CVE-2021-44793

Single Connect does not perform an authorization check when using the sc-reports-ui" module. A remote attacker could exploit this vulnerability to access the device configuration page and export the data to an external file. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information including the database credentials. Since the database runs with high privileges it is possible to execute commands with the attained credentials.
References
Link Resource
https://www.usom.gov.tr/bildirim/tr-22-0093 Third Party Advisory
https://www.usom.gov.tr/bildirim/tr-22-0093 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:krontech:single_connect:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:31

Type Values Removed Values Added
References () https://www.usom.gov.tr/bildirim/tr-22-0093 - Third Party Advisory () https://www.usom.gov.tr/bildirim/tr-22-0093 - Third Party Advisory

17 Sep 2024, 04:16

Type Values Removed Values Added
Summary (en) Single Connect does not perform an authorization check when using the sc-reports-ui" module. A remote attacker could exploit this vulnerability to access the device configuration page and export the data to an external file. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information including the database credentials. Since the database runs with high privileges it is possible to execute commands with the attained credentials. (en) Single Connect does not perform an authorization check when using the sc-reports-ui" module. A remote attacker could exploit this vulnerability to access the device configuration page and export the data to an external file. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information including the database credentials. Since the database runs with high privileges it is possible to execute commands with the attained credentials.

03 Sep 2023, 16:15

Type Values Removed Values Added
Summary Single Connect does not perform an authorization check when using the sc-reports-ui" module. A remote attacker could exploit this vulnerability to access the device configuration page and export the data to an external file. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information including the database credentials. Since the database runs with high privileges it is possible to execute commands with the attained credentials. Single Connect does not perform an authorization check when using the sc-reports-ui" module. A remote attacker could exploit this vulnerability to access the device configuration page and export the data to an external file. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information including the database credentials. Since the database runs with high privileges it is possible to execute commands with the attained credentials.
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 8.6

Information

Published : 2022-01-27 13:15

Updated : 2024-11-21 06:31


NVD link : CVE-2021-44793

Mitre link : CVE-2021-44793

CVE.ORG link : CVE-2021-44793


JSON object : View

Products Affected

krontech

  • single_connect
CWE
CWE-862

Missing Authorization