6.5
CVE-2021-23207
- EPSS 0.05%
- Veröffentlicht 21.01.2022 19:15:08
- Zuletzt bearbeitet 21.11.2024 05:51:22
- Quelle ics-cert@hq.dhs.gov
- CVE-Watchlists
- Unerledigt
An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fresenius-kabi ≫ Agilia Connect Version <= d25
Fresenius-kabi ≫ Agilia Partner Maintenance Software Version <= 3.3.0
Fresenius-kabi ≫ Vigilant Centerium Version1.0
Fresenius-kabi ≫ Vigilant Insight Version1.0
Fresenius-kabi ≫ Vigilant Mastermed Version1.0
Fresenius-kabi ≫ Link+ Agilia Firmware Version < 3.0
Fresenius-kabi ≫ Link+ Agilia Firmware Version3.0 Update-
Fresenius-kabi ≫ Link+ Agilia Firmware Version3.0 Updated15
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.168 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
| nvd@nist.gov | 2.1 | 3.9 | 2.9 |
AV:L/AC:L/Au:N/C:P/I:N/A:N
|
| ics-cert@hq.dhs.gov | 6.5 | 2 | 4 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
|
CWE-256 Plaintext Storage of a Password
Storing a password in plaintext may result in a system compromise.
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.