← Volver a CVEs
CVE-2021-28196
MEDIUM4.9
Descripcion
The specific function in ASUS BMC’s firmware Web management page (Generate SSL certificate function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
Detalles CVE
Puntuacion CVSS v3.14.9
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosHIGH
Interaccion usuarioNONE
Publicado4/6/2021
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
asus:asmb9-ikvmasus:asmb9-ikvm_firmwareasus:e700_g4asus:e700_g4_firmwareasus:esc4000_dhd_g4asus:esc4000_dhd_g4_firmwareasus:esc4000_g4asus:esc4000_g4_firmwareasus:esc4000_g4xasus:esc4000_g4x_firmwareasus:esc8000_g4asus:esc8000_g4\/10gasus:esc8000_g4\/10g_firmwareasus:esc8000_g4_firmwareasus:knpa-u16asus:knpa-u16_firmwareasus:pro_e800_g4asus:pro_e800_g4_firmwareasus:rs100-e10-pi2asus:rs100-e10-pi2_firmwareasus:rs300-e10-ps4asus:rs300-e10-ps4_firmwareasus:rs300-e10-rs4asus:rs300-e10-rs4_firmwareasus:rs500-e9-ps4asus:rs500-e9-ps4_firmwareasus:rs500-e9-rs4asus:rs500-e9-rs4-uasus:rs500-e9-rs4-u_firmwareasus:rs500-e9-rs4_firmwareasus:rs500a-e10-ps4asus:rs500a-e10-ps4_firmwareasus:rs500a-e10-rs4asus:rs500a-e10-rs4_firmwareasus:rs500a-e9-ps4asus:rs500a-e9-ps4_firmwareasus:rs500a-e9-rs4asus:rs500a-e9-rs4_firmwareasus:rs500a-e9_rs4_uasus:rs500a-e9_rs4_u_firmwareasus:rs520-e9-rs12-easus:rs520-e9-rs12-e_firmwareasus:rs520-e9-rs8asus:rs520-e9-rs8_firmwareasus:rs700-e9-rs12asus:rs700-e9-rs12_firmwareasus:rs700-e9-rs4asus:rs700-e9-rs4_firmwareasus:rs700a-e9-rs12v2asus:rs700a-e9-rs12v2_firmwareasus:rs700a-e9-rs4asus:rs700a-e9-rs4_firmwareasus:rs700a-e9-rs4v2asus:rs700a-e9-rs4v2_firmwareasus:rs720-e9-rs12-easus:rs720-e9-rs12-e_firmwareasus:rs720-e9-rs24-uasus:rs720-e9-rs24-u_firmwareasus:rs720-e9-rs8-gasus:rs720-e9-rs8-g_firmwareasus:rs720a-e9-rs12v2asus:rs720a-e9-rs12v2_firmwareasus:rs720a-e9-rs24-easus:rs720a-e9-rs24-e_firmwareasus:rs720a-e9-rs24v2asus:rs720a-e9-rs24v2_firmwareasus:rs720q-e9-rs24-sasus:rs720q-e9-rs24-s_firmwareasus:rs720q-e9-rs8asus:rs720q-e9-rs8-sasus:rs720q-e9-rs8-s_firmwareasus:rs720q-e9-rs8_firmwareasus:ws_c422_pro\/seasus:ws_c422_pro\/se_firmwareasus:ws_c621e_sageasus:ws_c621e_sage_firmwareasus:ws_x299_pro\/seasus:ws_x299_pro\/se_firmwareasus:z11pa-d8asus:z11pa-d8_firmwareasus:z11pa-d8casus:z11pa-d8c_firmwareasus:z11pa-u12asus:z11pa-u12\/10g-2sasus:z11pa-u12\/10g-2s_firmwareasus:z11pa-u12_firmwareasus:z11pr-d16asus:z11pr-d16_firmware
Debilidades (CWE)
CWE-120CWE-120
Referencias
https://www.asus.com/content/ASUS-Product-Security-Advisory/(twcert@cert.org.tw)
https://www.asus.com/tw/support/callus/(twcert@cert.org.tw)
https://www.twcert.org.tw/tw/cp-132-4566-9154b-1.html(twcert@cert.org.tw)
https://www.asus.com/content/ASUS-Product-Security-Advisory/(af854a3a-2127-422b-91ae-364da2661108)
https://www.asus.com/tw/support/callus/(af854a3a-2127-422b-91ae-364da2661108)
https://www.twcert.org.tw/tw/cp-132-4566-9154b-1.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.