Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-40857

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-13 Dec, 2021 | 03:24
Updated At-04 Aug, 2024 | 02:51
Rejected At-
Credits

Auerswald COMpact 5500R devices before 8.2B allow Privilege Escalation via the passwd=1 substring.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:13 Dec, 2021 | 03:24
Updated At:04 Aug, 2024 | 02:51
Rejected At:
▼CVE Numbering Authority (CNA)

Auerswald COMpact 5500R devices before 8.2B allow Privilege Escalation via the passwd=1 substring.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
x_refsource_MISC
http://packetstormsecurity.com/files/165163/Auerswald-COMpact-8.0B-Privilege-Escalation.html
x_refsource_MISC
https://www.redteam-pentesting.de/advisories/rt-sa-2021-005
x_refsource_MISC
Hyperlink: https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
Resource:
x_refsource_MISC
Hyperlink: http://packetstormsecurity.com/files/165163/Auerswald-COMpact-8.0B-Privilege-Escalation.html
Resource:
x_refsource_MISC
Hyperlink: https://www.redteam-pentesting.de/advisories/rt-sa-2021-005
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
x_refsource_MISC
x_transferred
http://packetstormsecurity.com/files/165163/Auerswald-COMpact-8.0B-Privilege-Escalation.html
x_refsource_MISC
x_transferred
https://www.redteam-pentesting.de/advisories/rt-sa-2021-005
x_refsource_MISC
x_transferred
Hyperlink: https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://packetstormsecurity.com/files/165163/Auerswald-COMpact-8.0B-Privilege-Escalation.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.redteam-pentesting.de/advisories/rt-sa-2021-005
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:13 Dec, 2021 | 04:15
Updated At:31 Mar, 2022 | 16:33

Auerswald COMpact 5500R devices before 8.2B allow Privilege Escalation via the passwd=1 substring.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.06.5MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 6.5
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P
CPE Matches

auerswald
auerswald
>>compact_5500r_ip_firmware>>Versions up to 8.0b(inclusive)
cpe:2.3:o:auerswald:compact_5500r_ip_firmware:*:*:*:*:*:*:*:*
auerswald
auerswald
>>compact_5500r_ip>>-
cpe:2.3:h:auerswald:compact_5500r_ip:-:*:*:*:*:*:*:*
auerswald
auerswald
>>compact_5200r_ip_firmware>>Versions up to 8.0b(inclusive)
cpe:2.3:o:auerswald:compact_5200r_ip_firmware:*:*:*:*:*:*:*:*
auerswald
auerswald
>>compact_5200r_ip>>-
cpe:2.3:h:auerswald:compact_5200r_ip:-:*:*:*:*:*:*:*
auerswald
auerswald
>>compact_5000r_ip_firmware>>Versions up to 8.0b(inclusive)
cpe:2.3:o:auerswald:compact_5000r_ip_firmware:*:*:*:*:*:*:*:*
auerswald
auerswald
>>compact_5000r_ip>>-
cpe:2.3:h:auerswald:compact_5000r_ip:-:*:*:*:*:*:*:*
auerswald
auerswald
>>compact_4000_ip_firmware>>Versions up to 8.0b(inclusive)
cpe:2.3:o:auerswald:compact_4000_ip_firmware:*:*:*:*:*:*:*:*
auerswald
auerswald
>>compact_4000r_ip>>-
cpe:2.3:h:auerswald:compact_4000r_ip:-:*:*:*:*:*:*:*
auerswald
auerswald
>>commander_6000r_ip_firmware>>Versions up to 8.0b(inclusive)
cpe:2.3:o:auerswald:commander_6000r_ip_firmware:*:*:*:*:*:*:*:*
auerswald
auerswald
>>commander_6000r_ip>>-
cpe:2.3:h:auerswald:commander_6000r_ip:-:*:*:*:*:*:*:*
auerswald
auerswald
>>commander_6000rx_ip_firmware>>Versions up to 8.0b(inclusive)
cpe:2.3:o:auerswald:commander_6000rx_ip_firmware:*:*:*:*:*:*:*:*
auerswald
auerswald
>>commander_6000rx_ip>>-
cpe:2.3:h:auerswald:commander_6000rx_ip:-:*:*:*:*:*:*:*
auerswald
auerswald
>>commander_business\(19\"\)_ip_firmware>>Versions up to 8.0b(inclusive)
cpe:2.3:o:auerswald:commander_business\(19\"\)_ip_firmware:*:*:*:*:*:*:*:*
auerswald
auerswald
>>commander_business\(19\"\)_ip>>-
cpe:2.3:h:auerswald:commander_business\(19\"\)_ip:-:*:*:*:*:*:*:*
auerswald
auerswald
>>commander_basic.2\(19\"\)_ip_firmware>>Versions up to 8.0b(inclusive)
cpe:2.3:o:auerswald:commander_basic.2\(19\"\)_ip_firmware:*:*:*:*:*:*:*:*
auerswald
auerswald
>>commander_basic.2\(19\"\)_ip>>-
cpe:2.3:h:auerswald:commander_basic.2\(19\"\)_ip:-:*:*:*:*:*:*:*
auerswald
auerswald
>>compact_5010_voip_ip_firmware>>Versions up to 8.0b(inclusive)
cpe:2.3:o:auerswald:compact_5010_voip_ip_firmware:*:*:*:*:*:*:*:*
auerswald
auerswald
>>compact_5010_voip_ip>>-
cpe:2.3:h:auerswald:compact_5010_voip_ip:-:*:*:*:*:*:*:*
auerswald
auerswald
>>compact_5020_voip_ip_firmware>>Versions up to 8.0b(inclusive)
cpe:2.3:o:auerswald:compact_5020_voip_ip_firmware:*:*:*:*:*:*:*:*
auerswald
auerswald
>>compact_5020_voip_ip>>-
cpe:2.3:h:auerswald:compact_5020_voip_ip:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-522Primarynvd@nist.gov
CWE ID: CWE-522
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/165163/Auerswald-COMpact-8.0B-Privilege-Escalation.htmlcve@mitre.org
Exploit
Third Party Advisory
VDB Entry
https://www.redteam-pentesting.de/advisories/rt-sa-2021-005cve@mitre.org
Exploit
Third Party Advisory
https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analysescve@mitre.org
Exploit
Third Party Advisory
Hyperlink: http://packetstormsecurity.com/files/165163/Auerswald-COMpact-8.0B-Privilege-Escalation.html
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://www.redteam-pentesting.de/advisories/rt-sa-2021-005
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory
Hyperlink: https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

