Successful exploitation of this vulnerability on Claroty Secure Remote Access (SRA) Site versions 3.0 through 3.2 allows an attacker with local command line interface access to gain the secret key, subsequently allowing them to generate valid session tokens for the web user interface (UI). With access to the web UI an attacker can access assets managed by the SRA installation and could compromise the installation.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-06 | Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-06 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 06:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-06 - Third Party Advisory, US Government Resource |
07 Jun 2022, 02:49
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
CPE | cpe:2.3:a:claroty:secure_remote_access:*:*:*:*:*:*:*:* | |
References | (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-06 - Third Party Advisory, US Government Resource | |
CWE | NVD-CWE-noinfo |
23 May 2022, 20:53
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-05-23 20:16
Updated : 2024-11-21 06:08
NVD link : CVE-2021-32958
Mitre link : CVE-2021-32958
CVE.ORG link : CVE-2021-32958
JSON object : View
Products Affected
claroty
- secure_remote_access
CWE