ID

VAR-202101-1014


CVE

CVE-2021-1240


TITLE

Windows  for  Cisco Proximity Desktop  Vulnerability in Uncontrolled Search Path Elements

Trust: 0.8

sources: JVNDB: JVNDB-2021-002767

DESCRIPTION

A vulnerability in the loading process of specific DLLs in Cisco Proximity Desktop for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user’s account. Desk is a writing, blogging and note-taking app by an individual developer. Microsoft Windows is a desktop operating system of Microsoft Corporation in the United States

Trust: 1.8

sources: NVD: CVE-2021-1240 // JVNDB: JVNDB-2021-002767 // VULHUB: VHN-374294 // VULMON: CVE-2021-1240

AFFECTED PRODUCTS

vendor:ciscomodel:proximityscope:ltversion:3.1.0

Trust: 1.0

vendor:シスコシステムズmodel:cisco proximityscope:eqversion: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco proximityscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-002767 // NVD: CVE-2021-1240

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-1240
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2021-1240
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-1240
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202101-967
value: HIGH

Trust: 0.6

VULHUB: VHN-374294
value: HIGH

Trust: 0.1

VULMON: CVE-2021-1240
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-1240
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-374294
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-1240
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.3
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2021-1240
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 1.3
impactScore: 3.4
version: 3.1

Trust: 1.0

NVD: CVE-2021-1240
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-374294 // VULMON: CVE-2021-1240 // JVNDB: JVNDB-2021-002767 // CNNVD: CNNVD-202101-967 // NVD: CVE-2021-1240 // NVD: CVE-2021-1240

PROBLEMTYPE DATA

problemtype:CWE-427

Trust: 1.1

problemtype:Uncontrolled search path elements (CWE-427) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-374294 // JVNDB: JVNDB-2021-002767 // NVD: CVE-2021-1240

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202101-967

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202101-967

PATCH

title:cisco-sa-proximity-dll-UvW4VHPMurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-proximity-dll-UvW4VHPM

Trust: 0.8

title:Cisco Proximity Desktop for Windows Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139474

Trust: 0.6

title:Cisco: Cisco Proximity Desktop for Windows DLL Hijacking Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-proximity-dll-UvW4VHPM

Trust: 0.1

sources: VULMON: CVE-2021-1240 // JVNDB: JVNDB-2021-002767 // CNNVD: CNNVD-202101-967

EXTERNAL IDS

db:NVDid:CVE-2021-1240

Trust: 2.6

db:JVNDBid:JVNDB-2021-002767

Trust: 0.8

db:AUSCERTid:ESB-2021.0144

Trust: 0.6

db:CNNVDid:CNNVD-202101-967

Trust: 0.6

db:VULHUBid:VHN-374294

Trust: 0.1

db:VULMONid:CVE-2021-1240

Trust: 0.1

sources: VULHUB: VHN-374294 // VULMON: CVE-2021-1240 // JVNDB: JVNDB-2021-002767 // CNNVD: CNNVD-202101-967 // NVD: CVE-2021-1240

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-proximity-dll-uvw4vhpm

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-1240

Trust: 1.4

url:https://www.auscert.org.au/bulletins/esb-2021.0144/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/427.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-374294 // VULMON: CVE-2021-1240 // JVNDB: JVNDB-2021-002767 // CNNVD: CNNVD-202101-967 // NVD: CVE-2021-1240

SOURCES

db:VULHUBid:VHN-374294
db:VULMONid:CVE-2021-1240
db:JVNDBid:JVNDB-2021-002767
db:CNNVDid:CNNVD-202101-967
db:NVDid:CVE-2021-1240

LAST UPDATE DATE

2024-11-23T22:44:17.862000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-374294date:2021-01-20T00:00:00
db:VULMONid:CVE-2021-1240date:2021-01-20T00:00:00
db:JVNDBid:JVNDB-2021-002767date:2021-09-30T08:51:00
db:CNNVDid:CNNVD-202101-967date:2021-01-21T00:00:00
db:NVDid:CVE-2021-1240date:2024-11-21T05:43:54.273

SOURCES RELEASE DATE

db:VULHUBid:VHN-374294date:2021-01-13T00:00:00
db:VULMONid:CVE-2021-1240date:2021-01-13T00:00:00
db:JVNDBid:JVNDB-2021-002767date:2021-09-30T00:00:00
db:CNNVDid:CNNVD-202101-967date:2021-01-13T00:00:00
db:NVDid:CVE-2021-1240date:2021-01-13T22:15:20.897