SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
{"id": "CVE-2021-21457", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-21457", "description": "SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.", "published": "2021-01-12T15:15:00", "modified": "2021-02-19T14:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8}, "severity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21457", "reporter": "cna@sap.com", "references": ["https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476", "https://launchpad.support.sap.com/#/notes/3002617"], "cvelist": ["CVE-2021-21457"], "immutableFields": [], "lastseen": "2023-02-09T14:06:47", "viewCount": 12, "enchantments": {"dependencies": {"references": [{"type": "zdi", "idList": ["ZDI-21-005"]}], "rev": 4}, "score": {"value": 3.6, "vector": "NONE"}, "twitter": {"counter": 2, "modified": "2021-02-12T14:58:56", "tweets": [{"link": "https://twitter.com/threatintelctr/status/1362766077130928132", "text": " NEW: CVE-2021-21457 SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily... (click for more) Severity: HIGH https://t.co/Ag3fsprnQs?amp=1"}, {"link": "https://twitter.com/threatintelctr/status/1362766077130928132", "text": " NEW: CVE-2021-21457 SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily... (click for more) Severity: HIGH https://t.co/Ag3fsprnQs?amp=1"}]}, "backreferences": {"references": [{"type": "talos", "idList": ["SAP"]}, {"type": "zdi", "idList": ["ZDI-21-005"]}]}, "exploitation": null, "affected_software": {"major_version": [{"name": "sap 3d visual enterprise viewer", "version": 9}]}, "epss": [{"cve": "CVE-2021-21457", "epss": "0.002100000", "percentile": "0.571740000", "modified": "2023-03-17"}], "vulnersScore": 3.6}, "_state": {"dependencies": 1675958436, "score": 1675957768, "affected_software_major_version": 1677294086, "epss": 1679062491}, "_internal": {"score_hash": "442a0bee1fc5dd1c7e8658079700822e"}, "cna_cvss": {"cna": "SAP SE", "cvss": {"3": {"vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "score": 4.3}}}, "cpe": ["cpe:/a:sap:3d_visual_enterprise_viewer:9"], "cpe23": ["cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"], "cwe": ["CWE-119"], "affectedSoftware": [{"cpeName": "sap:3d_visual_enterprise_viewer", "version": "9", "operator": "eq", "name": "sap 3d visual enterprise viewer"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476", "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476", "refsource": "MISC", "tags": ["Vendor Advisory"]}, {"url": "https://launchpad.support.sap.com/#/notes/3002617", "name": "https://launchpad.support.sap.com/#/notes/3002617", "refsource": "MISC", "tags": ["Permissions Required"]}], "product_info": [{"vendor": "SAP SE", "product": "SAP 3D Visual Enterprise Viewer"}]}
{"zdi": [{"lastseen": "2022-01-31T22:29:20", "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-01-12T00:00:00", "type": "zdi", "title": "SAP 3D Visual Enterprise Viewer IFF File Parsing Memory Corruption Remote Code Execution Vulnerabililty", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-21457"], "modified": "2021-01-12T00:00:00", "id": "ZDI-21-005", "href": "https://www.zerodayinitiative.com/advisories/ZDI-21-005/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}