Lucene search

K
cveCERTVDECVE-2021-34591
HistoryApr 27, 2022 - 4:15 p.m.

CVE-2021-34591

2022-04-2716:15:11
CWE-250
CERTVDE
web.nvd.nist.gov
53
2
bender
ebee
charge controllers
cve-2021-34591
local privilege escalation
nvd

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0

Percentile

5.1%

In Bender/ebee Charge Controllers in multiple versions are prone to Local privilege Escalation. An authenticated attacker could get root access via the suid applications socat, ip udhcpc and ifplugd.

Affected configurations

Nvd
Node
bendercc612_firmwareRange5.11.05.11.2
OR
bendercc612_firmwareRange5.12.05.12.5
OR
bendercc612_firmwareRange5.13.05.13.2
OR
bendercc612_firmwareRange5.20.05.20.2
AND
bendercc612Match-
Node
bendercc613Match-
AND
bendericc15xx_firmwareRange5.11.05.11.2
OR
bendericc15xx_firmwareRange5.12.05.12.5
OR
bendericc15xx_firmwareRange5.13.05.13.2
OR
bendericc15xx_firmwareRange5.20.05.20.2
Node
bendercc613Match-
AND
bendericc15xx_firmwareRange5.11.05.11.2
OR
bendericc15xx_firmwareRange5.12.05.12.5
OR
bendericc15xx_firmwareRange5.13.05.13.2
OR
bendericc15xx_firmwareRange5.20.05.20.2
Node
bendercc613Match-
AND
bendericc15xx_firmwareRange5.11.05.11.2
OR
bendericc15xx_firmwareRange5.12.05.12.5
OR
bendericc15xx_firmwareRange5.13.05.13.2
OR
bendericc15xx_firmwareRange5.20.05.20.2
VendorProductVersionCPE
bendercc612_firmware*cpe:2.3:o:bender:cc612_firmware:*:*:*:*:*:*:*:*
bendercc612-cpe:2.3:h:bender:cc612:-:*:*:*:*:*:*:*
bendercc613-cpe:2.3:h:bender:cc613:-:*:*:*:*:*:*:*
bendericc15xx_firmware*cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "CC612",
    "vendor": "Bender / ebee",
    "versions": [
      {
        "lessThan": "5.11.2",
        "status": "affected",
        "version": "5.11.x",
        "versionType": "custom"
      },
      {
        "lessThan": "5.12.5",
        "status": "affected",
        "version": "5.12.x",
        "versionType": "custom"
      },
      {
        "lessThan": "5.13.2",
        "status": "affected",
        "version": "5.13.x",
        "versionType": "custom"
      },
      {
        "lessThan": "5.20.2",
        "status": "affected",
        "version": "5.20.x",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "CC613",
    "vendor": "Bender / ebee",
    "versions": [
      {
        "lessThan": "5.11.2",
        "status": "affected",
        "version": "5.11.x",
        "versionType": "custom"
      },
      {
        "lessThan": "5.12.5",
        "status": "affected",
        "version": "5.12.x",
        "versionType": "custom"
      },
      {
        "lessThan": "5.13.2",
        "status": "affected",
        "version": "5.13.x",
        "versionType": "custom"
      },
      {
        "lessThan": "5.20.2",
        "status": "affected",
        "version": "5.20.x",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "ICC15xx",
    "vendor": "Bender / ebee",
    "versions": [
      {
        "lessThan": "5.11.2",
        "status": "affected",
        "version": "5.11.x",
        "versionType": "custom"
      },
      {
        "lessThan": "5.12.5",
        "status": "affected",
        "version": "5.12.x",
        "versionType": "custom"
      },
      {
        "lessThan": "5.13.2",
        "status": "affected",
        "version": "5.13.x",
        "versionType": "custom"
      },
      {
        "lessThan": "5.20.2",
        "status": "affected",
        "version": "5.20.x",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "ICC16xx",
    "vendor": "Bender / ebee",
    "versions": [
      {
        "lessThan": "5.11.2",
        "status": "affected",
        "version": "5.11.x",
        "versionType": "custom"
      },
      {
        "lessThan": "5.12.5",
        "status": "affected",
        "version": "5.12.x",
        "versionType": "custom"
      },
      {
        "lessThan": "5.13.2",
        "status": "affected",
        "version": "5.13.x",
        "versionType": "custom"
      },
      {
        "lessThan": "5.20.2",
        "status": "affected",
        "version": "5.20.x",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0

Percentile

5.1%

Related for CVE-2021-34591