CVE-2021-20675
Published Mar 18, 2021
Last updated 4 years ago
Overview
- Description
- M-System DL8 series (type A (DL8-A) versions prior to Ver3.0, type B (DL8-B) versions prior to Ver3.0, type C (DL8-C) versions prior to Ver3.0, type D (DL8-D) versions prior to Ver3.0, and type E (DL8-E) versions prior to Ver3.0) allows remote authenticated attackers to cause a denial of service (DoS) condition via unspecified vectors.
- Source
- vultures@jpcert.or.jp
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:m-system:dl8-a_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B7786F5-7A3C-4EF2-A0D3-562B96102AF8", "versionEndExcluding": "3.0.81" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:m-system:dl8-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A81D7A6A-D046-45B5-BA43-43664E7EF971" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:m-system:dl8-b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9327B151-A2FA-488D-9A89-287FDBC59ACB", "versionEndExcluding": "3.0.77" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:m-system:dl8-b:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4064A9C3-0E52-4C5D-B977-8FB032DBAFD5" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:m-system:dl8-c_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "826A1FA4-1946-410F-B965-D2D4D7F48FD2", "versionEndExcluding": "3.0.99" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:m-system:dl8-c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E95112D2-2808-4E20-902A-C16A7E1F5A3F" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:m-system:dl8-d_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46361610-8BC5-424B-998D-E3B4B6D19F04", "versionEndExcluding": "3.0.91" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:m-system:dl8-d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A63B2CDA-4509-46C4-A6D5-0BB4589C8A88" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:m-system:dl8-e_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3E11E93-18EC-40A8-A466-33910BD66A87", "versionEndExcluding": "3.0.12" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:m-system:dl8-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ACE11AD2-D6EB-47F4-AF8A-EE89FF1F9507" } ], "operator": "OR" } ], "operator": "AND" } ]