Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-32932 (GCVE-0-2021-32932)
Vulnerability from cvelistv5
- CWE-89 - IMPROPER NUETRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION')
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01 | US Government Resource |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "iView", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to v5.7.03.6182" } ] } ], "descriptions": [ { "lang": "en", "value": "The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information on the iView (versions prior to v5.7.03.6182)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "IMPROPER NUETRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (\u0027SQL INJECTION\u0027) CWE-89", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-11T16:24:18", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-32932", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "iView", "version": { "version_data": [ { "version_value": "versions prior to v5.7.03.6182" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information on the iView (versions prior to v5.7.03.6182)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "IMPROPER NUETRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (\u0027SQL INJECTION\u0027) CWE-89" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-32932", "datePublished": "2021-06-11T16:24:18", "dateReserved": "2021-05-13T00:00:00", "dateUpdated": "2024-08-03T23:33:55.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-32932\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2021-06-11T17:15:11.057\",\"lastModified\":\"2024-11-21T06:07:57.230\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information on the iView (versions prior to v5.7.03.6182).\"},{\"lang\":\"es\",\"value\":\"El producto afectado es vulnerable a una inyecci\u00f3n SQL, que puede permitir a un atacante no autorizado divulgar informaci\u00f3n en el iView (versiones anteriores a v5.7.03.6182)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.7.03.6182\",\"matchCriteriaId\":\"05210F63-F5C5-4783-A993-2E670F19B5F9\"}]}]}],\"references\":[{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"US Government Resource\"]},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]}]}}" } }
var-202106-1187
Vulnerability from variot
The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information on the iView (versions prior to v5.7.03.6182). Advantech Provided by iView Is SNMP Base device management software. iView The following multiple vulnerabilities exist in. * Lack of authentication for important features (CWE-306) - CVE-2021-32930 ‥ * SQL injection (CWE-89) - CVE-2021-32932The expected impact depends on each vulnerability, but it may be affected as follows. * A remote third party could change the system configuration or execute arbitrary code. - CVE-2021-32930 ‥ * Information in the system is stolen by a remote third party - CVE-2021-32932. Authentication is not required to exploit this vulnerability.The specific flaw exists within the getNextTrapPage action of NetworkServlet, which listens on TCP port 8080 by default. When parsing the search_description element, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of the service account. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1187", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "iview", "scope": null, "trust": 5.6, "vendor": "advantech", "version": null }, { "model": "iview", "scope": "lt", "trust": 1.0, "vendor": "advantech", "version": "5.7.03.6182" }, { "model": "iview", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "iview", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "5.7.03.6182 earlier s" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-656" }, { "db": "ZDI", "id": "ZDI-21-655" }, { "db": "ZDI", "id": "ZDI-21-654" }, { "db": "ZDI", "id": "ZDI-21-653" }, { "db": "ZDI", "id": "ZDI-21-652" }, { "db": "ZDI", "id": "ZDI-21-651" }, { "db": "ZDI", "id": "ZDI-21-650" }, { "db": "ZDI", "id": "ZDI-21-649" }, { "db": "JVNDB", "id": "JVNDB-2021-001742" }, { "db": "NVD", "id": "CVE-2021-32932" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Selim Enes Karaduman (@Enesdex)", "sources": [ { "db": "ZDI", "id": "ZDI-21-654" }, { "db": "ZDI", "id": "ZDI-21-653" }, { "db": "ZDI", "id": "ZDI-21-652" }, { "db": "ZDI", "id": "ZDI-21-651" }, { "db": "ZDI", "id": "ZDI-21-650" }, { "db": "ZDI", "id": "ZDI-21-649" } ], "trust": 4.2 }, "cve": "CVE-2021-32932", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-32932", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-392918", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-32932", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 5.6, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-32932", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-001742", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2021-32932", "trust": 5.6, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2021-32932", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2021-001742", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202106-250", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-392918", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-656" }, { "db": "ZDI", "id": "ZDI-21-655" }, { "db": "ZDI", "id": "ZDI-21-654" }, { "db": "ZDI", "id": "ZDI-21-653" }, { "db": "ZDI", "id": "ZDI-21-652" }, { "db": "ZDI", "id": "ZDI-21-651" }, { "db": "ZDI", "id": "ZDI-21-650" }, { "db": "ZDI", "id": "ZDI-21-649" }, { "db": "VULHUB", "id": "VHN-392918" }, { "db": "JVNDB", "id": "JVNDB-2021-001742" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-250" }, { "db": "NVD", "id": "CVE-2021-32932" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information on the iView (versions prior to v5.7.03.6182). Advantech Provided by iView Is SNMP Base device management software. iView The following multiple vulnerabilities exist in. * Lack of authentication for important features (CWE-306) - CVE-2021-32930 \u2025 * SQL injection (CWE-89) - CVE-2021-32932The expected impact depends on each vulnerability, but it may be affected as follows. * A remote third party could change the system configuration or execute arbitrary code. - CVE-2021-32930 \u2025 * Information in the system is stolen by a remote third party - CVE-2021-32932. Authentication is not required to exploit this vulnerability.The specific flaw exists within the getNextTrapPage action of NetworkServlet, which listens on TCP port 8080 by default. When parsing the search_description element, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of the service account. