VAR-202103-0916

Vulnerability from variot - Updated: 2023-12-18 12:42

The software performs an operation at a privilege level higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses on the Reason DR60 (all firmware versions prior to 02A04.1). General Electric Provided by the company MU320E The following multiple vulnerabilities exist in. * Use hard-coded passwords (CWE-259) - CVE-2021-27452 ‥ * Execution with unnecessary privileges (CWE-250) - CVE-2021-27448 ‥ * Inadequate encryption strength (CWE-326) - CVE-2021-27450General Electric Provided by the company Reason DR60 The following multiple vulnerabilities exist in. * Use hard-coded passwords (CWE-259) - CVE-2021-27440 ‥ * Code injection (CWE-94) - CVE-2021-27438 ‥ * Execution with unnecessary privileges (CWE-250) - CVE-2021-27454The expected impact depends on each vulnerability, but it may be affected as follows. * A remote third party uses hard-coded credentials to control the merging unit - CVE-2021-27452 ‥ * Elevated to privilege by a third party who has access to the device - CVE-2021-27448 ‥ * SSH Insufficient cryptographic strength of the protocol can lead to further improper configuration or use as a springboard for other attacks. - CVE-2021-27450 ‥ * Hard-coded credentials are used by remote third parties to be fraudulently authenticated or communicated with external components. - CVE-2021-27440 ‥ * Malicious input is made by a remote third party to change the syntax or behavior of the code segment. - CVE-2021-27438 ‥ * Because the software operates at an unnecessary privilege level, other vulnerabilities may occur or the effects of other vulnerabilities may increase. - CVE-2021-27454. Reason DR60 is a centralized, integrated multifunctional digital fault recorder (DFR) launched by GE.

GE Reason DR60 firmware before 02A04.1 has a permission improper vulnerability. No detailed vulnerability details are currently provided

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0916",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "reason dr60",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ge",
        "version": "02a04.1"
      },
      {
        "model": "mu320e",
        "scope": null,
        "trust": 0.8,
        "vendor": "general electric",
        "version": null
      },
      {
        "model": "reason dr60",
        "scope": null,
        "trust": 0.8,
        "vendor": "general electric",
        "version": null
      },
      {
        "model": "reason dr60 \u003c02a04.1",
        "scope": null,
        "trust": 0.6,
        "vendor": "ge",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24019"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27454"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:ge:reason_dr60_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "02a04.1",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:ge:reason_dr60:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-27454"
      }
    ]
  },
  "cve": "CVE-2021-27454",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2021-24019",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULMON",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-27454",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "IPA",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2021-001291",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 1.6,
            "userInteraction": "None",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "IPA",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2021-001291",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "IPA",
            "availabilityImpact": "Low",
            "baseScore": 3.8,
            "baseSeverity": "Low",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2021-001291",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "High",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "IPA",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2021-001291",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "IPA",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2021-001291",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "IPA",
            "id": "JVNDB-2021-001291",
            "trust": 2.4,
            "value": "High"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2021-001291",
            "trust": 1.6,
            "value": "Critical"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-27454",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2021-001291",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2021-24019",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202103-1365",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-27454",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24019"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-27454"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27454"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-1365"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The software performs an operation at a privilege level higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses on the Reason DR60 (all firmware versions prior to 02A04.1). General Electric Provided by the company MU320E The following multiple vulnerabilities exist in. * Use hard-coded passwords (CWE-259) - CVE-2021-27452 \u2025 * Execution with unnecessary privileges (CWE-250) - CVE-2021-27448 \u2025 * Inadequate encryption strength (CWE-326) - CVE-2021-27450General Electric Provided by the company Reason DR60 The following multiple vulnerabilities exist in. * Use hard-coded passwords (CWE-259) - CVE-2021-27440 \u2025 * Code injection (CWE-94) - CVE-2021-27438 \u2025 * Execution with unnecessary privileges (CWE-250) - CVE-2021-27454The expected impact depends on each vulnerability, but it may be affected as follows. * A remote third party uses hard-coded credentials to control the merging unit - CVE-2021-27452 \u2025 * Elevated to privilege by a third party who has access to the device - CVE-2021-27448 \u2025 * SSH Insufficient cryptographic strength of the protocol can lead to further improper configuration or use as a springboard for other attacks. - CVE-2021-27450 \u2025 * Hard-coded credentials are used by remote third parties to be fraudulently authenticated or communicated with external components. - CVE-2021-27440 \u2025 * Malicious input is made by a remote third party to change the syntax or behavior of the code segment. - CVE-2021-27438 \u2025 * Because the software operates at an unnecessary privilege level, other vulnerabilities may occur or the effects of other vulnerabilities may increase. - CVE-2021-27454. Reason DR60 is a centralized, integrated multifunctional digital fault recorder (DFR) launched by GE. \n\r\n\r\nGE Reason DR60 firmware before 02A04.1 has a permission improper vulnerability. No detailed vulnerability details are currently provided",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-27454"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-24019"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-27454"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-27454",
        "trust": 3.1
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-21-082-03",
        "trust": 3.1
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-21-082-02",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU98539192",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-24019",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1005",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-1365",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-27454",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24019"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-27454"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27454"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-1365"
      }
    ]
  },
  "id": "VAR-202103-0916",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24019"
      }
    ],
    "trust": 1.31428573
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24019"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:42:30.993000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "GES-2021-002 (Login required)  General\u00a0Electric",
        "trust": 0.8,
        "url": "https://www.gegridsolutions.com/app/viewfiles.aspx?prod=dr60\u0026type=21"
      },
      {
        "title": "Patch for GE Reason DR60 Improper Permission Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/255301"
      },
      {
        "title": "Grid Solutions GE Reason DR60 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=145530"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24019"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-1365"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-269",
        "trust": 1.0
      },
      {
        "problemtype": "Execution with unnecessary privileges (CWE-250) [IPA Evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": " Use hard-coded passwords (CWE-259) [IPA Evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": " Inadequate encryption strength (CWE-326) [IPA Evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": " Code injection (CWE-94) [IPA Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27454"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.7,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-082-03"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu98539192"
      },
      {
        "trust": 0.8,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-082-02"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1005"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/269.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24019"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-27454"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27454"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-1365"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-24019"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-27454"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27454"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-1365"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-03-31T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-24019"
      },
      {
        "date": "2021-03-25T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-27454"
      },
      {
        "date": "2021-03-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "date": "2021-03-25T20:15:13.303000",
        "db": "NVD",
        "id": "CVE-2021-27454"
      },
      {
        "date": "2021-03-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202103-1365"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-03-31T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-24019"
      },
      {
        "date": "2021-03-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-27454"
      },
      {
        "date": "2021-03-25T07:23:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      },
      {
        "date": "2021-03-30T17:21:04.840000",
        "db": "NVD",
        "id": "CVE-2021-27454"
      },
      {
        "date": "2021-03-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202103-1365"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-1365"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0General\u00a0Electric\u00a0 Multiple vulnerabilities in the product",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001291"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-1365"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…