Lucene search

K
cveJciCVE-2021-36206
HistoryOct 28, 2022 - 2:15 a.m.

CVE-2021-36206

2022-10-2802:15:16
CWE-79
jci
web.nvd.nist.gov
35
3
cevas
cve-2021-36206
authentication bypass
sql injection

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

40.1%

All versions of CEVAS prior to 1.01.46 do not sufficiently validate user-controllable input and could allow a user to bypass authentication and retrieve data with specially crafted SQL queries.

Affected configurations

Nvd
Node
johnsoncontrolscevasRange<1.01.46
VendorProductVersionCPE
johnsoncontrolscevas*cpe:2.3:a:johnsoncontrols:cevas:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Johnson Controls",
    "product": "CEVAS",
    "versions": [
      {
        "version": "all versions prior to 1.01.46",
        "status": "affected",
        "lessThan": "1.01.46",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

40.1%

Related for CVE-2021-36206