CVE-2021-44746 (GCVE-0-2021-44746)
Vulnerability from cvelistv5 – Published: 2022-02-01 14:28 – Updated: 2024-08-04 04:32
VLAI?
Summary
UNIVERGE DT 820 V3.2.7.0 and prior, UNIVERGE DT 830 V5.2.7.0 and prior, UNIVERGE DT 930 V2.4.0.0 and prior, IP Phone Manager V8.9.1 and prior, Data Maintenance Tool for DT900 Series V5.3.0.0 and prior, Data Maintenance Tool for DT800 Series V4.2.0.0 and prior allows a remote attacker who can access to the internal network, the configuration information may be obtained.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T04:32:13.255Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.necplatforms.co.jp/en/product/security_adv/211217.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "UNIVERGE DT 820 V3.2.7.0 and prior, UNIVERGE DT 830 V5.2.7.0 and prior, UNIVERGE DT 930 V2.4.0.0 and prior, IP Phone Manager V8.9.1 and prior, Data Maintenance Tool for DT900 Series V5.3.0.0 and prior, Data Maintenance Tool for DT800 Series V4.2.0.0 and prior allows a remote attacker who can access to the internal network, the configuration information may be obtained."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-02-01T14:28:49",
"orgId": "f2760a35-e0d8-4637-ac4c-cc1a2de3e282",
"shortName": "NEC"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.necplatforms.co.jp/en/product/security_adv/211217.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt-info@cyber.jp.nec.com",
"ID": "CVE-2021-44746",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "UNIVERGE DT 820 V3.2.7.0 and prior, UNIVERGE DT 830 V5.2.7.0 and prior, UNIVERGE DT 930 V2.4.0.0 and prior, IP Phone Manager V8.9.1 and prior, Data Maintenance Tool for DT900 Series V5.3.0.0 and prior, Data Maintenance Tool for DT800 Series V4.2.0.0 and prior allows a remote attacker who can access to the internal network, the configuration information may be obtained."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.necplatforms.co.jp/en/product/security_adv/211217.html",
"refsource": "MISC",
"url": "https://www.necplatforms.co.jp/en/product/security_adv/211217.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f2760a35-e0d8-4637-ac4c-cc1a2de3e282",
"assignerShortName": "NEC",
"cveId": "CVE-2021-44746",
"datePublished": "2022-02-01T14:28:49",
"dateReserved": "2021-12-08T00:00:00",
"dateUpdated": "2024-08-04T04:32:13.255Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:univerge_dt830_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"5.2.7.0\", \"matchCriteriaId\": \"21C737B4-8BBD-4778-B5DC-2711BF8B81D7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:univerge_dt830:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD6A37BD-F29F-486A-B720-8A0FE0D649FA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:univerge_dt820_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.2.7.0\", \"matchCriteriaId\": \"DDCC5D81-2C29-424A-9436-89F39FBDE2BC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:univerge_dt820:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA101E60-B52E-4968-B012-903086A152CC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:univerge_dt930_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.4.0.0\", \"matchCriteriaId\": \"68D2920E-101A-4209-9AF3-7BDD3A006FFC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:univerge_dt930:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FC3A718-D46C-400F-93CE-BEE0E8C0FE6F\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nec:univerge_dt900_data_maintenance_tool:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"5.3.0.0\", \"matchCriteriaId\": \"69E42A84-0201-43E6-977F-8439195E1D26\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nec:univerge_dt800_data_maintenance_tool:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"4.2.0.0\", \"matchCriteriaId\": \"E30375D6-06E6-4837-8738-647EDE37FEBD\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nec:univerge_ip_phone_manager:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"8.9.1\", \"matchCriteriaId\": \"A8052BA2-3EE8-42A4-B448-922DB349B2C3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"UNIVERGE DT 820 V3.2.7.0 and prior, UNIVERGE DT 830 V5.2.7.0 and prior, UNIVERGE DT 930 V2.4.0.0 and prior, IP Phone Manager V8.9.1 and prior, Data Maintenance Tool for DT900 Series V5.3.0.0 and prior, Data Maintenance Tool for DT800 Series V4.2.0.0 and prior allows a remote attacker who can access to the internal network, the configuration information may be obtained.