ID

VAR-202202-1377


CVE

CVE-2021-43926


TITLE

Synology DiskStation Manager  In  SQL  Injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2022-004926

DESCRIPTION

Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in Log Management functionality in Synology DiskStation Manager (DSM) before 7.0.1-42218-2 allows remote attackers to inject SQL commands via unspecified vectors. Synology DiskStation Manager (DSM) for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2021-43926 // JVNDB: JVNDB-2022-004926 // VULHUB: VHN-406551

AFFECTED PRODUCTS

vendor:synologymodel:diskstation managerscope:ltversion:7.0.1-42218-2

Trust: 1.0

vendor:synologymodel:diskstation managerscope:gteversion:7.0

Trust: 1.0

vendor:synologymodel:diskstation managerscope:ltversion:6.2.4-25556-3

Trust: 1.0

vendor:synologymodel:diskstation managerscope:gteversion:6.2

Trust: 1.0

vendor:synologymodel:diskstation managerscope:eqversion:7.0.1-42218-2

Trust: 0.8

vendor:synologymodel:diskstation managerscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-004926 // NVD: CVE-2021-43926

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-43926
value: CRITICAL

Trust: 1.0

security@synology.com: CVE-2021-43926
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-43926
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202202-509
value: CRITICAL

Trust: 0.6

VULHUB: VHN-406551
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-43926
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-406551
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-43926
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

security@synology.com: CVE-2021-43926
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 1.2
impactScore: 3.4
version: 3.1

Trust: 1.0

NVD: CVE-2021-43926
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-406551 // JVNDB: JVNDB-2022-004926 // CNNVD: CNNVD-202202-509 // NVD: CVE-2021-43926 // NVD: CVE-2021-43926

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.1

problemtype:SQL injection (CWE-89) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-406551 // JVNDB: JVNDB-2022-004926 // NVD: CVE-2021-43926

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202202-509

TYPE

SQL injection

Trust: 0.6

sources: CNNVD: CNNVD-202202-509

PATCH

title:Synology-SA-22url:https://www.synology.com/en-global/security/advisory/Synology_SA_22_01

Trust: 0.8

title:Synology DiskStation Manager SQL Repair measures for injecting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=181956

Trust: 0.6

sources: JVNDB: JVNDB-2022-004926 // CNNVD: CNNVD-202202-509

EXTERNAL IDS

db:NVDid:CVE-2021-43926

Trust: 3.3

db:JVNDBid:JVNDB-2022-004926

Trust: 0.8

db:CNNVDid:CNNVD-202202-509

Trust: 0.6

db:VULHUBid:VHN-406551

Trust: 0.1

sources: VULHUB: VHN-406551 // JVNDB: JVNDB-2022-004926 // CNNVD: CNNVD-202202-509 // NVD: CVE-2021-43926

REFERENCES

url:https://www.synology.com/security/advisory/synology_sa_22_01

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-43926

Trust: 1.4

sources: VULHUB: VHN-406551 // JVNDB: JVNDB-2022-004926 // CNNVD: CNNVD-202202-509 // NVD: CVE-2021-43926

SOURCES

db:VULHUBid:VHN-406551
db:JVNDBid:JVNDB-2022-004926
db:CNNVDid:CNNVD-202202-509
db:NVDid:CVE-2021-43926

LAST UPDATE DATE

2024-11-23T22:44:03.967000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-406551date:2022-02-10T00:00:00
db:JVNDBid:JVNDB-2022-004926date:2023-05-11T08:27:00
db:CNNVDid:CNNVD-202202-509date:2022-02-15T00:00:00
db:NVDid:CVE-2021-43926date:2024-11-21T06:30:00.737

SOURCES RELEASE DATE

db:VULHUBid:VHN-406551date:2022-02-07T00:00:00
db:JVNDBid:JVNDB-2022-004926date:2023-05-11T00:00:00
db:CNNVDid:CNNVD-202202-509date:2022-02-07T00:00:00
db:NVDid:CVE-2021-43926date:2022-02-07T03:15:07.047