{"vulnerability": "CVE-2021-3505", "sightings": [{"uuid": "99cdf49b-aa2a-4acd-bf5c-967071c1d765", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35052", "type": "published-proof-of-concept", "source": "https://t.me/cKure/7712", "content": "CVE-2021-35052: WinRar remote code execution.\n\nWinRAR\u2019s vulnerable trialware: when free software isn\u2019t free.\n\nhttps://swarm.ptsecurity.com/winrars-vulnerable-trialware-when-free-software-isnt-free/\n\nhttps://thehackernews.com/2021/10/bug-in-free-winrar-software-could-let.html", "creation_timestamp": "2021-10-21T20:47:36.000000Z"}, {"uuid": "bb3e3363-6718-426b-a6d6-a21d81b794e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35052", "type": "published-proof-of-concept", "source": "https://t.me/ptswarm/50", "content": "RARLAB fixed a MITM (CVE-2021-35052) in WinRAR found by our researcher Igor Sak-Sakovskiy.\n\nThis attack could be leveraged to achieve code execution on a user's machine.\n\nAdvisory: https://win-rar.com/singlenewsview.html?L=0&amp;tx_ttnews%5Btt_news%5D=165&amp;cHash=1", "creation_timestamp": "2021-07-01T13:34:49.000000Z"}, {"uuid": "4ba26b2a-b794-4719-90b0-c61b9ae5fffe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35052", "type": "published-proof-of-concept", "source": "https://t.me/ckuRED/37", "content": "CVE-2021-35052: WinRar remote code execution.\n\nWinRAR\u2019s vulnerable trialware: when free software isn\u2019t free.\n\nhttps://swarm.ptsecurity.com/winrars-vulnerable-trialware-when-free-software-isnt-free/\n\nhttps://thehackernews.com/2021/10/bug-in-free-winrar-software-could-let.html", "creation_timestamp": "2021-10-21T20:47:29.000000Z"}, {"uuid": "a7bda17d-ebbd-4f33-a53b-600f51da0995", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35055", "type": "seen", "source": "https://t.me/cibsecurity/34619", "content": "\u203c CVE-2021-35055 \u203c\n\nMediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-26T02:22:13.000000Z"}, {"uuid": "8df95775-f82e-426f-890a-64fda8a35a0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35052", "type": "seen", "source": "Telegram/5UaO6OFlyW1WODY-PqKpzihgJ0idIRymjRoaoGNRVATd6Og", "content": "", "creation_timestamp": "2021-10-22T06:57:54.000000Z"}, {"uuid": "6f279e54-5b77-47ee-a64e-5e8a98a594d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35052", "type": "seen", "source": "https://t.me/cibsecurity/32862", "content": "\u203c CVE-2021-35052 \u203c\n\nA component in Kaspersky Password Manager could allow an attacker to elevate a process Integrity level from Medium to High.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-23T18:21:14.000000Z"}, {"uuid": "80478bf6-629d-4ff2-bdd4-acd549b51f5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35053", "type": "seen", "source": "https://t.me/cibsecurity/31791", "content": "\u203c CVE-2021-35053 \u203c\n\nPossible system denial of service in case of arbitrary changing Firefox browser parameters. An attacker could change specific Firefox browser parameters file in a certain way and then reboot the system to make the system unbootable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-03T23:23:47.000000Z"}, {"uuid": "335a79ca-d091-43a8-9447-c3be4d815149", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35052", "type": "seen", "source": "https://t.me/SecLabNews/11096", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 WinRAR \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u043a\u043e\u0434 \u0431\u0435\u0437 \u0432\u0435\u0434\u043e\u043c\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\n\n\u0421\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u043a \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Positive Technologies \u0418\u0433\u043e\u0440\u044c \u0421\u0430\u043a-\u0421\u0430\u043a\u043e\u0432\u0441\u043a\u0438\u0439 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u043e\u043f\u0430\u0441\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0430\u0440\u0445\u0438\u0432\u0430\u0442\u043e\u0440\u0435 \u0444\u0430\u0439\u043b\u043e\u0432 WinRAR. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2021-35052, \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 web-\u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 \u0434\u043b\u044f \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0438\u0439 WinRAR web notifier, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0439\u0441\u044f \u0434\u043b\u044f \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u043e\u0431 \u0438\u0441\u0442\u0435\u0447\u0435\u043d\u0438\u0438 \u043f\u0440\u043e\u0431\u043d\u043e\u0433\u043e \u043f\u0435\u0440\u0438\u043e\u0434\u0430. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 WinRAR \u0434\u043e 6.02 beta 1.\n\n\u041f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u0421\u0430\u043a-\u0421\u0430\u043a\u043e\u0432\u0441\u043a\u043e\u0433\u043e, \u0434\u043b\u044f \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u0435\u043d\u0438\u044f MITM-\u0430\u0442\u0430\u043a\u0438 \u0447\u0435\u0440\u0435\u0437 \u0434\u0430\u043d\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043d\u0443\u0436\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u0442\u043e\u0447\u043a\u0443 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 Wi-Fi, \u0432\u0437\u043b\u043e\u043c\u0430\u0442\u044c \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440 \u0438 \u043f\u043e\u0434\u043c\u0435\u043d\u0438\u0442\u044c DNS \u0438\u043b\u0438 \u0436\u0435 \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u044c\u0441\u044f \u0441 \u0436\u0435\u0440\u0442\u0432\u043e\u0439 \u0432 \u043e\u0434\u043d\u043e\u0439 \u0441\u0435\u0442\u0438.\n\n \u0414\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f SMB-\u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c, \u043e\u0434\u043d\u0430\u043a\u043e \u0437\u0434\u0435\u0441\u044c \u0435\u0441\u0442\u044c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u043f\u043e \u0447\u0435\u0440\u043d\u043e\u043c\u0443 \u0441\u043f\u0438\u0441\u043a\u0443 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u043c\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432. \u0422\u0430\u043a, \u043f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435 \u0444\u0430\u0439\u043b\u043e\u0432 \u0441 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f\u043c\u0438 bat, vbs, exe \u0438 msi \u043f\u043e\u044f\u0432\u0438\u0442\u0441\u044f \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435 \u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u043c \u0444\u0430\u0439\u043b\u0435, \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u044e\u0449\u0435\u0435 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043d\u0438\u043c\u0438.\n\n https://www.securitylab.ru/news/525872.php", "creation_timestamp": "2021-10-22T15:07:02.000000Z"}, {"uuid": "126ed21a-d9d3-40ca-8e7e-4dfe9aad11b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35055", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/4816", "content": "#WLAN_Security\nBlackHat Europe 2021:\n\"New Attack Surfaces of Wi-Fi Mesh Network\".\n\n// CVE-2021-35055, CVE-2021-37566, CVE-2021-37572", "creation_timestamp": "2021-11-23T11:01:25.000000Z"}]}