var-202111-0749
Vulnerability from variot
A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application’s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks. Siveillance Video DLNA Server Exists in a past traversal vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0749", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "siveillance video management software 2019 r2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "siveillance video management software 2019 r3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "siveillance video management software 2020 r2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "siveillance video management software 2019 r1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "siveillance video management software 2020 r1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "siveillance vms", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siveillance vms", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": "2020 r2" }, { "model": "siveillance vms", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": "2019 r3" }, { "model": "siveillance vms", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": "2019 r2" }, { "model": "siveillance vms", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siveillance vms", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": "2019 r1" }, { "model": "siveillance vms", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": "2020 r1" }, { "model": "siveillance video dlna server", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "siveillance video dlna server r1", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "2019" }, { "model": "siveillance video dlna server r2", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "2019" }, { "model": "siveillance video dlna server r3", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "2019" }, { "model": "siveillance video dlna server r1", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "2020" }, { "model": "siveillance video dlna server r2", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "2020" }, { "model": "siveillance video dlna server r3", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "2020" }, { "model": "siveillance video dlna server r1", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "2021" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-89432" }, { "db": "JVNDB", "id": "JVNDB-2021-014957" }, { "db": "NVD", "id": "CVE-2021-42021" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Milestone PSIRT reported this vulnerability to Siemens.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-866" } ], "trust": 0.6 }, "cve": "CVE-2021-42021", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-42021", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2021-89432", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-42021", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-42021", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-42021", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-42021", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-89432", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202111-866", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-89432" }, { "db": "JVNDB", "id": "JVNDB-2021-014957" }, { "db": "CNNVD", "id": "CNNVD-202111-866" }, { "db": "NVD", "id": "CVE-2021-42021" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application\u2019s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks. Siveillance Video DLNA Server Exists in a past traversal vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-42021" }, { "db": "JVNDB", "id": "JVNDB-2021-014957" }, { "db": "CNVD", "id": "CNVD-2021-89432" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-42021", "trust": 3.8 }, { "db": "SIEMENS", "id": "SSA-755517", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-21-315-13", "trust": 1.4 }, { "db": "JVN", "id": "JVNVU95671889", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-014957", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-89432", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021111619", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202111-866", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-89432" }, { "db": "JVNDB", "id": "JVNDB-2021-014957" }, { "db": "CNNVD", "id": "CNNVD-202111-866" }, { "db": "NVD", "id": "CVE-2021-42021" } ] }, "id": "VAR-202111-0749", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-89432" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-89432" } ] }, "last_update_date": "2024-11-23T19:57:35.037000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-755517", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf" }, { "title": "Patch for Siemens Siveillance Video DLNA Server path traversal vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/300046" }, { "title": "Siveillance Video DLNA Server Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=169669" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-89432" }, { "db": "JVNDB", "id": "JVNDB-2021-014957" }, { "db": "CNNVD", "id": "CNNVD-202111-866" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-26", "trust": 1.0 }, { "problemtype": "CWE-22", "trust": 1.0 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014957" }, { "db": "NVD", "id": "CVE-2021-42021" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-42021" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu95671889/index.html" }, { "trust": 0.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-13" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021111619" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-315-13" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-89432" }, { "db": "JVNDB", "id": "JVNDB-2021-014957" }, { "db": "CNNVD", "id": "CNNVD-202111-866" }, { "db": "NVD", "id": "CVE-2021-42021" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-89432" }, { "db": "JVNDB", "id": "JVNDB-2021-014957" }, { "db": "CNNVD", "id": "CNNVD-202111-866" }, { "db": "NVD", "id": "CVE-2021-42021" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-20T00:00:00", "db": "CNVD", "id": "CNVD-2021-89432" }, { "date": "2022-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014957" }, { "date": "2021-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-866" }, { "date": "2021-11-09T12:15:10.523000", "db": "NVD", "id": "CVE-2021-42021" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-20T00:00:00", "db": "CNVD", "id": "CNVD-2021-89432" }, { "date": "2022-11-02T07:35:00", "db": "JVNDB", "id": "JVNDB-2021-014957" }, { "date": "2022-07-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-866" }, { "date": "2024-11-21T06:27:05.887000", "db": "NVD", "id": "CVE-2021-42021" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-866" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siveillance\u00a0Video\u00a0DLNA\u00a0Server\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014957" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-866" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…