Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-23261

Summary
Assigner-crafter
Assigner Org ID-4ff2b028-869f-4b00-a7b2-05997f6f14fd
Published At-02 Dec, 2021 | 15:40
Updated At-17 Sep, 2024 | 01:57
Rejected At-
Credits

Overriding the system configuration file causes a denial of service

Authenticated administrators may override the system configuration file and cause a denial of service.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:crafter
Assigner Org ID:4ff2b028-869f-4b00-a7b2-05997f6f14fd
Published At:02 Dec, 2021 | 15:40
Updated At:17 Sep, 2024 | 01:57
Rejected At:
▼CVE Numbering Authority (CNA)
Overriding the system configuration file causes a denial of service

Authenticated administrators may override the system configuration file and cause a denial of service.

Affected Products
Vendor
Crafter Software
Product
Crafter CMS
Versions
Affected
  • From 3.1 before 3.1.13 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-703CWE-703 Improper Check or Handling of Exceptional Conditions
Type: CWE
CWE ID: CWE-703
Description: CWE-703 Improper Check or Handling of Exceptional Conditions
Metrics
VersionBase scoreBase severityVector
3.14.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 4.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Kai Zhao (ToTU Security Team)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120104
x_refsource_MISC
Hyperlink: https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120104
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120104
x_refsource_MISC
x_transferred
Hyperlink: https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120104
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@craftersoftware.com
Published At:02 Dec, 2021 | 16:15
Updated At:03 Dec, 2021 | 14:41

Authenticated administrators may override the system configuration file and cause a denial of service.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.14.9MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Secondary3.14.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
Primary2.04.0MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:P
Type: Primary
Version: 3.1
Base score: 4.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 4.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 4.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P
CPE Matches

craftercms
craftercms
>>crafter_cms>>Versions from 3.1.0(inclusive) to 3.1.13(exclusive)
cpe:2.3:a:craftercms:crafter_cms:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE-703Secondarysecurity@craftersoftware.com
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-703
Type: Secondary
Source: security@craftersoftware.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120104security@craftersoftware.com
Vendor Advisory
Hyperlink: https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120104
Source: security@craftersoftware.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

4Records found

CVE-2021-23265
Matching Score-8
Assigner-Crafter CMS
ShareView Details
Matching Score-8
Assigner-Crafter CMS
CVSS Score-3.5||LOW
EPSS-0.38% / 58.49%
||
7 Day CHG~0.00%
Published-16 May, 2022 | 17:05
Updated-16 Sep, 2024 | 20:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Privilege Management in Crafter Studio

A logged-in and authenticated user with a Reviewer Role may lock a content item.

Action-Not Available
Vendor-craftercmsCrafter Software
Product-crafter_cmsCrafter CMS
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-39945
Matching Score-4
Assigner-Dahua Technologies
ShareView Details
Matching Score-4
Assigner-Dahua Technologies
CVSS Score-4.9||MEDIUM
EPSS-0.23% / 45.46%
||
7 Day CHG~0.00%
Published-31 Jul, 2024 | 03:16
Updated-27 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in Dahua products.  After obtaining the administrator's username and password, the attacker can send a carefully crafted data packet to the interface with vulnerabilities, causing the device to crash.

