CVE-2021-43986

The setup program for the affected product configures its files and folders with full access, which may allow unauthorized users permission to replace original binaries and achieve privilege escalation.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-03 Patch Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:fanuc:roboguide:*:*:*:*:*:*:*:*

History

17 Oct 2022, 18:12

Type Values Removed Values Added
CVSS v2 : 4.6
v3 : 7.8
v2 : 4.4
v3 : 7.0

29 Apr 2022, 15:00

Type Values Removed Values Added
CPE cpe:2.3:a:fanuc:roboguide:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 4.6
v3 : 7.8
CWE CWE-284 CWE-276
References (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-03 - (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-03 - Patch, Third Party Advisory, US Government Resource

20 Apr 2022, 16:45

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-20 16:15

Updated : 2024-02-04 22:29


NVD link : CVE-2021-43986

Mitre link : CVE-2021-43986

CVE.ORG link : CVE-2021-43986


JSON object : View

Products Affected

fanuc

  • roboguide
CWE
CWE-276

Incorrect Default Permissions

CWE-284

Improper Access Control