CVE-2021-32957

A function in MDT AutoSave versions prior to v6.02.06 is used to retrieve system information for a specific process, and this information collection executes multiple commands and summarizes the information into an XML. This function and subsequent process gives full path to the executable and is therefore vulnerable to binary hijacking.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-21-189-02 Mitigation Third Party Advisory US Government Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-21-189-02 Mitigation Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:auvesy-mdt:autosave:*:*:*:*:*:*:*:*
cpe:2.3:a:auvesy-mdt:autosave:*:*:*:*:*:*:*:*
cpe:2.3:a:auvesy-mdt:autosave_for_system_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:auvesy-mdt:autosave_for_system_platform:5.00:*:*:*:*:*:*:*

History

21 Nov 2024, 06:08

Type Values Removed Values Added
References () https://www.cisa.gov/uscert/ics/advisories/icsa-21-189-02 - Mitigation, Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsa-21-189-02 - Mitigation, Third Party Advisory, US Government Resource

Information

Published : 2022-04-01 23:15

Updated : 2024-11-21 06:08


NVD link : CVE-2021-32957

Mitre link : CVE-2021-32957

CVE.ORG link : CVE-2021-32957


JSON object : View

Products Affected

auvesy-mdt

  • autosave
  • autosave_for_system_platform
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')