Action-Not Available
Vendor-Dahua Technology Co., Ltd
Product-nvr4208-8p-4ks3_firmwarenvr4104-p-4ks3\(960g\)nvr4108-p-4ks2\/lnvr4104-4ks2\/lnvr4104-4ks3nvr4108hs-p-4ks3_firmwarenvr4208-8p-4ks2\/l_firmwarenvr4104hs-4ks3nvr4108hs-8p-4ks2\/l_firmwarenvr4232-16p-4ks2\/l_firmwarenvr4104hs-p-4ks3nvr4116-8p-4ks2\/l_firmwarenvr4104hs-p-4ks3_firmwarenvr4104-p-4ks3nvr4816-16p-4ks2\/i_firmwarenvr4116hs-4ks3nvr4116hs-4ks2\/lnvr4204-p-4ks3_firmwarenvr4104-p-4ks3\(960g\)_firmwarenvr4104hs-p-4ks2\/l_firmwarenvr4204-4ks3_firmwarenvr4216-16p-4ks3nvr4104-p-4ks3_firmwarenvr4108-4ks3_firmwarenvr4216-4ks3_firmwarenvr4104-p-4ks2\/l_firmwarenvr4108-4ks2\/lnvr4204-4ks2\/lnvr4116-8p-4ks2\/lnvr4832-16p-4ks2\/invr4108-8p-4ks2\/l_firmwarenvr4104-4ks3_firmwarenvr4204-4ks3nvr4208-4ks2\/lnvr4432-4ks2\/i_firmwarenvr4116-8p-4ks3nvr4104hs-p-4ks3\(960g\)_firmwarenvr4116hs-8p-4ks2\/lnvr4232-16p-4ks3nvr4216-16p-4ks2\/l_firmwarenvr4832-4ks2\/invr4416-4ks2\/i_firmwarenvr4108hs-8p-4ks3_firmwarenvr4232-4ks3nvr4108hs-4ks3_firmwarenvr4208-8p-4ks3nvr4216-4ks2\/lnvr4208-4ks3_firmwarenvr4108-4ks2\/l_firmwarenvr4108hs-8p-4ks2\/lnvr4232-4ks2\/l_firmwarenvr4208-4ks2\/l_firmwarenvr4116hs-4ks3_firmwarenvr4104hs-4ks3_firmwarenvr4116-8p-4ks3_firmwarenvr4104hs-4ks3\(960g\)_firmwarenvr4108-8p-4ks2\/lnvr4432-16p-4ks2\/invr4416-4ks2\/invr4108-8p-4ks3nvr4108hs-p-4ks2\/lnvr4104hs-4ks2\/lnvr4232-4ks3_firmwarenvr4204-p-4ks3nvr4108hs-p-4ks3nvr4108hs-4ks2\/l_firmwarenvr4104hs-4ks2\/l_firmwarenvr4116hs-8p-4ks2\/l_firmwarenvr4216-16p-4ks2\/lnvr4108hs-p-4ks2\/l_firmwarenvr4232-4ks2\/lnvr4108-p-4ks3nvr4204-4ks2\/l_firmwarenvr4104-4ks2\/l_firmwarenvr4108-p-4ks2\/l_firmwarenvr4108-8p-4ks3_firmwarenvr4432-4ks2\/invr4108hs-8p-4ks3nvr4116-4ks2\/lnvr4116hs-4ks2\/l_firmwarenvr4104hs-p-4ks3\(960g\)nvr4832-4ks2\/i_firmwarenvr4116-4ks3nvr4232-16p-4ks2\/lnvr4108-4ks3nvr4816-16p-4ks2\/invr4116hs-8p-4ks3nvr4204-p-4ks2\/l_firmwarenvr4216-16p-4ks3_firmwarenvr4204-p-4ks2\/lnvr4416-16p-4ks2\/invr4116hs-8p-4ks3_firmwarenvr4116-4ks3_firmwarenvr4816-4ks2\/invr4108hs-4ks3\(960g\)_firmwarenvr4116-4ks2\/l_firmwarenvr4108hs-4ks2\/lnvr4208-4ks3nvr4432-16p-4ks2\/i_firmwarenvr4208-8p-4ks2\/lnvr4104-p-4ks2\/lnvr4832-16p-4ks2\/i_firmwarenvr4108hs-4ks3\(960g\)nvr4104hs-4ks3\(960g\)nvr4216-4ks3nvr4216-4ks2\/l_firmwarenvr4108-p-4ks3_firmwarenvr4104hs-p-4ks2\/lnvr4416-16p-4ks2\/i_firmwarenvr4108hs-4ks3nvr4232-16p-4ks3_firmwarenvr4816-4ks2\/i_firmwareNVR4XXX
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
CVE-2019-10927
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-6.5||MEDIUM
EPSS-0.61% / 68.76%
||
7 Day CHG~0.00%
Published-13 Aug, 2019 | 18:55
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SCALANCE SC-600 (V2.0), SCALANCE XB-200 (V4.1), SCALANCE XC-200 (V4.1), SCALANCE XF-200BA (V4.1), SCALANCE XP-200 (V4.1), SCALANCE XR-300WG (V4.1). An authenticated attacker with network access to to port 22/tcp of an affected device may cause a Denial-of-Service condition. The security vulnerability could be exploited by an authenticated attacker with network access to the affected device. No user interaction is required to exploit this vulnerability. The vulnerability impacts the availability of the affected device.

