9.8

CVE-2021-32984

All programming connections receive the same unlocked privileges, which can result in a privilege escalation. During the time Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 is unlocked by an authorized user, an attacker can connect to the PLC and read the project without authorization.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AutomationdirectC0-10dd1e-d Firmware Version < 3.00
   AutomationdirectC0-10dd1e-d Version-
AutomationdirectC0-10dd2e-d Firmware Version < 3.00
   AutomationdirectC0-10dd2e-d Version-
AutomationdirectC0-10dre-d Firmware Version < 3.00
   AutomationdirectC0-10dre-d Version-
AutomationdirectC0-10are-d Firmware Version < 3.00
   AutomationdirectC0-10are-d Version-
AutomationdirectC0-11dd1e-d Firmware Version < 3.00
   AutomationdirectC0-11dd1e-d Version-
AutomationdirectC0-11dd2e-d Firmware Version < 3.00
   AutomationdirectC0-11dd2e-d Version-
AutomationdirectC0-11dre-d Firmware Version < 3.00
   AutomationdirectC0-11dre-d Version-
AutomationdirectC0-11are-d Firmware Version < 3.00
   AutomationdirectC0-11are-d Version-
AutomationdirectC0-12dd1e-d Firmware Version < 3.00
   AutomationdirectC0-12dd1e-d Version-
AutomationdirectC0-12dd2e-d Firmware Version < 3.00
   AutomationdirectC0-12dd2e-d Version-
AutomationdirectC0-12dre-d Firmware Version < 3.00
   AutomationdirectC0-12dre-d Version-
AutomationdirectC0-12are-d Firmware Version < 3.00
   AutomationdirectC0-12are-d Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.29% 0.516
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
ics-cert@hq.dhs.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

CWE-288 Authentication Bypass Using an Alternate Path or Channel

The product requires authentication, but the product has an alternate path or channel that does not require authentication.