Elcomplus SmartPTT is vulnerable as the backup and restore system does not adequately validate download requests, enabling malicious users to perform path traversal attacks and potentially download arbitrary files from the system.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-04 | Third Party Advisory US Government Resource | 
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-04 | Third Party Advisory US Government Resource | 
Configurations
                    History
                    21 Nov 2024, 06:30
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-04 - Third Party Advisory, US Government Resource | 
09 May 2022, 13:59
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (CONFIRM) https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-04 - Third Party Advisory, US Government Resource | |
| CPE | cpe:2.3:a:smartptt:smartptt_scada:1.1:*:*:*:*:*:*:* | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 4.0
         v3 : 4.9  | 
28 Apr 2022, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2022-04-28 15:15
Updated : 2024-11-21 06:30
NVD link : CVE-2021-43930
Mitre link : CVE-2021-43930
CVE.ORG link : CVE-2021-43930
JSON object : View
Products Affected
                smartptt
- smartptt_scada
 
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
