ID CVE-2021-33526 Type cve Reporter info@cert.vde.com Modified 2021-08-10T17:36:00
Description
In MB connect line mbDIALUP versions <= 3.9R0.0 a low privileged local attacker can send a command to the service running with NT AUTHORITY\SYSTEM instructing it to execute a malicous OpenVPN configuration resulting in arbitrary code execution with the privileges of the service.
{"id": "CVE-2021-33526", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-33526", "description": "In MB connect line mbDIALUP versions <= 3.9R0.0 a low privileged local attacker can send a command to the service running with NT AUTHORITY\\SYSTEM instructing it to execute a malicous OpenVPN configuration resulting in arbitrary code execution with the privileges of the service.", "published": "2021-08-02T11:15:00", "modified": "2021-08-10T17:36:00", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 7.2}, "severity": "HIGH", "exploitabilityScore": 3.9, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33526", "reporter": "info@cert.vde.com", "references": ["https://cert.vde.com/de-de/advisories/vde-2021-017"], "cvelist": ["CVE-2021-33526"], "immutableFields": [], "lastseen": "2022-03-23T18:37:21", "viewCount": 24, "enchantments": {"dependencies": {}, "score": {"value": 7.7, "vector": "NONE"}, "twitter": {"counter": 4, "modified": "2021-08-04T15:52:38", "tweets": [{"link": "https://twitter.com/eyeTSystems/status/1423380711269150721", "text": "CVE-2021-33526 In MB connect line mbDIALUP versions <= 3.9R0.0 a low privileged local attacker can send a command to the service running with NT AUTHORITY\\SYSTEM instructing it to execute a malicous OpenVPN configuration resulting in arbitrary code exec.\u2026 https://t.co/X1ZdbMsoP0?amp=1"}, {"link": "https://twitter.com/eyeTSystems/status/1423380711269150721", "text": "CVE-2021-33526 In MB connect line mbDIALUP versions <= 3.9R0.0 a low privileged local attacker can send a command to the service running with NT AUTHORITY\\SYSTEM instructing it to execute a malicous OpenVPN configuration resulting in arbitrary code exec.\u2026 https://t.co/X1ZdbMsoP0?amp=1"}, {"link": "https://twitter.com/WolfgangSesin/status/1425167644500635649", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (CVE-2021-33526 (mbdialup)) has been published on https://t.co/i0mBIx9ysV?amp=1"}, {"link": "https://twitter.com/www_sesin_at/status/1425167626989445124", "text": "New post from https://t.co/9KYxtdZjkl?amp=1 (CVE-2021-33526 (mbdialup)) has been published on https://t.co/dBDpo9iKet?amp=1"}]}, "backreferences": {}, "exploitation": null, "vulnersScore": 7.7}, "_state": {"dependencies": 0}, "_internal": {}, "cna_cvss": {"cna": "CERT VDE", "cvss": {"3": {"vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8}}}, "cpe": ["cpe:/a:mbconnectline:mbdialup:3.9r0.0"], "cpe23": ["cpe:2.3:a:mbconnectline:mbdialup:3.9r0.0:*:*:*:*:*:*:*"], "cwe": ["CWE-269"], "affectedSoftware": [{"cpeName": "mbconnectline:mbdialup", "version": "3.9r0.0", "operator": "le", "name": "mbconnectline mbdialup"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:mbconnectline:mbdialup:3.9r0.0:*:*:*:*:*:*:*", "versionEndIncluding": "3.9r0.0", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://cert.vde.com/de-de/advisories/vde-2021-017", "name": "https://cert.vde.com/de-de/advisories/vde-2021-017", "refsource": "CONFIRM", "tags": ["Third Party Advisory"]}]}