Action-Not Available
Vendor-Siemens AG
Product-scalance_xp-200_firmwarescalance_xb-200_firmwarescalance_xf-200ba_firmwarescalance_xc-200_firmwarescalance_xc-200scalance_xb-200scalance_xr-300wg_firmwarescalance_xr-300wgscalance_xp-200scalance_xf-200baSCALANCE XR-300WGSCALANCE XF-200BASCALANCE SC-600SCALANCE XP-200SCALANCE XC-200SCALANCE XB-200
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
CVE-2024-37992
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-5.9||MEDIUM
EPSS-0.23% / 45.46%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 09:36
Updated-18 Sep, 2024 | 15:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0) (All versions < V4.2), SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0) (All versions < V4.2), SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0) (All versions < V4.2), SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0) (All versions < V4.2), SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0) (All versions < V4.2), SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0) (All versions < V4.2), SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0) (All versions < V4.2), SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0) (All versions < V4.2), SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0) (All versions < V4.2), SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0) (All versions < V4.2), SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0) (All versions < V4.2), SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0) (All versions < V4.2), SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0) (All versions < V4.2), SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0) (All versions < V4.2), SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0) (All versions < V4.2), SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0) (All versions < V4.2), SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0) (All versions < V4.2), SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0) (All versions < V4.2), SIMATIC RF1140R (6GT2831-6CB00) (All versions < V1.1), SIMATIC RF1170R (6GT2831-6BB00) (All versions < V1.1), SIMATIC RF166C (6GT2002-0EE20) (All versions < V2.2), SIMATIC RF185C (6GT2002-0JE10) (All versions < V2.2), SIMATIC RF186C (6GT2002-0JE20) (All versions < V2.2), SIMATIC RF186CI (6GT2002-0JE50) (All versions < V2.2), SIMATIC RF188C (6GT2002-0JE40) (All versions < V2.2), SIMATIC RF188CI (6GT2002-0JE60) (All versions < V2.2), SIMATIC RF360R (6GT2801-5BA30) (All versions < V2.2). The affected devices does not properly handle the error in case of exceeding characters while setting SNMP leading to the restart of the application.

Action-Not Available
Vendor-Siemens AG
Product-simatic_reader_rf650r_fcc_firmwaresimatic_reader_rf680r_cmiitsimatic_rf1170r_firmwaresimatic_reader_rf650r_cmiit_firmwaresimatic_reader_rf685r_fccsimatic_reader_rf650r_aribsimatic_reader_rf615r_etsi_firmwaresimatic_rf360rsimatic_reader_rf680r_fccsimatic_reader_rf610r_fccsimatic_reader_rf610r_etsi_firmwaresimatic_reader_rf685r_arib_firmwaresimatic_reader_rf615r_cmiitsimatic_rf186c_firmwaresimatic_reader_rf685r_fcc_firmwaresimatic_rf188c_firmwaresimatic_reader_rf680r_cmiit_firmwaresimatic_reader_rf685r_etsisimatic_rf185csimatic_rf360r_firmwaresimatic_rf1140r_firmwaresimatic_rf186cisimatic_rf1140rsimatic_rf188csimatic_reader_rf610r_cmiit_firmwaresimatic_reader_rf610r_fcc_firmwaresimatic_rf185c_firmwaresimatic_reader_rf615r_fccsimatic_reader_rf680r_etsisimatic_reader_rf615r_fcc_firmwaresimatic_reader_rf680r_fcc_firmwaresimatic_reader_rf610r_etsisimatic_reader_rf685r_cmiit_firmwaresimatic_reader_rf680r_arib_firmwaresimatic_rf186ci_firmwaresimatic_rf166c_firmwaresimatic_rf188ci_firmwaresimatic_reader_rf650r_fccsimatic_reader_rf650r_cmiitsimatic_reader_rf685r_cmiitsimatic_rf166csimatic_reader_rf680r_aribsimatic_rf1170rsimatic_reader_rf650r_etsisimatic_reader_rf610r_cmiitsimatic_reader_rf650r_arib_firmwaresimatic_reader_rf680r_etsi_firmwaresimatic_reader_rf615r_etsisimatic_reader_rf650r_etsi_firmwaresimatic_rf186csimatic_reader_rf685r_aribsimatic_reader_rf615r_cmiit_firmwaresimatic_reader_rf685r_etsi_firmwaresimatic_rf188ciSIMATIC Reader RF650R ARIBSIMATIC Reader RF650R ETSISIMATIC Reader RF680R CMIITSIMATIC Reader RF615R ETSISIMATIC RF166CSIMATIC Reader RF685R CMIITSIMATIC RF185CSIMATIC Reader RF610R CMIITSIMATIC Reader RF685R ETSISIMATIC Reader RF615R CMIITSIMATIC RF188CISIMATIC Reader RF610R ETSISIMATIC Reader RF685R FCCSIMATIC Reader RF615R FCCSIMATIC RF186CSIMATIC RF360RSIMATIC Reader RF680R ARIBSIMATIC RF1140RSIMATIC Reader RF685R ARIBSIMATIC RF1170RSIMATIC Reader RF680R ETSISIMATIC RF188CSIMATIC Reader RF610R FCCSIMATIC Reader RF650R CMIITSIMATIC RF186CISIMATIC Reader RF680R FCCSIMATIC Reader RF650R FCC
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
Details not found