← Volver a CVEs
CVE-2021-28206
MEDIUM4.9
Descripcion
The specific function in ASUS BMC’s firmware Web management page (Record video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files.
Detalles CVE
Puntuacion CVSS v3.14.9
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosHIGH
Interaccion usuarioNONE
Publicado4/6/2021
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
asus:asmb9-ikvmasus:asmb9-ikvm_firmwareasus:e700_g4asus:e700_g4_firmwareasus:esc4000_dhd_g4asus:esc4000_dhd_g4_firmwareasus:esc4000_g4asus:esc4000_g4_firmwareasus:esc4000_g4xasus:esc4000_g4x_firmwareasus:esc8000_g4asus:esc8000_g4\/10gasus:esc8000_g4\/10g_firmwareasus:esc8000_g4_firmwareasus:knpa-u16asus:knpa-u16_firmwareasus:pro_e800_g4asus:pro_e800_g4_firmwareasus:rs100-e10-pi2asus:rs100-e10-pi2_firmwareasus:rs300-e10-ps4asus:rs300-e10-ps4_firmwareasus:rs300-e10-rs4asus:rs300-e10-rs4_firmwareasus:rs500-e9-ps4asus:rs500-e9-ps4_firmwareasus:rs500-e9-rs4asus:rs500-e9-rs4-uasus:rs500-e9-rs4-u_firmwareasus:rs500-e9-rs4_firmwareasus:rs500a-e10-ps4asus:rs500a-e10-ps4_firmwareasus:rs500a-e10-rs4asus:rs500a-e10-rs4_firmwareasus:rs500a-e9-ps4asus:rs500a-e9-ps4_firmwareasus:rs500a-e9-rs4asus:rs500a-e9-rs4_firmwareasus:rs500a-e9_rs4_uasus:rs500a-e9_rs4_u_firmwareasus:rs520-e9-rs12-easus:rs520-e9-rs12-e_firmwareasus:rs520-e9-rs8asus:rs520-e9-rs8_firmwareasus:rs700-e9-rs12asus:rs700-e9-rs12_firmwareasus:rs700-e9-rs4asus:rs700-e9-rs4_firmwareasus:rs700a-e9-rs12v2asus:rs700a-e9-rs12v2_firmwareasus:rs700a-e9-rs4asus:rs700a-e9-rs4_firmwareasus:rs700a-e9-rs4v2asus:rs700a-e9-rs4v2_firmwareasus:rs720-e9-rs12-easus:rs720-e9-rs12-e_firmwareasus:rs720-e9-rs24-uasus:rs720-e9-rs24-u_firmwareasus:rs720-e9-rs8-gasus:rs720-e9-rs8-g_firmwareasus:rs720a-e9-rs12v2asus:rs720a-e9-rs12v2_firmwareasus:rs720a-e9-rs24-easus:rs720a-e9-rs24-e_firmwareasus:rs720a-e9-rs24v2asus:rs720a-e9-rs24v2_firmwareasus:rs720q-e9-rs24-sasus:rs720q-e9-rs24-s_firmwareasus:rs720q-e9-rs8asus:rs720q-e9-rs8-sasus:rs720q-e9-rs8-s_firmwareasus:rs720q-e9-rs8_firmwareasus:ws_c422_pro\/seasus:ws_c422_pro\/se_firmwareasus:ws_c621e_sageasus:ws_c621e_sage_firmwareasus:ws_x299_pro\/seasus:ws_x299_pro\/se_firmwareasus:z11pa-d8asus:z11pa-d8_firmwareasus:z11pa-d8casus:z11pa-d8c_firmwareasus:z11pa-u12asus:z11pa-u12\/10g-2sasus:z11pa-u12\/10g-2s_firmwareasus:z11pa-u12_firmwareasus:z11pr-d16asus:z11pr-d16_firmware
Debilidades (CWE)
CWE-22CWE-22
Referencias
https://www.asus.com/content/ASUS-Product-Security-Advisory/(twcert@cert.org.tw)
https://www.asus.com/tw/support/callus/(twcert@cert.org.tw)
https://www.twcert.org.tw/tw/cp-132-4576-422ac-1.html(twcert@cert.org.tw)
https://www.asus.com/content/ASUS-Product-Security-Advisory/(af854a3a-2127-422b-91ae-364da2661108)
https://www.asus.com/tw/support/callus/(af854a3a-2127-422b-91ae-364da2661108)
https://www.twcert.org.tw/tw/cp-132-4576-422ac-1.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.