Lucene search

K
cve[email protected]CVE-2021-36206
HistoryOct 28, 2022 - 2:15 a.m.

CVE-2021-36206

2022-10-2802:15:16
CWE-79
web.nvd.nist.gov
31
3
cevas
cve-2021-36206
authentication bypass
sql injection

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.1%

All versions of CEVAS prior to 1.01.46 do not sufficiently validate user-controllable input and could allow a user to bypass authentication and retrieve data with specially crafted SQL queries.

Affected configurations

NVD
Node
johnsoncontrolscevasRange<1.01.46

CNA Affected

[
  {
    "vendor": "Johnson Controls",
    "product": "CEVAS",
    "versions": [
      {
        "version": "all versions prior to 1.01.46",
        "status": "affected",
        "lessThan": "1.01.46",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.1%

Related for CVE-2021-36206