ID

VAR-202106-1312


CVE

CVE-2021-31642


TITLE

plural  CHIYU Technology  Made  IoT  Integer overflow vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2021-007490

DESCRIPTION

A denial of service condition exists after an integer overflow in several IoT devices from CHIYU Technology, including BIOSENSE, Webpass, and BF-630, BF-631, and SEMAC. The vulnerability can be explored by sending an unexpected integer (> 32 bits) on the page parameter that will crash the web portal and making it unavailable until a reboot of the device. Chiyu CHIYU BF-430 is a network server provided by Chiyu Technology (Chiyu) of Taiwan, China, which provides communication for access control, time and attendance systems and other equipment. The following products and versions are affected: BIOSENSE, Webpass, and BF-630, BF-631, SEMAC

Trust: 2.16

sources: NVD: CVE-2021-31642 // JVNDB: JVNDB-2021-007490 // CNNVD: CNNVD-202106-088

AFFECTED PRODUCTS

vendor:chiyu techmodel:biosensescope:eqversion: -

Trust: 1.0

vendor:chiyu techmodel:bf-631scope:eqversion: -

Trust: 1.0

vendor:chiyu techmodel:semac d2scope:eqversion: -

Trust: 1.0

vendor:chiyu techmodel:semac d4scope:eqversion: -

Trust: 1.0

vendor:chiyu techmodel:semac s1 osdpscope:eqversion: -

Trust: 1.0

vendor:chiyu techmodel:semac s3v3scope:eqversion: -

Trust: 1.0

vendor:chiyu techmodel:semac d1scope:eqversion: -

Trust: 1.0

vendor:chiyu techmodel:bf-630scope:eqversion: -

Trust: 1.0

vendor:chiyu techmodel:webpassscope:eqversion: -

Trust: 1.0

vendor:chiyu techmodel:semac s2scope:eqversion: -

Trust: 1.0

vendor:chiyu techmodel:semac d2 n300scope:eqversion: -

Trust: 1.0

vendor:chiyumodel:semac s3v3scope: - version: -

Trust: 0.8

vendor:chiyumodel:semac d2 n300scope: - version: -

Trust: 0.8

vendor:chiyumodel:semac s1 osdpscope: - version: -

Trust: 0.8

vendor:chiyumodel:semac s2scope: - version: -

Trust: 0.8

vendor:chiyumodel:semac d1scope: - version: -

Trust: 0.8

vendor:chiyumodel:bf-631scope: - version: -

Trust: 0.8

vendor:chiyumodel:bf-630scope: - version: -

Trust: 0.8

vendor:chiyumodel:semac d4scope: - version: -

Trust: 0.8

vendor:chiyumodel:semac d2scope: - version: -

Trust: 0.8

vendor:chiyumodel:webpassscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-007490 // NVD: CVE-2021-31642

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-31642
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-31642
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202106-088
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2021-31642
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2021-31642
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-31642
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-007490 // CNNVD: CNNVD-202106-088 // NVD: CVE-2021-31642

PROBLEMTYPE DATA

problemtype:CWE-190

Trust: 1.0

problemtype:Integer overflow or wraparound (CWE-190) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-007490 // NVD: CVE-2021-31642

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202106-088

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202106-088

PATCH

title:Firmware updateurl:https://www.chiyu-tech.com/msg/message-Firmware-update-87.html

Trust: 0.8

title:CHIYU Technology IoT devices Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=153512

Trust: 0.6

sources: JVNDB: JVNDB-2021-007490 // CNNVD: CNNVD-202106-088

EXTERNAL IDS

db:NVDid:CVE-2021-31642

Trust: 3.2

db:PACKETSTORMid:162934

Trust: 2.4

db:JVNDBid:JVNDB-2021-007490

Trust: 0.8

db:EXPLOIT-DBid:49937

Trust: 0.6

db:CNNVDid:CNNVD-202106-088

Trust: 0.6

sources: JVNDB: JVNDB-2021-007490 // CNNVD: CNNVD-202106-088 // NVD: CVE-2021-31642

REFERENCES

url:http://packetstormsecurity.com/files/162934/chiyu-iot-denial-of-service.html

Trust: 3.0

url:https://www.chiyu-tech.com/msg/message-firmware-update-87.html

Trust: 1.6

url:https://seguranca-informatica.pt/dancing-in-the-iot-chiyu-devices-vulnerable-to-remote-attacks/

Trust: 1.6

url:https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31642

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-31642

Trust: 0.8

url:https://www.exploit-db.com/exploits/49937

Trust: 0.6

sources: JVNDB: JVNDB-2021-007490 // CNNVD: CNNVD-202106-088 // NVD: CVE-2021-31642

SOURCES

db:JVNDBid:JVNDB-2021-007490
db:CNNVDid:CNNVD-202106-088
db:NVDid:CVE-2021-31642

LAST UPDATE DATE

2024-08-14T14:31:42.622000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2021-007490date:2022-02-14T09:15:00
db:CNNVDid:CNNVD-202106-088date:2021-06-10T00:00:00
db:NVDid:CVE-2021-31642date:2021-06-08T19:09:55.183

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2021-007490date:2022-02-14T00:00:00
db:CNNVDid:CNNVD-202106-088date:2021-06-01T00:00:00
db:NVDid:CVE-2021-31642date:2021-06-01T15:15:07.717