Vulnerabilites related to axis - device_manager
CVE-2021-31989 (GCVE-0-2021-31989)
Vulnerability from cvelistv5
Published
2021-08-25 18:29
Modified
2024-11-08 08:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-316 - Cleartext Storage of Sensitive Information in Memory
Summary
A user with permission to log on to the machine hosting the AXIS Device Manager client could under certain conditions extract a memory dump from the built-in Windows Task Manager application. The memory dump may potentially contain credentials of connected Axis devices.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Axis Communications AB | AXIS Device Manager |
Version: From Axis Device Manager 5.00.010 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:10:31.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.axis.com/files/tech_notes/CVE-2021-31989.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "AXIS Device Manager", "vendor": "Axis Communications AB", "versions": [ { "status": "affected", "version": "From Axis Device Manager 5.00.010" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA user with permission to log on to the machine hosting the AXIS Device Manager client could under certain conditions extract a memory dump from the built-in Windows Task Manager application. The memory dump may potentially contain credentials of connected Axis devices.\u003c/p\u003e" } ], "value": "A user with permission to log on to the machine hosting the AXIS Device Manager client could under certain conditions extract a memory dump from the built-in Windows Task Manager application. The memory dump may potentially contain credentials of connected Axis devices." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-316", "description": "CWE-316: Cleartext Storage of Sensitive Information in Memory", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-08T08:21:08.424Z", "orgId": "f2daf9a0-02c2-4b83-a01d-63b3b304b807", "shortName": "Axis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.axis.com/files/tech_notes/CVE-2021-31989.pdf" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@axis.com", "ID": "CVE-2021-31989", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Axis Device Manager", "version": { "version_data": [ { "version_value": "From Axis Device Manager 5.00.010" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A user with permission to log on to the machine hosting the AXIS Device Manager client could under certain conditions extract a memory dump from the built-in Windows Task Manager application. The memory dump may potentially contain credentials of connected Axis devices." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Plaintext storage of credentials in RAM memory" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.axis.com/files/tech_notes/CVE-2021-31989.pdf", "refsource": "MISC", "url": "https://www.axis.com/files/tech_notes/CVE-2021-31989.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "f2daf9a0-02c2-4b83-a01d-63b3b304b807", "assignerShortName": "Axis", "cveId": "CVE-2021-31989", "datePublished": "2021-08-25T18:29:41", "dateReserved": "2021-04-30T00:00:00", "dateUpdated": "2024-11-08T08:21:08.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-08-25 19:15
Modified
2024-11-21 06:06
Severity ?
Summary
A user with permission to log on to the machine hosting the AXIS Device Manager client could under certain conditions extract a memory dump from the built-in Windows Task Manager application. The memory dump may potentially contain credentials of connected Axis devices.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
axis | device_manager | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axis:device_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E80CCEB-0BDB-4ABB-B6EA-A45D86299E02", "versionEndIncluding": "5.16.063", "versionStartIncluding": "5.00.010", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A user with permission to log on to the machine hosting the AXIS Device Manager client could under certain conditions extract a memory dump from the built-in Windows Task Manager application. The memory dump may potentially contain credentials of connected Axis devices." }, { "lang": "es", "value": "Un usuario con permiso para iniciar sesi\u00f3n en la m\u00e1quina que aloja el cliente AXIS Device Manager podr\u00eda en determinadas condiciones, extraer un volcado de memoria de la aplicaci\u00f3n integrada Windows Task Manager. El volcado de memoria puede contener potencialmente unas credenciales de los dispositivos Axis conectados." } ], "id": "CVE-2021-31989", "lastModified": "2024-11-21T06:06:40.567", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-25T19:15:11.940", "references": [ { "source": "product-security@axis.com", "tags": [ "Vendor Advisory" ], "url": "https://www.axis.com/files/tech_notes/CVE-2021-31989.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.axis.com/files/tech_notes/CVE-2021-31989.pdf" } ], "sourceIdentifier": "product-security@axis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-316" } ], "source": "product-security@axis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }