mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
162 lines
6.2 KiB
JSON
162 lines
6.2 KiB
JSON
{
|
|
"id": "CVE-2021-22980",
|
|
"sourceIdentifier": "f5sirt@f5.com",
|
|
"published": "2021-02-12T18:15:12.737",
|
|
"lastModified": "2021-02-19T17:57:27.057",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "In Edge Client version 7.2.x before 7.2.1.1, 7.1.9.x before 7.1.9.8, and 7.1.x-7.1.8.x before 7.1.8.5, an untrusted search path vulnerability in the BIG-IP APM Client Troubleshooting Utility (CTU) for Windows could allow an attacker to load a malicious DLL library from its current directory. User interaction is required to exploit this vulnerability in that the victim must run this utility on the Windows system. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En Edge Client versiones 7.2.x anteriores a 7.2.1.1, versiones 7.1.9.x anteriores 7.1.9.8 y versiones 7.1.x-7.1.8.x anteriores a 7.1.8.5, una vulnerabilidad de ruta de b\u00fasqueda no confiable en BIG-IP APM Client Troubleshooting Utility (CTU) para Windows, podr\u00eda permitir a un atacante cargar una biblioteca DLL maliciosa desde su directorio actual. Es requerida una interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que la v\u00edctima debe ejecutar esta utilidad en el sistema Windows. Nota: No son evaluadas las versiones de software que han alcanzado End of Software Development (EoSD)"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 6.9
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 3.4,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-426"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:access_policy_manager_clients:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.1.5",
|
|
"versionEndExcluding": "7.1.8.5",
|
|
"matchCriteriaId": "8BBCE39D-283C-4D80-A83D-D4C94F2C4D92"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:access_policy_manager_clients:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.1.9",
|
|
"versionEndExcluding": "7.1.9.8",
|
|
"matchCriteriaId": "6CB004A6-19ED-43E4-BE0B-76A742120B7D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:access_policy_manager_clients:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.2.1",
|
|
"versionEndExcluding": "7.2.1.1",
|
|
"matchCriteriaId": "B60E89ED-5C0A-4B21-A5C5-2F902E4A2891"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndIncluding": "11.6.5",
|
|
"matchCriteriaId": "2FBA9552-4645-4BFF-91A4-47B6A3414325"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.5",
|
|
"matchCriteriaId": "6C3B5688-0235-4D4F-A26C-440FF24A1B43"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "8C3A0A32-E425-4939-A30D-95A046ABBABB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndIncluding": "14.1.3",
|
|
"matchCriteriaId": "B176513C-86DD-4DA9-AB60-1D233091A9DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndIncluding": "15.1.2",
|
|
"matchCriteriaId": "5EF8BF70-3688-4DEE-BF08-835293783996"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "A7706F70-BF89-480E-9AA6-3FE447375138"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://support.f5.com/csp/article/K29282483",
|
|
"source": "f5sirt@f5.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |