A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2). The affected application incorrectly neutralizes special elements when creating batch operations which could lead to command injection. An authenticated remote attacker with administrative privileges could exploit this vulnerability to execute arbitrary code on the system with system privileges.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-756744.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
17 Aug 2021, 21:05
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 7.2 |
References | (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-756744.pdf - Patch, Vendor Advisory | |
CWE | CWE-78 | |
CPE | cpe:2.3:a:siemens:sinec_network_management_system:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_network_management_system:1.0:sp1:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_network_management_system:1.0:-:*:*:*:*:*:* |
10 Aug 2021, 11:46
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-08-10 11:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-33721
Mitre link : CVE-2021-33721
CVE.ORG link : CVE-2021-33721
JSON object : View
Products Affected
siemens
- sinec_network_management_system
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')