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements", "sources": [ { "db": "NVD", "id": "CVE-2021-32932" }, { "db": "JVNDB", "id": "JVNDB-2021-001742" }, { "db": "ZDI", "id": "ZDI-21-656" }, { "db": "ZDI", "id": "ZDI-21-655" }, { "db": "ZDI", "id": "ZDI-21-654" }, { "db": "ZDI", "id": "ZDI-21-653" }, { "db": "ZDI", "id": "ZDI-21-652" }, { "db": "ZDI", "id": "ZDI-21-651" }, { "db": "ZDI", "id": "ZDI-21-650" }, { "db": "ZDI", "id": "ZDI-21-649" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-392918" } ], "trust": 7.29 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-32932", "trust": 8.1 }, { "db": "ICS CERT", "id": "ICSA-21-154-01", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-21-656", "trust": 1.3 }, { "db": "JVN", "id": "JVNVU92160646", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-001742", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-13141", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-13137", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-655", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11846", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-654", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11838", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-653", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11837", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-652", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11836", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-651", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11834", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-650", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11833", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-649", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202106-250", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021060407", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1970", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-392918", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-656" }, { "db": "ZDI", "id": "ZDI-21-655" }, { "db": "ZDI", "id": "ZDI-21-654" }, { "db": "ZDI", "id": "ZDI-21-653" }, { "db": "ZDI", "id": "ZDI-21-652" }, { "db": "ZDI", "id": "ZDI-21-651" }, { "db": "ZDI", "id": "ZDI-21-650" }, { "db": "ZDI", "id": "ZDI-21-649" }, { "db": "VULHUB", "id": "VHN-392918" }, { "db": "JVNDB", "id": "JVNDB-2021-001742" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-250" }, { "db": "NVD", "id": "CVE-2021-32932" } ] }, "id": "VAR-202106-1187", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-392918" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:13:32.358000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 5.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01" }, { "title": "Support\u00a0\u0026\u00a0Download", "trust": 0.8, "url": "https://www.advantech.com/support/details/firmware?id=1-HIPU-183" }, { "title": "Advantech Iview SQL Repair measures for injecting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=152916" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-656" }, { "db": "ZDI", "id": "ZDI-21-655" }, { "db": "ZDI", "id": "ZDI-21-654" }, { "db": "ZDI", "id": "ZDI-21-653" }, { "db": "ZDI", "id": "ZDI-21-652" }, { "db": "ZDI", "id": "ZDI-21-651" }, { "db": "ZDI", "id": "ZDI-21-650" }, { "db": "ZDI", "id": "ZDI-21-649" }, { "db": "JVNDB", "id": "JVNDB-2021-001742" }, { "db": "CNNVD", "id": "CNNVD-202106-250" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-89", "trust": 1.1 }, { "problemtype": "Lack of authentication for important features (CWE-306) [IPA Evaluation ]", "trust": 0.8 }, { "problemtype": "SQL injection (CWE-89) [IPA Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-392918" }, { "db": "JVNDB", "id": "JVNDB-2021-001742" }, { "db": "NVD", "id": "CVE-2021-32932" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 8.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu92160646" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021060407" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-656/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1970" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-656" }, { "db": "ZDI", "id": "ZDI-21-655" }, { "db": "ZDI", "id": "ZDI-21-654" }, { "db": "ZDI", "id": "ZDI-21-653" }, { "db": "ZDI", "id": "ZDI-21-652" }, { "db": "ZDI", "id": "ZDI-21-651" }, { "db": "ZDI", "id": "ZDI-21-650" }, { "db": "ZDI", "id": "ZDI-21-649" }, { "db": "VULHUB", "id": "VHN-392918" }, { "db": "JVNDB", "id": "JVNDB-2021-001742" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-250" }, { "db": "NVD", "id": "CVE-2021-32932" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-21-656" }, { "db": "ZDI", "id": "ZDI-21-655" }, { "db": "ZDI", "id": "ZDI-21-654" }, { "db": "ZDI", "id": "ZDI-21-653" }, { "db": "ZDI", "id": "ZDI-21-652" }, { "db": "ZDI", "id": "ZDI-21-651" }, { "db": "ZDI", "id": "ZDI-21-650" }, { "db": "ZDI", "id": "ZDI-21-649" }, { "db": "VULHUB", "id": "VHN-392918" }, { "db": "JVNDB", "id": "JVNDB-2021-001742" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-250" }, { "db": "NVD", "id": "CVE-2021-32932" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-656" }, { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-655" }, { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-654" }, { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-653" }, { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