\"}, {\"lang\": \"es\", \"value\": \"UNIVERGE DT 820 versiones V3.2.7.0 y anteriores, UNIVERGE DT 830 versiones V5.2.7.0 y anteriores, UNIVERGE DT 930 versiones V2.4.0.0 y anteriores, IP Phone Manager versiones V8.9.1 y anteriores, Data Maintenance Tool for DT900 Series versiones V5.3.0.0 y anteriores, Data Maintenance Tool for DT800 Series versiones V4.2.0.0 y anteriores permiten que un atacante remoto que pueda acceder a la red interna, pueda obtener la informaci\\u00f3n de configuraci\\u00f3n\"}]",
"id": "CVE-2021-44746",
"lastModified": "2024-11-21T06:31:31.060",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2022-02-01T15:15:07.960",
"references": "[{\"url\": \"https://www.necplatforms.co.jp/en/product/security_adv/211217.html\", \"source\": \"psirt-info@cyber.jp.nec.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.necplatforms.co.jp/en/product/security_adv/211217.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-44746\",\"sourceIdentifier\":\"psirt-info@cyber.jp.nec.com\",\"published\":\"2022-02-01T15:15:07.960\",\"lastModified\":\"2024-11-21T06:31:31.060\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"UNIVERGE DT 820 V3.2.7.0 and prior, UNIVERGE DT 830 V5.2.7.0 and prior, UNIVERGE DT 930 V2.4.0.0 and prior, IP Phone Manager V8.9.1 and prior, Data Maintenance Tool for DT900 Series V5.3.0.0 and prior, Data Maintenance Tool for DT800 Series V4.2.0.0 and prior allows a remote attacker who can access to the internal network, the configuration information may be obtained.\"},{\"lang\":\"es\",\"value\":\"UNIVERGE DT 820 versiones V3.2.7.0 y anteriores, UNIVERGE DT 830 versiones V5.2.7.0 y anteriores, UNIVERGE DT 930 versiones V2.4.0.0 y anteriores, IP Phone Manager versiones V8.9.1 y anteriores, Data Maintenance Tool for DT900 Series versiones V5.3.0.0 y anteriores, Data Maintenance Tool for DT800 Series versiones V4.2.0.0 y anteriores permiten que un atacante remoto que pueda acceder a la red interna, pueda obtener la informaci\u00f3n de configuraci\u00f3n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:univerge_dt830_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.2.7.0\",\"matchCriteriaId\":\"21C737B4-8BBD-4778-B5DC-2711BF8B81D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:univerge_dt830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6A37BD-F29F-486A-B720-8A0FE0D649FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:univerge_dt820_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.2.7.0\",\"matchCriteriaId\":\"DDCC5D81-2C29-424A-9436-89F39FBDE2BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:univerge_dt820:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA101E60-B52E-4968-B012-903086A152CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:univerge_dt930_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4.0.0\",\"matchCriteriaId\":\"68D2920E-101A-4209-9AF3-7BDD3A006FFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:univerge_dt930:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FC3A718-D46C-400F-93CE-BEE0E8C0FE6F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nec:univerge_dt900_data_maintenance_tool:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.3.0.0\",\"matchCriteriaId\":\"69E42A84-0201-43E6-977F-8439195E1D26\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nec:univerge_dt800_data_maintenance_tool:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.2.0.0\",\"matchCriteriaId\":\"E30375D6-06E6-4837-8738-647EDE37FEBD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nec:univerge_ip_phone_manager:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.9.1\",\"matchCriteriaId\":\"A8052BA2-3EE8-42A4-B448-922DB349B2C3\"}]}]}],\"references\":[{\"url\":\"https://www.necplatforms.co.jp/en/product/security_adv/211217.html\",\"source\":\"psirt-info@cyber.jp.nec.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.necplatforms.co.jp/en/product/security_adv/211217.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…