Action not permitted
Modal body text goes here.
cve-2021-43298
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
reefs@jfrog.com | https://github.com/embedthis/goahead/issues/304 | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:55:28.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/embedthis/goahead/issues/304" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "goahead", "vendor": "embedthis", "versions": [ { "lessThan": "5.1.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The code that performs password matching when using \u0027Basic\u0027 HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver\u0027s response time until the unauthorized (401) response." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-208", "description": "CWE-208", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-25T19:11:17", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/embedthis/goahead/issues/304" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-43298", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "goahead", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "", "version_value": "5.1.4" } ] } } ] }, "vendor_name": "embedthis" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The code that performs password matching when using \u0027Basic\u0027 HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver\u0027s response time until the unauthorized (401) response." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-208" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/embedthis/goahead/issues/304", "refsource": "MISC", "url": "https://github.com/embedthis/goahead/issues/304" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-43298", "datePublished": "2022-01-25T19:11:17", "dateReserved": "2021-11-03T00:00:00", "dateUpdated": "2024-08-04T03:55:28.938Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-43298\",\"sourceIdentifier\":\"reefs@jfrog.com\",\"published\":\"2022-01-25T20:15:08.510\",\"lastModified\":\"2022-02-01T13:46:54.290\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The code that performs password matching when using \u0027Basic\u0027 HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver\u0027s response time until the unauthorized (401) response.\"},{\"lang\":\"es\",\"value\":\"El c\u00f3digo que lleva a cabo la coincidencia de contrase\u00f1as cuando es usada la autenticaci\u00f3n HTTP \\\"Basic\\\" no usa un memcmp de tiempo constante y no presenta limitaci\u00f3n de velocidad. Esto significa que un atacante de red no autenticado puede forzar la contrase\u00f1a b\u00e1sica HTTP, byte a byte, registrando el tiempo de respuesta del servidor web hasta la respuesta no autorizada (401)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-307\"}]},{\"source\":\"reefs@jfrog.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-208\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.1.4\",\"matchCriteriaId\":\"5F19FBD8-6A30-4E15-9127-7FBEC802B94C\"}]}]}],\"references\":[{\"url\":\"https://github.com/embedthis/goahead/issues/304\",\"source\":\"reefs@jfrog.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
gsd-2021-43298
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2021-43298", "description": "The code that performs password matching when using \u0027Basic\u0027 HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver\u0027s response time until the unauthorized (401) response.", "id": "GSD-2021-43298" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-43298" ], "details": "The code that performs password matching when using \u0027Basic\u0027 HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver\u0027s response time until the unauthorized (401) response.", "id": "GSD-2021-43298", "modified": "2023-12-13T01:23:26.335057Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-43298", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "goahead", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "", "version_value": "5.1.4" } ] } } ] }, "vendor_name": "embedthis" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The code that performs password matching when using \u0027Basic\u0027 HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver\u0027s response time until the unauthorized (401) response." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-208" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/embedthis/goahead/issues/304", "refsource": "MISC", "url": "https://github.com/embedthis/goahead/issues/304" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.1.4", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-43298" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The code that performs password matching when using \u0027Basic\u0027 HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver\u0027s response time until the unauthorized (401) response." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-307" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/embedthis/goahead/issues/304", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/embedthis/goahead/issues/304" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2022-02-01T13:46Z", "publishedDate": "2022-01-25T20:15Z" } } }
ghsa-cfh2-3f5r-4vf9
Vulnerability from github
The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.
{ "affected": [], "aliases": [ "CVE-2021-43298" ], "database_specific": { "cwe_ids": [ "CWE-307" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-01-25T20:15:00Z", "severity": "CRITICAL" }, "details": "The code that performs password matching when using \u0027Basic\u0027 HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver\u0027s response time until the unauthorized (401) response.", "id": "GHSA-cfh2-3f5r-4vf9", "modified": "2022-02-02T00:02:03Z", "published": "2022-01-26T00:00:58Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43298" }, { "type": "WEB", "url": "https://github.com/embedthis/goahead/issues/304" } ], "schema_version": "1.4.0", "severity": [] }
icsa-23-129-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to obtain user access credentials of the MSM web interface or cause a denial-of-service condition. ", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploits specifically target this vulnerability.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-23-129-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-129-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-129-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-129-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/Recommended-Practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://cisa.gov/ics" } ], "title": "Hitachi Energy MSM", "tracking": { "current_release_date": "2023-05-10T21:13:09.601070Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-129-02", "initial_release_date": "2023-05-10T21:13:09.601070Z", "revision_history": [ { "date": "2023-05-10T21:13:09.601070Z", "legacy_version": "1", "number": "1", "summary": "CSAF Creation Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "2.2.5", "product": { "name": "MSM: \u003c= 2.2.5", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "MSM" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-43298", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "notes": [ { "category": "summary", "text": "The code that performs password matching when using \u0027basic\u0027 HTTP authentication does not use a constant-time memcmp and has no rate-limiting. An unauthenticated network attacker could brute-force the HTTP basic password byte-by-byte, by recording the webserver\u0027s response time until the unauthorized (401) response. CVE-2021-43298 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43298" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-15688", "cwe": { "id": "CWE-294", "name": "Authentication Bypass by Capture-replay" }, "notes": [ { "category": "summary", "text": "The HTTP digest authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. An unauthenticated remote attacker could bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel. CVE-2020-15688 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15688" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2019-16645", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Embedthis GoAhead 2.5.0. Certain pages (ex: goform/login and config/log_off_page.htm) create links containing a hostname obtained from an arbitrary HTTP host header sent by an attacker. This could potentially be used in a phishing attack. CVE-2019-16645 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16645" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2019-12822", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In http.c in Embedthis GoAhead before 4.1.1 and 5.x before 5.0.1, a header parsing vulnerability causes a memory assertion, out-of-bounds memory reference, and a potential denial-of-service condition, as demonstrated by a single colon on a line. CVE-2019-12822 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12822" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2018-15504", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11. CVE-2018-15504 