var-202111-0346
Vulnerability from variot
The tag interface of Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to an attacker injecting formulas into the tag data. Those formulas may then be executed when it is opened with a spreadsheet application. Delta Electronics DIALink for, CSV A vulnerability exists regarding the neutralization of formula elements in files.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. DIALink is a device networking platform launched by Delta Electronics, which can effectively manage CNC machine tools and PLC control machines, collect field device data and connect with the upper management platform through a unified interface, and provide visual information to reflect process parameters and equipment work.
DIALink 1.2.4.0 and earlier have security vulnerabilities. An attacker can exploit this vulnerability to inject formulas into label data and execute them
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0346", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "dialink", "scope": "lte", "trust": 1.0, "vendor": "deltaww", "version": "1.2.4.0" }, { "model": "dialink", "scope": "eq", "trust": 0.8, "vendor": "delta", "version": null }, { "model": "dialink", "scope": "lte", "trust": 0.8, "vendor": "delta", "version": "1.2.4.0 and earlier" }, { "model": "electronics dialink", "scope": "lte", "trust": 0.6, "vendor": "delta", "version": "\u003c=1.2.4.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84835" }, { "db": "JVNDB", "id": "JVNDB-2021-014641" }, { "db": "NVD", "id": "CVE-2021-38424" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael Heinzl reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-1530" } ], "trust": 0.6 }, "cve": "CVE-2021-38424", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-38424", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2021-84835", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-38424", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ics-cert@hq.dhs.gov", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.7, "id": "CVE-2021-38424", "impactScore": 3.7, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-38424", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-38424", "trust": 1.0, "value": "HIGH" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2021-38424", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-38424", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-84835", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-1530", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84835" }, { "db": "JVNDB", "id": "JVNDB-2021-014641" }, { "db": "CNNVD", "id": "CNNVD-202110-1530" }, { "db": "NVD", "id": "CVE-2021-38424" }, { "db": "NVD", "id": "CVE-2021-38424" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The tag interface of Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to an attacker injecting formulas into the tag data. Those formulas may then be executed when it is opened with a spreadsheet application. Delta Electronics DIALink for, CSV A vulnerability exists regarding the neutralization of formula elements in files.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. DIALink is a device networking platform launched by Delta Electronics, which can effectively manage CNC machine tools and PLC control machines, collect field device data and connect with the upper management platform through a unified interface, and provide visual information to reflect process parameters and equipment work. \n\r\n\r\nDIALink 1.2.4.0 and earlier have security vulnerabilities. An attacker can exploit this vulnerability to inject formulas into label data and execute them", "sources": [ { "db": "NVD", "id": "CVE-2021-38424" }, { "db": "JVNDB", "id": "JVNDB-2021-014641" }, { "db": "CNVD", "id": "CNVD-2021-84835" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-38424", "trust": 3.8 }, { "db": "ICS CERT", "id": "ICSA-21-294-02", "trust": 3.0 }, { "db": "JVN", "id": "JVNVU94767496", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-014641", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-84835", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3528", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021102209", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202110-1530", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84835" }, { "db": "JVNDB", "id": "JVNDB-2021-014641" }, { "db": "CNNVD", "id": "CNNVD-202110-1530" }, { "db": "NVD", "id": "CVE-2021-38424" } ] }, "id": "VAR-202111-0346", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-84835" } ], "trust": 1.2926407 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84835" } ] }, "last_update_date": "2024-08-14T13:53:47.785000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://www.deltaww.com/en-US/index" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014641" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-1236", "trust": 1.0 }, { "problemtype": "CSV Improper neutralization of math elements in the file (CWE-1236) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014641" }, { "db": "NVD", "id": "CVE-2021-38424" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-38424" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu94767496/" }, { "trust": 0.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-294-02" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021102209" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3528" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84835" }, { "db": "JVNDB", "id": "JVNDB-2021-014641" }, { "db": "CNNVD", "id": "CNNVD-202110-1530" }, { "db": "NVD", "id": "CVE-2021-38424" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-84835" }, { "db": "JVNDB", "id": "JVNDB-2021-014641" }, { "db": "CNNVD", "id": "CNNVD-202110-1530" }, { "db": "NVD", "id": "CVE-2021-38424" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-08T00:00:00", "db": "CNVD", "id": "CNVD-2021-84835" }, { "date": "2022-10-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014641" }, { "date": "2021-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-1530" }, { "date": "2021-11-03T20:15:08.827000", "db": "NVD", "id": "CVE-2021-38424" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-18T00:00:00", "db": "CNVD", "id": "CNVD-2021-84835" }, { "date": "2022-10-21T07:58:00", "db": "JVNDB", "id": "JVNDB-2021-014641" }, { "date": "2021-11-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-1530" }, { "date": "2021-11-05T16:21:45.980000", "db": "NVD", "id": "CVE-2021-38424" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-1530" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Delta\u00a0Electronics\u00a0DIALink\u00a0 In \u00a0CSV\u00a0 Vulnerability in neutralizing math elements in files", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014641" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-1530" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.