CVE-2021-28813 (GCVE-0-2021-28813)
Vulnerability from cvelistv5
Published
2021-09-10 04:00
Modified
2024-09-17 00:21
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability involving insecure storage of sensitive information has been reported to affect QSW-M2116P-2T2S and QNAP switches running QuNetSwitch. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism.We have already fixed this vulnerability in the following versions: QSW-M2116P-2T2S 1.0.6 build 210713 and later QGD-1600P: QuNetSwitch 1.0.6.1509 and later QGD-1602P: QuNetSwitch 1.0.6.1509 and later QGD-3014PT: QuNetSwitch 1.0.6.1519 and later
References
URL | Tags | ||
---|---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
QNAP Systems Inc. | QSW-M2116P-2T2S |
Version: unspecified < 1.0.6 build 210713 |
|||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:55:11.731Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.qnap.com/en/security-advisory/qsa-21-37" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "QSW-M2116P-2T2S", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "1.0.6 build 210713", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "QGD-1600P" ], "product": "QuNetSwitch", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "1.0.6.1509", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "QGD-1602P" ], "product": "QuNetSwitch", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "1.0.6.1509", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "QGD-3014PT" ], "product": "QuNetSwitch", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "1.0.6.1519", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability involving insecure storage of sensitive information has been reported to affect QSW-M2116P-2T2S and QNAP switches running QuNetSwitch. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism.We have already fixed this vulnerability in the following versions: QSW-M2116P-2T2S 1.0.6 build 210713 and later QGD-1600P: QuNetSwitch 1.0.6.1509 and later QGD-1602P: QuNetSwitch 1.0.6.1509 and later QGD-3014PT: QuNetSwitch 1.0.6.1519 and later" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-259", "description": "CWE-259", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-10T04:00:19", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.qnap.com/en/security-advisory/qsa-21-37" } ], "solutions": [ { "lang": "en", "value": "We have already fixed this vulnerability in the following versions of QSW-M2116P-2T2S, QuNetSwitch:\nQSW-M2116P-2T2S 1.0.6 build 210713 and later\nQGD-1600P: QuNetSwitch 1.0.6.1509 and later\nQGD-1602P: QuNetSwitch 1.0.6.1509 and later\nQGD-3014PT: QuNetSwitch 1.0.6.1519 and later" } ], "source": { "advisory": "QSA-21-37", "discovery": "EXTERNAL" }, "title": "Insufficiently Protected Credentials Vulnerability in QSW-M2116P-2T2S and QuNetSwitch", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@qnap.com", "DATE_PUBLIC": "2021-09-09T16:54:00.000Z", "ID": "CVE-2021-28813", "STATE": "PUBLIC", "TITLE": "Insufficiently Protected Credentials Vulnerability in QSW-M2116P-2T2S and QuNetSwitch" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "QSW-M2116P-2T2S", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.0.6 build 210713" } ] } }, { "product_name": "QuNetSwitch", "version": { "version_data": [ { "platform": "QGD-1600P", "version_affected": "\u003c", "version_value": "1.0.6.1509" }, { "platform": "QGD-1602P", "version_affected": "\u003c", "version_value": "1.0.6.1509" }, { "platform": "QGD-3014PT", "version_affected": "\u003c", "version_value": "1.0.6.1519" } ] } } ] }, "vendor_name": "QNAP Systems Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability involving insecure storage of sensitive information has been reported to affect QSW-M2116P-2T2S and QNAP switches running QuNetSwitch. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism.We have already fixed this vulnerability in the following versions: QSW-M2116P-2T2S 1.0.6 build 210713 and later QGD-1600P: QuNetSwitch 1.0.6.1509 and later QGD-1602P: QuNetSwitch 1.0.6.1509 and later QGD-3014PT: QuNetSwitch 1.0.6.1519 and later" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-259" } ] }, { "description": [ { "lang": "eng", "value": "CWE-798" } ] }, { "description": [ { "lang": "eng", "value": "CWE-522" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qnap.com/en/security-advisory/qsa-21-37", "refsource": "MISC", "url": "https://www.qnap.com/en/security-advisory/qsa-21-37" } ] }, "solution": [ { "lang": "en", "value": "We have already fixed this vulnerability in the following versions of QSW-M2116P-2T2S, QuNetSwitch:\nQSW-M2116P-2T2S 1.0.6 build 210713 and later\nQGD-1600P: QuNetSwitch 1.0.6.1509 and later\nQGD-1602P: QuNetSwitch 1.0.6.1509 and later\nQGD-3014PT: QuNetSwitch 1.0.6.1519 and later" } ], "source": { "advisory": "QSA-21-37", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2021-28813", "datePublished": "2021-09-10T04:00:20.068065Z", "dateReserved": "2021-03-18T00:00:00", "dateUpdated": "2024-09-17T00:21:02.142Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-28813\",\"sourceIdentifier\":\"security@qnapsecurity.com.tw\",\"published\":\"2021-09-10T04:15:16.613\",\"lastModified\":\"2024-11-21T06:00:15.093\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability involving insecure storage of sensitive information has been reported to affect QSW-M2116P-2T2S and QNAP switches running QuNetSwitch. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism.We have already fixed this vulnerability in the following versions: QSW-M2116P-2T2S 1.0.6 build 210713 and later QGD-1600P: QuNetSwitch 1.0.6.1509 and later QGD-1602P: QuNetSwitch 1.0.6.1509 and later QGD-3014PT: QuNetSwitch 1.0.6.1519 and later\"},{\"lang\":\"es\",\"value\":\"Se ha reportado de una vulnerabilidad que implica el almacenamiento no seguro de informaci\u00f3n confidencial que afecta al QSW-M2116P-2T2S y a los switches de QNAP que ejecutan QuNetSwitch. Si es explotado, esta vulnerabilidad permite a atacantes remotos leer informaci\u00f3n confidencial accediendo al mecanismo de almacenamiento sin restricciones. Ya hemos corregido esta vulnerabilidad en las siguientes versiones: QSW-M2116P-2T2S 1.0.6 build 210713 y posteriores QGD-1600P: QuNetSwitch 1.0.6.1509 y posteriores QGD-1602P: QuNetSwitch 1.0.6.1509 y posteriores QGD-3014PT: QuNetSwitch 1.0.6.1519 y posteriores\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@qnapsecurity.com.tw\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H\",\"baseScore\":9.6,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@qnapsecurity.com.tw\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-259\"},{\"lang\":\"en\",\"value\":\"CWE-522\"},{\"lang\":\"en\",\"value\":\"CWE-798\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-922\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qsw-m2116p-2t2s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.6\",\"matchCriteriaId\":\"67AD84CC-767C-4B79-BAA1-3970312DC03F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qnap:qsw-m2116p-2t2s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86BB89DE-E848-4092-BE04-8B7560965FE6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qnap:qunetswitch:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.6.1509\",\"matchCriteriaId\":\"4EE33A84-65B1-4C70-9ED3-1CCBCD1FEDA0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qnap:qgd-1600p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07F5C68D-E3BB-4670-8325-6A33DC99AA62\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qnap:qgd-1602p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90A06542-12A0-4D2C-86F2-1003408C08E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qnap:qgd-3014pt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FECC7C09-6554-4DAF-B487-2138C51A6BE8\"}]}]}],\"references\":[{\"url\":\"https://www.qnap.com/en/security-advisory/qsa-21-37\",\"source\":\"security@qnapsecurity.com.tw\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.qnap.com/en/security-advisory/qsa-21-37\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…