Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.YEALINK_DEVICE_MANAGEMENT_PLATFORM_CVE-2021-27561.NBIN
HistoryMay 15, 2024 - 12:00 a.m.

Yealink Device Management Platform Pre-authentication Remote Command Injection (CVE-2021-27561)

2024-05-1500:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
9
yealink
device management
remote command injection
cve-2021-27561
scanner
binary data

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

Low

0.974 High

EPSS

Percentile

100.0%

The remote host is affected by a pre-authentication remote command injection vulnerability. A remote, unauthenticated attacker can leverage this to run arbitrary commands as root on the remote host.

Binary data yealink_device_management_platform_CVE-2021-27561.nbin
VendorProductVersionCPE
yealinkdevice_managementcpe:/a:yealink:device_management

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

Low

0.974 High

EPSS

Percentile

100.0%

Related for YEALINK_DEVICE_MANAGEMENT_PLATFORM_CVE-2021-27561.NBIN