ID

VAR-202211-1443


CVE

CVE-2021-42794


TITLE

AVEVA  of  edge  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-020762

DESCRIPTION

An issue was discovered in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior. The application allows a client to provide a malicious connection string that could allow an adversary to port scan the LAN, depending on the hosts' responses. AVEVA of edge Exists in unspecified vulnerabilities.Information may be obtained. AVEVA Edge 2020 R and its previous versions have a DLL hijacking vulnerability, which may affect the confidentiality, availability, or integrity of the system. There are currently no vulnerability details

Trust: 2.16

sources: NVD: CVE-2021-42794 // JVNDB: JVNDB-2021-020762 // CNVD: CNVD-2022-85519

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-85519

AFFECTED PRODUCTS

vendor:avevamodel:edgescope:eqversion:2020

Trust: 1.8

vendor:avevamodel:edgescope:ltversion:2020

Trust: 1.0

vendor:avevamodel:edgescope:eqversion: -

Trust: 0.8

vendor:avevamodel:edgescope: - version: -

Trust: 0.8

vendor:avevamodel:edge r2scope:lteversion:<=2020

Trust: 0.6

sources: CNVD: CNVD-2022-85519 // JVNDB: JVNDB-2021-020762 // NVD: CVE-2021-42794

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-42794
value: MEDIUM

Trust: 1.0

cve@mitre.org: CVE-2021-42794
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-42794
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2022-85519
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202211-3365
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2022-85519
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-42794
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 2.0

NVD: CVE-2021-42794
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-85519 // JVNDB: JVNDB-2021-020762 // CNNVD: CNNVD-202211-3365 // NVD: CVE-2021-42794 // NVD: CVE-2021-42794

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-020762 // NVD: CVE-2021-42794

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202211-3365

EXTERNAL IDS

db:NVDid:CVE-2021-42794

Trust: 3.9

db:ICS CERTid:ICSA-22-326-01

Trust: 1.9

db:AUSCERTid:ESB-2022.6114.2

Trust: 1.2

db:JVNid:JVNVU97763467

Trust: 0.8

db:JVNDBid:JVNDB-2021-020762

Trust: 0.8

db:CNVDid:CNVD-2022-85519

Trust: 0.6

db:CNNVDid:CNNVD-202211-3365

Trust: 0.6

db:VULMONid:CVE-2021-42794

Trust: 0.1

sources: CNVD: CNVD-2022-85519 // VULMON: CVE-2021-42794 // JVNDB: JVNDB-2021-020762 // CNNVD: CNNVD-202211-3365 // NVD: CVE-2021-42794

REFERENCES

url:https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-01

Trust: 1.8

url:https://www.aveva.com/en/products/edge/

Trust: 1.8

url:https://www.exploit-db.com/docs/english/17254-connection-string-parameter-pollution-attacks.pdf

Trust: 1.8

url:https://www.auscert.org.au/bulletins/esb-2022.6114.2

Trust: 1.2

url:https://jvn.jp/vu/jvnvu97763467/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-42794

Trust: 0.8

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-01

Trust: 0.1

sources: CNVD: CNVD-2022-85519 // VULMON: CVE-2021-42794 // JVNDB: JVNDB-2021-020762 // CNNVD: CNNVD-202211-3365 // NVD: CVE-2021-42794

SOURCES

db:CNVDid:CNVD-2022-85519
db:VULMONid:CVE-2021-42794
db:JVNDBid:JVNDB-2021-020762
db:CNNVDid:CNNVD-202211-3365
db:NVDid:CVE-2021-42794

LAST UPDATE DATE

2024-08-14T12:37:32.967000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-85519date:2022-12-07T00:00:00
db:JVNDBid:JVNDB-2021-020762date:2024-01-16T01:38:00
db:CNNVDid:CNNVD-202211-3365date:2022-12-19T00:00:00
db:NVDid:CVE-2021-42794date:2023-12-20T16:16:11.980

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-85519date:2022-12-06T00:00:00
db:JVNDBid:JVNDB-2021-020762date:2024-01-16T00:00:00
db:CNNVDid:CNNVD-202211-3365date:2022-11-23T00:00:00
db:NVDid:CVE-2021-42794date:2023-12-16T01:15:07.367