Search criteria

3 vulnerabilities found for Siveillance Video DLNA Server by Siemens

VAR-202111-0749

Vulnerability from variot - Updated: 2024-11-23 19:57

A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application’s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks. Siveillance Video DLNA Server Exists in a past traversal vulnerability.Information may be obtained

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0749",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "siveillance video management software 2019 r2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "*"
      },
      {
        "model": "siveillance video management software 2019 r3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "*"
      },
      {
        "model": "siveillance video management software 2020 r2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "siveillance video management software 2019 r1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "*"
      },
      {
        "model": "siveillance video management software 2020 r1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "siveillance vms",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": null
      },
      {
        "model": "siveillance vms",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": "2020 r2"
      },
      {
        "model": "siveillance vms",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": "2019 r3"
      },
      {
        "model": "siveillance vms",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": "2019 r2"
      },
      {
        "model": "siveillance vms",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": null
      },
      {
        "model": "siveillance vms",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": "2019 r1"
      },
      {
        "model": "siveillance vms",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": "2020 r1"
      },
      {
        "model": "siveillance video dlna server",
        "scope": null,
        "trust": 0.6,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "siveillance video dlna server r1",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "2019"
      },
      {
        "model": "siveillance video dlna server r2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "2019"
      },
      {
        "model": "siveillance video dlna server r3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "2019"
      },
      {
        "model": "siveillance video dlna server r1",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "2020"
      },
      {
        "model": "siveillance video dlna server r2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "2020"
      },
      {
        "model": "siveillance video dlna server r3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "2020"
      },
      {
        "model": "siveillance video dlna server r1",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "2021"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-89432"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-014957"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-42021"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Milestone PSIRT reported this vulnerability to Siemens.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-866"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2021-42021",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2021-42021",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2021-89432",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-42021",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2021-42021",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-42021",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-42021",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2021-89432",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202111-866",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-89432"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-014957"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-866"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-42021"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application\u2019s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks. Siveillance Video DLNA Server Exists in a past traversal vulnerability.Information may be obtained",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-42021"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-014957"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-89432"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-42021",
        "trust": 3.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-755517",
        "trust": 2.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-21-315-13",
        "trust": 1.4
      },
      {
        "db": "JVN",
        "id": "JVNVU95671889",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-014957",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-89432",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021111619",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-866",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-89432"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-014957"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-866"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-42021"
      }
    ]
  },
  "id": "VAR-202111-0749",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-89432"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-89432"
      }
    ]
  },
  "last_update_date": "2024-11-23T19:57:35.037000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SSA-755517",
        "trust": 0.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf"
      },
      {
        "title": "Patch for Siemens Siveillance Video DLNA Server path traversal vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/300046"
      },
      {
        "title": "Siveillance Video DLNA Server Repair measures for path traversal vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=169669"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-89432"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-014957"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-866"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-26",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-22",
        "trust": 1.0
      },
      {
        "problemtype": "Path traversal (CWE-22) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-014957"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-42021"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-42021"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95671889/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-13"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021111619"
      },
      {
        "trust": 0.6,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-315-13"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-89432"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-014957"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-866"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-42021"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-89432"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-014957"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-866"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-42021"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-11-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-89432"
      },
      {
        "date": "2022-11-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-014957"
      },
      {
        "date": "2021-11-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202111-866"
      },
      {
        "date": "2021-11-09T12:15:10.523000",
        "db": "NVD",
        "id": "CVE-2021-42021"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-11-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-89432"
      },
      {
        "date": "2022-11-02T07:35:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-014957"
      },
      {
        "date": "2022-07-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202111-866"
      },
      {
        "date": "2024-11-21T06:27:05.887000",
        "db": "NVD",
        "id": "CVE-2021-42021"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-866"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Siveillance\u00a0Video\u00a0DLNA\u00a0Server\u00a0 Past traversal vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-014957"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "path traversal",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202111-866"
      }
    ],
    "trust": 0.6
  }
}

CVE-2021-42021 (GCVE-0-2021-42021)

