CVE-2021-38469

Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 Patch Third Party Advisory US Government Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 Patch Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:auvesy:versiondog:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:17

Type Values Removed Values Added
References () https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 - Patch, Third Party Advisory, US Government Resource () https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 - Patch, Third Party Advisory, US Government Resource
CVSS v2 : 4.3
v3 : 7.1
v2 : 4.3
v3 : 9.1

Information

Published : 2021-10-22 12:15

Updated : 2024-11-21 06:17


NVD link : CVE-2021-38469

Mitre link : CVE-2021-38469

CVE.ORG link : CVE-2021-38469


JSON object : View

Products Affected

auvesy

  • versiondog
CWE
CWE-427

Uncontrolled Search Path Element