CVE-2021-41301

ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request. This will enable the unauthenticated attacker to remotely disclose sensitive information and help her in authentication bypass, privilege escalation and full system access.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ecoa:ecs_router_controller-ecs:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:ecoa:riskbuster_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ecoa:riskbuster:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:ecoa:riskterminator:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:25

Type Values Removed Values Added
References () https://www.twcert.org.tw/tw/cp-132-5137-730a6-1.html - Third Party Advisory () https://www.twcert.org.tw/tw/cp-132-5137-730a6-1.html - Third Party Advisory

07 Oct 2021, 14:19

Type Values Removed Values Added
CPE cpe:2.3:h:ecoa:ecs_router_controller-ecs:*:*:*:*:*:*:*:*
cpe:2.3:a:ecoa:riskterminator:-:*:*:*:*:*:*:*
cpe:2.3:o:ecoa:riskbuster_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ecoa:riskbuster:*:*:*:*:*:*:*:*
CWE CWE-639
References (MISC) https://www.twcert.org.tw/tw/cp-132-5137-730a6-1.html - (MISC) https://www.twcert.org.tw/tw/cp-132-5137-730a6-1.html - Third Party Advisory
CVSS v2 : unknown
v3 : 9.8
v2 : 10.0
v3 : 9.8

30 Sep 2021, 11:39

Type Values Removed Values Added
New CVE

Information

Published : 2021-09-30 11:15

Updated : 2024-11-21 06:25


NVD link : CVE-2021-41301

Mitre link : CVE-2021-41301

CVE.ORG link : CVE-2021-41301


JSON object : View

Products Affected

ecoa

  • riskterminator
  • ecs_router_controller-ecs_firmware
  • riskbuster
  • riskbuster_firmware
  • ecs_router_controller-ecs
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-639

Authorization Bypass Through User-Controlled Key