CVE-2021-26724 Vulnerability Details

  /     /     /  

CVE-2021-26724 Metadata Quick Info

CVE Published: 22/02/2021 | CVE Updated: 17/09/2024 | CVE Year: 2021
Source: Nozomi | Vendor: Nozomi Networks | Product: Guardian
Status : PUBLISHED

CVE-2021-26724 Description

OS Command Injection vulnerability when changing date settings or hostname using web GUI of Nozomi Networks Guardian and CMC allows authenticated administrators to perform remote code execution. This issue affects: Nozomi Networks Guardian 20.0.7.3 version 20.0.7.3 and prior versions. Nozomi Networks CMC 20.0.7.3 version 20.0.7.3 and prior versions.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-78
CWE Name: CWE-78 Improper Neutralization of Special Elements used in an OS Command ( OS Command Injection )
Source: Nozomi Networks

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-88
CAPEC Description: CAPEC-88 OS Command Injection


Source: NVD (National Vulnerability Database).