Lucene search

K
cve[email protected]CVE-2021-32794
HistoryJul 26, 2021 - 7:15 p.m.

CVE-2021-32794

2021-07-2619:15:07
CWE-287
CWE-306
web.nvd.nist.gov
32
3
archisteamfarm
c#
application
vulnerability
update
asf
config
ipc
interface
security
risk
unauthorized access
patch

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

74.4%

ArchiSteamFarm is a C# application with primary purpose of idling Steam cards from multiple accounts simultaneously. Due to a bug in ASF code POST /Api/ASF ASF API endpoint responsible for updating global ASF config incorrectly removed IPCPassword from the resulting config when the caller did not specify it explicitly. Due to the above, it was possible for the user to accidentally remove IPCPassword security measure from his IPC interface when updating global ASF config, which exists as part of global config update functionality in ASF-ui. Removal of IPCPassword possesses a security risk, as unauthorized users may in result access the IPC interface after such modification. The issue is patched in ASF V5.1.2.4 and future versions. We recommend to manually verify that IPCPassword is specified after update, and if not, set it accordingly. In default settings, ASF is configured to allow IPC access from localhost only and should not affect majority of users.

Affected configurations

Vulners
NVD
Node
justarchinetarchisteamfarmRange<5.1.2.4

CNA Affected

[
  {
    "product": "ArchiSteamFarm",
    "vendor": "JustArchiNET",
    "versions": [
      {
        "status": "affected",
        "version": "< 5.1.2.4"
      }
    ]
  }
]

Social References

More

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

74.4%

Related for CVE-2021-32794