6.5
CVE-2021-32459
- EPSS 0.53%
- Published 27.05.2021 11:15:07
- Last modified 21.11.2024 06:07:04
- Source security@trendmicro.com
- Teams watchlist Login
- Open Login
Trend Micro Home Network Security version 6.6.604 and earlier contains a hard-coded password vulnerability in the log collection server which could allow an attacker to use a specially crafted network request to lead to arbitrary authentication. An attacker must first obtain the ability to execute high-privileged code on the target device in order to exploit this vulnerability.
Data is provided by the National Vulnerability Database (NVD)
Trendmicro ≫ Home Network Security Langen Version <= 6.6.604
Trendmicro ≫ Home Network Security Langja Version <= 6.6.604
Trendmicro ≫ Home Network Security Langzh Version <= 6.6.604
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.53% | 0.646 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 1.2 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
|
nvd@nist.gov | 5.5 | 8 | 4.9 |
AV:N/AC:L/Au:S/C:P/I:P/A:N
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.