-652" }, { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-651" }, { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-650" }, { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-649" }, { "date": "2021-06-11T00:00:00", "db": "VULHUB", "id": "VHN-392918" }, { "date": "2021-06-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-001742" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-250" }, { "date": "2021-06-11T17:15:11.057000", "db": "NVD", "id": "CVE-2021-32932" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-656" }, { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-655" }, { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-654" }, { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-653" }, { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-652" }, { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-651" }, { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-650" }, { "date": "2021-06-07T00:00:00", "db": "ZDI", "id": "ZDI-21-649" }, { "date": "2021-06-21T00:00:00", "db": "VULHUB", "id": "VHN-392918" }, { "date": "2021-06-07T03:01:00", "db": "JVNDB", "id": "JVNDB-2021-001742" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-06-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-250" }, { "date": "2021-06-21T22:37:53.433000", "db": "NVD", "id": "CVE-2021-32932" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech\u00a0 Made \u00a0iView\u00a0 Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001742" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }
gsd-2021-32932
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2021-32932", "description": "The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information on the iView (versions prior to v5.7.03.6182).", "id": "GSD-2021-32932" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-32932" ], "details": "The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information on the iView (versions prior to v5.7.03.6182).", "id": "GSD-2021-32932", "modified": "2023-12-13T01:23:09.347380Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-32932", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "iView", "version": { "version_data": [ { "version_value": "versions prior to v5.7.03.6182" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information on the iView (versions prior to v5.7.03.6182)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "IMPROPER NUETRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (\u0027SQL INJECTION\u0027) CWE-89" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.7.03.6182", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-32932" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information on the iView (versions prior to v5.7.03.6182)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-89" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01", "refsource": "MISC", "tags": [ "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2021-06-21T22:37Z", "publishedDate": "2021-06-11T17:15Z" } } }
cnvd-2021-40757
Vulnerability from cnvd
Title: Advantech iView SQL注入漏洞(CNVD-2021-40757)
Description:
Advantech Iview是中国Advantech公司的一个基于简单网络协议(SNMP)来对 B + B SmartWorx 设备进行管理的软件。
Advantech Iview存在SQL注入漏洞,该漏洞源于受影响的产品容易受到SQL注入的攻击,这可能会允许未经授权的攻击者可利用该漏洞泄露信息。目前没有详细的漏洞细节提供。
Severity: 高
Patch Name: Advantech iView SQL注入漏洞(CNVD-2021-40757)的补丁
Patch Description:
Advantech Iview是中国Advantech公司的一个基于简单网络协议(SNMP)来对 B + B SmartWorx 设备进行管理的软件。
Advantech Iview存在SQL注入漏洞,该漏洞源于受影响的产品容易受到SQL注入的攻击,这可能会允许未经授权的攻击者可利用该漏洞泄露信息。目前没有详细的漏洞细节提供。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.advantech.tw/support/details/firmware?id=1-HIPU-183
Reference: https://www.cybersecurity-help.cz/vdb/SB2021060407
Name | Advantech iView |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2021-32932" } }, "description": "Advantech Iview\u662f\u4e2d\u56fdAdvantech\u516c\u53f8\u7684\u4e00\u4e2a\u57fa\u4e8e\u7b80\u5355\u7f51\u7edc\u534f\u8bae\uff08SNMP\uff09\u6765\u5bf9 B + B SmartWorx \u8bbe\u5907\u8fdb\u884c\u7ba1\u7406\u7684\u8f6f\u4ef6\u3002\n\nAdvantech Iview\u5b58\u5728SQL\u6ce8\u5165\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u53d7\u5f71\u54cd\u7684\u4ea7\u54c1\u5bb9\u6613\u53d7\u5230SQL\u6ce8\u5165\u7684\u653b\u51fb\uff0c\u8fd9\u53ef\u80fd\u4f1a\u5141\u8bb8\u672a\u7ecf\u6388\u6743\u7684\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6cc4\u9732\u4fe1\u606f\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.advantech.tw/support/details/firmware?id=1-HIPU-183", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2021-40757", "openTime": "2021-06-10", "patchDescription": "Advantech Iview\u662f\u4e2d\u56fdAdvantech\u516c\u53f8\u7684\u4e00\u4e2a\u57fa\u4e8e\u7b80\u5355\u7f51\u7edc\u534f\u8bae\uff08SNMP\uff09\u6765\u5bf9 B + B SmartWorx \u8bbe\u5907\u8fdb\u884c\u7ba1\u7406\u7684\u8f6f\u4ef6\u3002\r\n\r\nAdvantech Iview\u5b58\u5728SQL\u6ce8\u5165\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u53d7\u5f71\u54cd\u7684\u4ea7\u54c1\u5bb9\u6613\u53d7\u5230SQL\u6ce8\u5165\u7684\u653b\u51fb\uff0c\u8fd9\u53ef\u80fd\u4f1a\u5141\u8bb8\u672a\u7ecf\u6388\u6743\u7684\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6cc4\u9732\u4fe1\u606f\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Advantech iView SQL\u6ce8\u5165\u6f0f\u6d1e\uff08CNVD-2021-40757\uff09\u7684\u8865\u4e01", "products": { "product": "Advantech iView" }, "referenceLink": "https://www.cybersecurity-help.cz/vdb/SB2021060407", "serverity": "\u9ad8", "submitTime": "2021-06-04", "title": "Advantech iView SQL\u6ce8\u5165\u6f0f\u6d1e\uff08CNVD-2021-40757\uff09" }
