Show plain JSON{"id": "CVE-2021-29255", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.9, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 5.5, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.6}]}, "published": "2021-03-26T18:15:12.453", "references": [{"url": "https://blog.microseven.com", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://cybergladius.com/cve-2021-29255-vulnerability-disclosure/", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://blog.microseven.com", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://cybergladius.com/cve-2021-29255-vulnerability-disclosure/", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-522"}]}], "descriptions": [{"lang": "en", "value": "MicroSeven MYM71080i-B 2.0.5 through 2.0.20 devices send admin credentials in cleartext to pnp.microseven.com TCP port 7007. An attacker on the same network as the device can capture these credentials."}, {"lang": "es", "value": "Los dispositivos MicroSeven MYM71080i-B versiones 2.0.5 hasta 2.0.20, env\u00edan credenciales de administrador en texto sin cifrar al puerto TCP 7007 de pnp.microseven.com. Un atacante en la misma red que el dispositivo puede capturar estas credenciales."}], "lastModified": "2024-11-21T06:00:53.663", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:microseven:mym71080i-b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBA08ED4-6ED2-4AD6-AB5B-F7991E28969A", "versionEndIncluding": "2.0.20", "versionStartIncluding": "2.0.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:microseven:mym71080i-b:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "76D5283C-9C5A-4921-B27B-491470406C21"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}