CVE-2021-22153 (GCVE-0-2021-22153)
Vulnerability from cvelistv5 – Published: 2021-05-13 10:43 – Updated: 2024-08-03 18:37
VLAI?
Summary
A Remote Code Execution vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially cause the spreadsheet application to run commands on the victim’s local machine with the authority of the user.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:37:17.176Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000078971"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Remote Code Execution vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially cause the spreadsheet application to run commands on the victim\u2019s local machine with the authority of the user."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-05-13T10:43:52",
"orgId": "dbe78b00-5e7b-4fda-8748-329789ecfc5c",
"shortName": "blackberry"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000078971"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@blackberry.com",
"ID": "CVE-2021-22153",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Remote Code Execution vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially cause the spreadsheet application to run commands on the victim\u2019s local machine with the authority of the user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.blackberry.com/kb/articleDetail?articleNumber=000078971",
"refsource": "MISC",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000078971"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "dbe78b00-5e7b-4fda-8748-329789ecfc5c",
"assignerShortName": "blackberry",
"cveId": "CVE-2021-22153",
"datePublished": "2021-05-13T10:43:52",
"dateReserved": "2021-01-04T00:00:00",
"dateUpdated": "2024-08-03T18:37:17.176Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackberry:unified_endpoint_management:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"12.12.0\", \"matchCriteriaId\": \"7BB3D5E6-0613-45E2-8575-07DD6CD77BF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackberry:unified_endpoint_management:12.12.1a:quick_fix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6ED78FF-D486-4FE6-9599-7738729D8F28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackberry:unified_endpoint_management:12.12.1a:quick_fix_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"593930DE-6A05-48B3-A886-87E72DDCD44C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackberry:unified_endpoint_management:12.12.1a:quick_fix_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A07E7ACB-B93D-4774-BFE2-8CEAE89AFDF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackberry:unified_endpoint_management:12.12.1a:quick_fix_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"984D7F36-D826-4D38-882C-9C822C4CDDA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackberry:unified_endpoint_management:12.12.1a:quick_fix_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5DC0EDB-41B6-4605-AF43-37A0701C96CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackberry:unified_endpoint_management:12.12.1a:quick_fix_6:*:*:*:*:*:*\", \"matchCriteriaId\": \"03BB3AC1-DC2B-4871-A47C-23E5AFE8E72A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackberry:unified_endpoint_management:12.13.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"925C2316-6DE8-40ED-AFF2-F4A9849D2B85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackberry:unified_endpoint_management:12.13.0:mr1:*:*:*:*:*:*\", \"matchCriteriaId\": \"B153A25D-8D7C-4734-8BB9-93C5E6385BE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackberry:unified_endpoint_management:12.13.1:quick_fix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"36AFE854-85F3-4157-A2C5-8FE374485FF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:blackberry:unified_endpoint_management:12.13.1:quick_fix_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"61B8E4D4-E3DB-4693-BF88-513687E45BA2\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A Remote Code Execution vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially cause the spreadsheet application to run commands on the victim\\u2019s local machine with the authority of the user.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de ejecuci\\u00f3n de c\\u00f3digo remota en el componente de la Consola de Administraci\\u00f3n de BlackBerry UEM versi\\u00f3n(s) 12.13.1 QF2 12.12.1 y anteriores y 12.12.1aQF6 y anteriores, podr\\u00eda permitir a un atacante potencialmente causar que la aplicaci\\u00f3n de hoja de c\\u00e1lculo ejecute comandos en la m\\u00e1quina local de la v\\u00edctima con la autoridad del usuario\"}]",
"id": "CVE-2021-22153",
"lastModified": "2024-11-21T05:49:36.637",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.3, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 6.8, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2021-05-13T11:15:07.953",
"references": "[{\"url\": \"https://support.blackberry.com/kb/articleDetail?articleNumber=000078971\", \"source\": \"secure@blackberry.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.blackberry.com/kb/articleDetail?articleNumber=000078971\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "secure@blackberry.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-1236\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-22153\",\"sourceIdentifier\":\"secure@blackberry.com\",\"published\":\"2021-05-13T11:15:07.953\",\"lastModified\":\"2024-11-21T05:49:36.637\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Remote Code Execution vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially cause the spreadsheet application to run commands on the victim\u2019s local machine with the authority of the user.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota en el componente de la Consola de Administraci\u00f3n de BlackBerry UEM versi\u00f3n(s) 12.13.1 QF2 12.12.1 y anteriores y 12.12.1aQF6 y anteriores, podr\u00eda permitir a un atacante potencialmente causar que la aplicaci\u00f3n de hoja de c\u00e1lculo ejecute comandos en la m\u00e1quina local de la v\u00edctima con la autoridad del usuario\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.3,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:P/I:P/A:P\",\"baseScore\":6.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.8,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1236\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:unified_endpoint_management:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"12.12.0\",\"matchCriteriaId\":\"7BB3D5E6-0613-45E2-8575-07DD6CD77BF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:unified_endpoint_management:12.12.1a:quick_fix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6ED78FF-D486-4FE6-9599-7738729D8F28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:unified_endpoint_management:12.12.1a:quick_fix_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"593930DE-6A05-48B3-A886-87E72DDCD44C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:unified_endpoint_management:12.12.1a:quick_fix_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07E7ACB-B93D-4774-BFE2-8CEAE89AFDF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:unified_endpoint_management:12.12.1a:quick_fix_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"984D7F36-D826-4D38-882C-9C822C4CDDA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:unified_endpoint_management:12.12.1a:quick_fix_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5DC0EDB-41B6-4605-AF43-37A0701C96CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:unified_endpoint_management:12.12.1a:quick_fix_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"03BB3AC1-DC2B-4871-A47C-23E5AFE8E72A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:unified_endpoint_management:12.13.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"925C2316-6DE8-40ED-AFF2-F4A9849D2B85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:unified_endpoint_management:12.13.0:mr1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B153A25D-8D7C-4734-8BB9-93C5E6385BE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:unified_endpoint_management:12.13.1:quick_fix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"36AFE854-85F3-4157-A2C5-8FE374485FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:unified_endpoint_management:12.13.1:quick_fix_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"61B8E4D4-E3DB-4693-BF88-513687E45BA2\"}]}]}],\"references\":[{\"url\":\"https://support.blackberry.com/kb/articleDetail?articleNumber=000078971\",\"source\":\"secure@blackberry.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.blackberry.com/kb/articleDetail?articleNumber=000078971\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…