56Records found

CVE-2019-10287
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-8.8||HIGH
EPSS-0.08% / 24.27%
||
7 Day CHG~0.00%
Published-04 Apr, 2019 | 15:38
Updated-04 Aug, 2024 | 22:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins youtrack-plugin Plugin 0.7.1 and older stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.

Action-Not Available
Vendor-Jenkins
Product-youtrack-pluginJenkins youtrack-plugin Plugin
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-10448
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-8.8||HIGH
EPSS-0.07% / 20.91%
||
7 Day CHG~0.00%
Published-16 Oct, 2019 | 13:00
Updated-04 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins Extensive Testing Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

Action-Not Available
Vendor-Jenkins
Product-extensive_testingJenkins Extensive Testing Plugin
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-10288
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-8.8||HIGH
EPSS-0.08% / 24.27%
||
7 Day CHG~0.00%
Published-04 Apr, 2019 | 15:38
Updated-04 Aug, 2024 | 22:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins Jabber Server Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

Action-Not Available
Vendor-Jenkins
Product-jabber_serverJenkins Jabber Server Plugin
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-10318
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-8.8||HIGH
EPSS-0.08% / 24.27%
||
7 Day CHG~0.00%
Published-30 Apr, 2019 | 12:25
Updated-04 Aug, 2024 | 22:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins Azure AD Plugin 0.3.3 and earlier stored the client secret unencrypted in the global config.xml configuration file on the Jenkins master where it could be viewed by users with access to the master file system.

Action-Not Available
Vendor-Jenkins
Product-azure_adJenkins Azure AD Plugin
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2024-40710
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-8.8||HIGH
EPSS-0.60% / 68.52%
||
7 Day CHG~0.00%
Published-07 Sep, 2024 | 16:11
Updated-01 May, 2025 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A series of related high-severity vulnerabilities, the most notable enabling remote code execution (RCE) as the service account and extraction of sensitive information (savedcredentials and passwords). Exploiting these vulnerabilities requires a user who has been assigned a low-privileged role within Veeam Backup & Replication.

Action-Not Available
Vendor-Veeam Software Group GmbH
Product-veeam_backup_\&_replicationBackup and Recoverybackup_\&_replication
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2024-38291
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.07% / 22.80%
||
7 Day CHG~0.00%
Published-27 Feb, 2025 | 00:00
Updated-11 Jul, 2025 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In XIQ-SE before 24.2.11, a low-privileged user may be able to access admin passwords, which could lead to privilege escalation.

Action-Not Available
Vendor-extremenetworksn/a
Product-xiq-sen/a
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-522
Insufficiently Protected Credentials
  • Previous
  • 1
  • 2
  • Next
Details not found