Vulnerability from nvd – Published: 2021-11-09 11:32 – Updated: 2024-08-04 03:22
VLAI?
Summary
A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application’s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks.
Severity ?
No CVSS data available.
CWE
  • CWE-26 - Path Traversal: '/dir/../filename'
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T03:22:25.972Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Siveillance Video DLNA Server",
          "vendor": "Siemens",
          "versions": [
            {
              "status": "affected",
              "version": "2019 R1"
            }
          ]
        },
        {
          "product": "Siveillance Video DLNA Server",
          "vendor": "Siemens",
          "versions": [
            {
              "status": "affected",
              "version": "2019 R2"
            }
          ]
        },
        {
          "product": "Siveillance Video DLNA Server",
          "vendor": "Siemens",
          "versions": [
            {
              "status": "affected",
              "version": "2019 R3"
            }
          ]
        },
        {
          "product": "Siveillance Video DLNA Server",
          "vendor": "Siemens",
          "versions": [
            {
              "status": "affected",
              "version": "2020 R1"
            }
          ]
        },
        {
          "product": "Siveillance Video DLNA Server",
          "vendor": "Siemens",
          "versions": [
            {
              "status": "affected",
              "version": "2020 R2"
            }
          ]
        },
        {
          "product": "Siveillance Video DLNA Server",
          "vendor": "Siemens",
          "versions": [
            {
              "status": "affected",
              "version": "2020 R3"
            }
          ]
        },
        {
          "product": "Siveillance Video DLNA Server",
          "vendor": "Siemens",
          "versions": [
            {
              "status": "affected",
              "version": "2021 R1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application\u2019s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-26",
              "description": "CWE-26: Path Traversal: \u0027/dir/../filename\u0027",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-09T11:32:15",
        "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
        "shortName": "siemens"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "productcert@siemens.com",
          "ID": "CVE-2021-42021",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Siveillance Video DLNA Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2019 R1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Siveillance Video DLNA Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2019 R2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Siveillance Video DLNA Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2019 R3"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Siveillance Video DLNA Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2020 R1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Siveillance Video DLNA Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2020 R2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Siveillance Video DLNA Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2020 R3"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Siveillance Video DLNA Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2021 R1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Siemens"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application\u2019s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-26: Path Traversal: \u0027/dir/../filename\u0027"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf",
              "refsource": "MISC",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
    "assignerShortName": "siemens",
    "cveId": "CVE-2021-42021",
    "datePublished": "2021-11-09T11:32:15",
    "dateReserved": "2021-10-06T00:00:00",
    "dateUpdated": "2024-08-04T03:22:25.972Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-42021 (GCVE-0-2021-42021)

Vulnerability from cvelistv5 – Published: 2021-11-09 11:32 – Updated: 2024-08-04 03:22
VLAI?
Summary
A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application’s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks.
Severity ?
No CVSS data available.
CWE
  • CWE-26 - Path Traversal: '/dir/../filename'
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T03:22:25.972Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Siveillance Video DLNA Server",
          "vendor": "Siemens",
          "versions": [
            {
              "status": "affected",
              "version": "2019 R1"
            }
          ]
        },
        {
          "product": "Siveillance Video DLNA Server",
          "vendor": "Siemens",
          "versions": [
            {
              "status": "affected",
              "version": "2019 R2"
            }
          ]
        },
        {
          "product": "Siveillance Video DLNA Server",
          "vendor": "Siemens",
          "versions": [
            {
              "status": "affected",
              "version": "2019 R3"
            }
          ]
        },
        {
          "product": "Siveillance Video DLNA Server",
          "vendor": "Siemens",
          "versions": [
            {
              "status": "affected",
              "version": "2020 R1"
            }
          ]
        },
        {
          "product": "Siveillance Video DLNA Server",
          "vendor": "Siemens",
          "versions": [
            {
              "status": "affected",
              "version": "2020 R2"
            }
          ]
        },
        {
          "product": "Siveillance Video DLNA Server",
          "vendor": "Siemens",
          "versions": [
            {
              "status": "affected",
              "version": "2020 R3"
            }
          ]
        },
        {
          "product": "Siveillance Video DLNA Server",
          "vendor": "Siemens",
          "versions": [
            {
              "status": "affected",
              "version": "2021 R1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application\u2019s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-26",
              "description": "CWE-26: Path Traversal: \u0027/dir/../filename\u0027",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-09T11:32:15",
        "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
        "shortName": "siemens"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "productcert@siemens.com",
          "ID": "CVE-2021-42021",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Siveillance Video DLNA Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2019 R1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Siveillance Video DLNA Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2019 R2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Siveillance Video DLNA Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2019 R3"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Siveillance Video DLNA Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2020 R1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Siveillance Video DLNA Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2020 R2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Siveillance Video DLNA Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2020 R3"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Siveillance Video DLNA Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2021 R1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Siemens"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application\u2019s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-26: Path Traversal: \u0027/dir/../filename\u0027"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf",
              "refsource": "MISC",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
    "assignerShortName": "siemens",
    "cveId": "CVE-2021-42021",
    "datePublished": "2021-11-09T11:32:15",
    "dateReserved": "2021-10-06T00:00:00",
    "dateUpdated": "2024-08-04T03:22:25.972Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}