icsa-21-154-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Selim Enes Karaduman @enesdex" ], "organization": "Trend Micro \u0027s Zero Day Initiative", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to disclose information and perform remote code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "East Asia, Europe, United States", "title": "Countries/areas deployed" }, { "category": "other", "text": "Taiwan", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-21-154-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-154-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-154-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-154-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Advantech iView", "tracking": { "current_release_date": "2021-06-03T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-154-01", "initial_release_date": "2021-06-03T00:00:00.000000Z", "revision_history": [ { "date": "2021-06-03T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-21-154-01 Advantech iView" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 5.7.03.6182", "product": { "name": "iView: versions prior to v5.7.03.6182", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "iView" } ], "category": "vendor", "name": "Advantech" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-32930", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "notes": [ { "category": "summary", "text": "The affected product \u0027s configuration is vulnerable due to missing authentication, which may allow an attacker to change configurations and execute arbitrary code.CVE-2021-32930 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32930" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Advantech recommends updating firmware to Version 5.7.03.6182 to address these vulnerabilities.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.advantech.tw/support/details/firmware?id=1-HIPU-183" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-32932", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information.CVE-2021-32932 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32932" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Advantech recommends updating firmware to Version 5.7.03.6182 to address these vulnerabilities.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.advantech.tw/support/details/firmware?id=1-HIPU-183" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
ICSA-21-154-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Selim Enes Karaduman @enesdex" ], "organization": "Trend Micro \u0027s Zero Day Initiative", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to disclose information and perform remote code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "East Asia, Europe, United States", "title": "Countries/areas deployed" }, { "category": "other", "text": "Taiwan", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-21-154-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-154-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-154-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-154-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Advantech iView", "tracking": { "current_release_date": "2021-06-03T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-154-01", "initial_release_date": "2021-06-03T00:00:00.000000Z", "revision_history": [ { "date": "2021-06-03T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-21-154-01 Advantech iView" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 5.7.03.6182", "product": { "name": "iView: versions prior to v5.7.03.6182", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "iView" } ], "category": "vendor", "name": "Advantech" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-32930", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "notes": [ { "category": "summary", "text": "The affected product \u0027s configuration is vulnerable due to missing authentication, which may allow an attacker to change configurations and execute arbitrary code.CVE-2021-32930 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32930" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Advantech recommends updating firmware to Version 5.7.03.6182 to address these vulnerabilities.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.advantech.tw/support/details/firmware?id=1-HIPU-183" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-32932", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information.CVE-2021-32932 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32932" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Advantech recommends updating firmware to Version 5.7.03.6182 to address these vulnerabilities.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.advantech.tw/support/details/firmware?id=1-HIPU-183" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
ghsa-69f6-cm42-pjj3
Vulnerability from github
The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information on the iView (versions prior to v5.7.03.6182).
{ "affected": [], "aliases": [ "CVE-2021-32932" ], "database_specific": { "cwe_ids": [ "CWE-89" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-06-11T17:15:00Z", "severity": "HIGH" }, "details": "The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information on the iView (versions prior to v5.7.03.6182).", "id": "GHSA-69f6-cm42-pjj3", "modified": "2022-05-24T19:04:57Z", "published": "2022-05-24T19:04:57Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32932" }, { "type": "WEB", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2021-32932
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01 | US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:*", "matchCriteriaId": "05210F63-F5C5-4783-A993-2E670F19B5F9", "versionEndExcluding": "5.7.03.6182", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information on the iView (versions prior to v5.7.03.6182)." }, { "lang": "es", "value": "El producto afectado es vulnerable a una inyecci\u00f3n SQL, que puede permitir a un atacante no autorizado divulgar informaci\u00f3n en el iView (versiones anteriores a v5.7.03.6182)" } ], "id": "CVE-2021-32932", "lastModified": "2024-11-21T06:07:57.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-11T17:15:11.057", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-154-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "ics-cert@hq.dhs.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.