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.4.82",
"matchCriteriaId": "8410D8F2-D177-4A96-8BD4-F9A96ECE699A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:iptime:nas-iie:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B6F0961-E444-4519-BC03-9BFADEDF73EE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66578",
"source": "vuln@krcert.or.kr",
"tags": [
"Third Party Advisory"
]
}
]
}