8.8
CVE-2021-41298
- EPSS 0.23%
- Veröffentlicht 30.09.2021 11:15:07
- Zuletzt bearbeitet 21.11.2024 06:25:59
- Quelle twcert@cert.org.tw
- CVE-Watchlists
- Unerledigt
ECOA BAS controller is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers with general user's privilege can remotely bypass authorization and access the hidden resources in the system and execute privileged functionalities.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ecoa ≫ Ecs Router Controller-ecs Firmware Version-
Ecoa ≫ Riskbuster Firmware Version-
Ecoa ≫ Riskterminator Version-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.23% | 0.432 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
| twcert@cert.org.tw | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-284 Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.