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-15504" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2018-15505", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted \"host\" header field may cause a NULL pointer dereference resulting in a denial-of-service condition, as demonstrated by the lack of a trailing \u0027]\u0027 character in an IPv6 address. CVE-2018-15505 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-15505" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-41615", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "notes": [ { "category": "summary", "text": "Websda.c in GoAhead WebServer 2.1.8 has insufficient nonce entropy due to the nonce calculation relying on the hardcoded onceuponatimeinparadise value, which does not follow the secret-data guideline for HTTP digest access authentication in RFC 7616 section 3.3 (or RFC 2617 section 3.2.1).Note: 2.1.8 is a version from 2003; however, the affected websda.c code appears in derivative works that may be used in 2021. Recent GoAhead software is unaffected. CVE-2021-41615 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41615" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2023-23916", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "notes": [ { "category": "summary", "text": "An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \"chained\" HTTP compression algorithms; a server response can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was capped, but the cap was implemented on a per-header basis, allowing a malicious server to insert a virtually unlimited number of compression steps by using many headers. CVE-2023-23916 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23916" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "MSM is not intrinsically designed nor intended to be directly connected to the internet. Users should disconnect the device from any internet-facing network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi Energy suggests adopting user access management and antivirus protection software equipped with the latest signature rules on hosts with the Manufacturing Message Specification (MMS) Client application installed. Users can implement the operating system user access management functionality, if supported, to limit the probability of unauthorized access followed by rogue commands at the operating system level via MMS client application.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Also, Hitachi Energy recommends following the hardening guidelines published by \u201cThe Center for Internet Security (CIS)\u201d to protect the host operating system of machines connecting with MSM. These guidelines help prevent the lateral movement of the attack vector into MSM via these connected devices. Some examples for Windows based computers include:", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisecurity.org/about-us/" }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Desktop Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "CIS Microsoft Windows Server Benchmarks (cisecurity.org)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "According to Hitachi Energy, users should follow recommended security practices and firewall configurations to help protect a network from outside attacks, including:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Physically protecting systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Ensuring monitoring systems have no direct connections to the internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Separating monitoring system networks from other networks using a firewall system with a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Hitachi advises that monitoring systems should not be used for internet surfing, instant messaging, or receiving emails. Portable computers and removable storage media should be carefully scanned for malware prior to connection to monitoring systems.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi Energy advisory 8DBD000154.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000154" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
var-202201-1821
Vulnerability from variot
The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response. GoAhead Is vulnerable to improper restrictions on excessive authentication attempts.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Embedthis Software GoAhead is an open source small embedded Web server from Embedthis Software in the United States
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1821", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "lt", "trust": 1.0, "vendor": "embedthis", "version": "5.1.4" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": null }, { "model": "goahead", "scope": null, "trust": 0.8, "vendor": "embedthis", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "NVD", "id": "CVE-2021-43298" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.1.4", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-43298" } ] }, "cve": "CVE-2021-43298", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-43298", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-404338", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-43298", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-43298", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202201-2335", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-404338", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-404338" }, { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "NVD", "id": "CVE-2021-43298" }, { "db": "CNNVD", "id": "CNNVD-202201-2335" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The code that performs password matching when using \u0027Basic\u0027 HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver\u0027s response time until the unauthorized (401) response. GoAhead Is vulnerable to improper restrictions on excessive authentication attempts.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Embedthis Software GoAhead is an open source small embedded Web server from Embedthis Software in the United States", "sources": [ { "db": "NVD", "id": "CVE-2021-43298" }, { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "VULHUB", "id": "VHN-404338" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-43298", "trust": 3.3 }, { "db": "JVN", "id": "JVNVU92569237", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-004217", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-2335", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-404338", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-404338" }, { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "NVD", "id": "CVE-2021-43298" }, { "db": "CNNVD", "id": "CNNVD-202201-2335" } ] }, "id": "VAR-202201-1821", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-404338" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:21:48.280000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://www.embedthis.com/" }, { "title": "Embedthis Software GoAhead Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=180331" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "CNNVD", "id": "CNNVD-202201-2335" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-307", "trust": 1.1 }, { "problemtype": "Inappropriate limitation of excessive authentication attempts (CWE-307) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-404338" }, { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "NVD", "id": "CVE-2021-43298" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://github.com/embedthis/goahead/issues/304" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43298" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92569237/index.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-404338" }, { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "NVD", "id": "CVE-2021-43298" }, { "db": "CNNVD", "id": "CNNVD-202201-2335" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-404338" }, { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "NVD", "id": "CVE-2021-43298" }, { "db": "CNNVD", "id": "CNNVD-202201-2335" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-25T00:00:00", "db": "VULHUB", "id": "VHN-404338" }, { "date": "2023-03-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "date": "2022-01-25T20:15:08.510000", "db": "NVD", "id": "CVE-2021-43298" }, { "date": "2022-01-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-2335" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-01T00:00:00", "db": "VULHUB", "id": "VHN-404338" }, { "date": "2023-05-11T08:45:00", "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "date": "2022-02-01T13:46:54.290000", "db": "NVD", "id": "CVE-2021-43298" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-2335" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-2335" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GoAhead\u00a0 Vulnerability in improperly limiting excessive authentication attempts in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-004217" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-2335" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.