7.2
CVE-2021-35530
- EPSS 0.11%
- Veröffentlicht 07.06.2022 21:15:14
- Zuletzt bearbeitet 21.11.2024 06:12:27
- Quelle cybersecurity@hitachienergy.co
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in the application authentication and authorization mechanism in Hitachi Energy's TXpert Hub CoreTec 4, that depends on a token validation of the session identifier, allows an unauthorized modified message to be executed in the server enabling an unauthorized actor to change an existing user password, and further gain authorized access into the system via login mechanism. This issue affects: Hitachi Energy TXpert Hub CoreTec 4 version 2.0.0 2.1.0; 2.1.0; 2.1.1; 2.1.2; 2.1.3; 2.2.0; 2.2.1.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Hitachienergy ≫ Txpert Hub Coretec 4 Firmware Version2.0.0
Hitachienergy ≫ Txpert Hub Coretec 4 Firmware Version2.0.1
Hitachienergy ≫ Txpert Hub Coretec 4 Firmware Version2.1.0
Hitachienergy ≫ Txpert Hub Coretec 4 Firmware Version2.1.1
Hitachienergy ≫ Txpert Hub Coretec 4 Firmware Version2.1.2
Hitachienergy ≫ Txpert Hub Coretec 4 Firmware Version2.1.3
Hitachienergy ≫ Txpert Hub Coretec 4 Firmware Version2.2.0
Hitachienergy ≫ Txpert Hub Coretec 4 Firmware Version2.2.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.11% | 0.292 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.7 | 0.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
cybersecurity@hitachienergy.com | 6 | 0.5 | 5.5 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.