If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands. Roon Labs has already fixed this vulnerability in the following versions: Roon Server 2021-05-18 and later
{"id": "CVE-2021-28811", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-28811", "description": "If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands. Roon Labs has already fixed this vulnerability in the following versions: Roon Server 2021-05-18 and later", "published": "2021-06-08T03:15:00", "modified": "2021-06-21T15:05:00", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.5}, "severity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-28811", "reporter": "security@qnap.com", "references": ["https://www.qnap.com/zh-tw/security-advisory/qsa-21-17"], "cvelist": ["CVE-2021-28811"], "immutableFields": [], "lastseen": "2022-03-23T16:42:57", "viewCount": 36, "enchantments": {"dependencies": {"references": [{"type": "seebug", "idList": ["SSV:99274"]}], "rev": 4}, "score": {"value": 6.9, "vector": "NONE"}, "twitter": {"counter": 8, "modified": "2021-06-09T07:39:38", "tweets": [{"link": "https://twitter.com/www_sesin_at/status/1402189989002330113", "text": "New post from https://t.co/9KYxtdZjkl?amp=1 (Roon Server os command injection [CVE-2021-28811]) has been published on https://t.co/wMp6SMeWWn?amp=1"}, {"link": "https://twitter.com/www_sesin_at/status/1402189989002330113", "text": "New post from https://t.co/9KYxtdZjkl?amp=1 (Roon Server os command injection [CVE-2021-28811]) has been published on https://t.co/wMp6SMeWWn?amp=1"}, {"link": "https://twitter.com/hernanespinoza/status/1402191747581628416", "text": "CVEnew: CVE-2021-28811 If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands. Roon Labs has already fixed this vulnerability in the following versions: Roon Server 2021-05-18 and later https://t.co/lojbZ1oT4T?amp=1"}, {"link": "https://twitter.com/hernanespinoza/status/1402191747581628416", "text": "CVEnew: CVE-2021-28811 If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands. Roon Labs has already fixed this vulnerability in the following versions: Roon Server 2021-05-18 and later https://t.co/lojbZ1oT4T?amp=1"}, {"link": "https://twitter.com/80vul/status/1405120757496127491", "text": "In May, CNCERT found QNAP NAS 0day vuls (CVE-2021-28810/CVE-2021-28811) were used by eCh0raix ransomware again and this has been many times.From ZoomEye : QNAP NAS devices on the Internet have declined since 2018, Lowest in 2021. I think this is related to the ransomware activity"}, {"link": "https://twitter.com/WolfgangSesin/status/1402189987936968708", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (Roon Server os command injection [CVE-2021-28811]) has been published on https://t.co/37q9tQY8Me?amp=1"}, {"link": "https://twitter.com/WolfgangSesin/status/1402189987936968708", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (Roon Server os command injection [CVE-2021-28811]) has been published on https://t.co/37q9tQY8Me?amp=1"}, {"link": "https://twitter.com/prophaze/status/1403214376086220800", "text": "Post Edited: Roon Server os command injection [CVE-2021-28811] https://t.co/gYg6cuYquV?amp=1\n/hashtag/Exploit?src=hashtag_click:No /hashtag/Local?src=hashtag_click:No /hashtag/Product?src=hashtag_click:Server /hashtag/Remote?src=hashtag_click:Yes"}]}, "backreferences": {"references": [{"type": "seebug", "idList": ["SSV:99274"]}]}, "exploitation": null, "vulnersScore": 6.9}, "_state": {"dependencies": 0}, "_internal": {}, "cna_cvss": {"cna": "QNAP Systems, Inc.", "cvss": {"3": {"vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "score": 7.2}}}, "cpe": [], "cpe23": [], "cwe": ["CWE-77"], "affectedSoftware": [{"cpeName": "roonlabs:roon_server", "version": "2021-05-18", "operator": "lt", "name": "roonlabs roon server"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:roonlabs:roon_server:2021-05-18:*:*:*:*:*:*:*", "versionEndExcluding": "2021-05-18", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-17", "name": "N/A", "refsource": "CONFIRM", "tags": ["Vendor Advisory"]}]}