8.8
CVE-2021-36307
- EPSS 0.23%
- Published 20.11.2021 02:15:07
- Last modified 21.11.2024 06:13:27
- Source security_alert@emc.com
- Teams watchlist Login
- Open Login
Networking OS10, versions prior to October 2021 with RESTCONF API enabled, contains a privilege escalation vulnerability. A malicious low privileged user with specific access to the API could potentially exploit this vulnerability to gain admin privileges on the affected system.
Data is provided by the National Vulnerability Database (NVD)
Dell ≫ Networking Os10 Version < 10.4.3.8
Dell ≫ Networking Os10 Version >= 10.5.0.0 < 10.5.0.10
Dell ≫ Networking Os10 Version >= 10.5.1.0 < 10.5.1.10
Dell ≫ Networking Os10 Version >= 10.5.2.0 < 10.5.2.8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.23% | 0.43 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 8.5 | 6.8 | 10 |
AV:N/AC:M/Au:S/C:C/I:C/A:C
|
security_alert@emc.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-269 Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.