CVE-2021-25695 (GCVE-0-2021-25695)
Vulnerability from cvelistv5
Published
2021-07-21 12:33
Modified
2024-08-03 20:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-782 - Exposed IOCTL with Insufficient Access Control ()
Summary
The USB vHub in the Teradici PCOIP Software Agent prior to version 21.07.0 would accept commands from any program, which may allow an attacker to elevate privileges by changing the flow of program execution within the vHub driver.
References
► | URL | Tags | |
---|---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | - PCoIP Agent for Windows |
Version: 21.07.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:11:27.911Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisory.teradici.com/security-advisories/100/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "- PCoIP Agent for Windows", "vendor": "n/a", "versions": [ { "status": "affected", "version": "21.07.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The USB vHub in the Teradici PCOIP Software Agent prior to version 21.07.0 would accept commands from any program, which may allow an attacker to elevate privileges by changing the flow of program execution within the vHub driver." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-782", "description": "Exposed IOCTL with Insufficient Access Control (CWE-782)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-21T12:33:10", "orgId": "ba3c294d-a544-4fff-ad44-2de7c7bbb6be", "shortName": "Teradici" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisory.teradici.com/security-advisories/100/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@teradici.com", "ID": "CVE-2021-25695", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "- PCoIP Agent for Windows", "version": { "version_data": [ { "version_value": "21.07.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The USB vHub in the Teradici PCOIP Software Agent prior to version 21.07.0 would accept commands from any program, which may allow an attacker to elevate privileges by changing the flow of program execution within the vHub driver." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposed IOCTL with Insufficient Access Control (CWE-782)" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisory.teradici.com/security-advisories/100/", "refsource": "MISC", "url": "https://advisory.teradici.com/security-advisories/100/" } ] } } } }, "cveMetadata": { "assignerOrgId": "ba3c294d-a544-4fff-ad44-2de7c7bbb6be", "assignerShortName": "Teradici", "cveId": "CVE-2021-25695", "datePublished": "2021-07-21T12:33:10", "dateReserved": "2021-01-21T00:00:00", "dateUpdated": "2024-08-03T20:11:27.911Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-25695\",\"sourceIdentifier\":\"security@teradici.com\",\"published\":\"2021-07-21T15:15:15.827\",\"lastModified\":\"2024-11-21T05:55:18.593\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The USB vHub in the Teradici PCOIP Software Agent prior to version 21.07.0 would accept commands from any program, which may allow an attacker to elevate privileges by changing the flow of program execution within the vHub driver.\"},{\"lang\":\"es\",\"value\":\"El USB vHub en el Agente de Software Teradici PCOIP versiones anteriores a 21.07.0, aceptar\u00eda los comandos de cualquier programa, lo que puede permitir a un atacante elevar privilegios cambiando el flujo de ejecuci\u00f3n del programa dentro del controlador vHub\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@teradici.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-782\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:teradici:pcoip:*:*:*:*:*:windows:*:*\",\"versionEndExcluding\":\"21.07.0\",\"matchCriteriaId\":\"2D0EE32A-1702-4EF7-A514-913A582410D4\"}]}]}],\"references\":[{\"url\":\"https://advisory.teradici.com/security-advisories/100/\",\"source\":\"security@teradici.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://advisory.teradici.com/security-advisories/100/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…