ID

VAR-202104-0691


CVE

CVE-2021-21507


TITLE

Dell EMC Networking X  Series and  Dell EMC PowerEdge VRTX Switch Module  Vulnerability in cryptography

Trust: 0.8

sources: JVNDB: JVNDB-2021-006326

DESCRIPTION

Dell EMC Networking X-Series firmware versions prior to 3.0.1.8 and Dell EMC PowerEdge VRTX Switch Module firmware versions prior to 2.0.0.82 contain a Weak Password Encryption Vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable system with privileges of the compromised account. DELL Dell EMC Networking X-Series is an X-series Ethernet switch from Dell (DELL)

Trust: 2.25

sources: NVD: CVE-2021-21507 // JVNDB: JVNDB-2021-006326 // CNVD: CNVD-2022-42746 // VULMON: CVE-2021-21507

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-42746

AFFECTED PRODUCTS

vendor:dellmodel:x1008pscope:ltversion:3.0.1.8

Trust: 1.0

vendor:dellmodel:x1018scope:ltversion:3.0.1.8

Trust: 1.0

vendor:dellmodel:x1018pscope:ltversion:3.0.1.8

Trust: 1.0

vendor:dellmodel:r1-2401scope:ltversion:2.0.0.82

Trust: 1.0

vendor:dellmodel:x1026scope:ltversion:3.0.1.8

Trust: 1.0

vendor:dellmodel:x1052pscope:ltversion:3.0.1.8

Trust: 1.0

vendor:dellmodel:x1008scope:ltversion:3.0.1.8

Trust: 1.0

vendor:dellmodel:x1052scope:ltversion:3.0.1.8

Trust: 1.0

vendor:dellmodel:r1-2210scope:ltversion:2.0.0.82

Trust: 1.0

vendor:dellmodel:x4012scope:ltversion:3.0.1.8

Trust: 1.0

vendor:dellmodel:x1026pscope:ltversion:3.0.1.8

Trust: 1.0

vendor:デルmodel:x1026pscope: - version: -

Trust: 0.8

vendor:デルmodel:x1018pscope: - version: -

Trust: 0.8

vendor:デルmodel:x1052pscope: - version: -

Trust: 0.8

vendor:デルmodel:x1018scope: - version: -

Trust: 0.8

vendor:デルmodel:x4012scope: - version: -

Trust: 0.8

vendor:デルmodel:r1-2401scope: - version: -

Trust: 0.8

vendor:デルmodel:x1008pscope: - version: -

Trust: 0.8

vendor:デルmodel:x1008scope: - version: -

Trust: 0.8

vendor:デルmodel:x1026scope: - version: -

Trust: 0.8

vendor:デルmodel:r1-2210scope: - version: -

Trust: 0.8

vendor:dellmodel:x1008pscope:gtversion:3.0.1.8

Trust: 0.6

vendor:dellmodel:x1008pscope: - version: -

Trust: 0.6

vendor:dellmodel:x1018pscope:gtversion:3.0.1.8

Trust: 0.6

vendor:dellmodel:x1018pscope: - version: -

Trust: 0.6

vendor:dellmodel:x1026pscope:gtversion:3.0.1.8

Trust: 0.6

vendor:dellmodel:x1026pscope: - version: -

Trust: 0.6

vendor:dellmodel:x1052pscope:gtversion:3.0.1.8

Trust: 0.6

vendor:dellmodel:x1052pscope: - version: -

Trust: 0.6

vendor:dellmodel:x4012scope:gtversion:3.0.1.8

Trust: 0.6

vendor:dellmodel: - scope:eqversion:x4012

Trust: 0.6

vendor:dellmodel:r1-2401scope:gtversion:2.0.0.82

Trust: 0.6

vendor:dellmodel:r1-2401scope: - version: -

Trust: 0.6

vendor:dellmodel:r1-2210scope:gtversion:2.0.0.82

Trust: 0.6

vendor:dellmodel:r1-2210scope: - version: -

Trust: 0.6

vendor:dellmodel:x1008scope:gtversion:3.0.1.8

Trust: 0.6

vendor:dellmodel: - scope:eqversion:x1008

Trust: 0.6

vendor:dellmodel:x1018scope:gtversion:3.0.1.8

Trust: 0.6

vendor:dellmodel: - scope:eqversion:x1018

Trust: 0.6

vendor:dellmodel:x1026scope:gtversion:3.0.1.8

Trust: 0.6

vendor:dellmodel: - scope:eqversion:x1026

Trust: 0.6

vendor:dellmodel:x1052scope:gtversion:3.0.1.8

Trust: 0.6

vendor:dellmodel: - scope:eqversion:x1052

Trust: 0.6

sources: CNVD: CNVD-2022-42746 // JVNDB: JVNDB-2021-006326 // NVD: CVE-2021-21507

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-21507
value: CRITICAL

Trust: 1.0

security_alert@emc.com: CVE-2021-21507
value: HIGH

Trust: 1.0

NVD: CVE-2021-21507
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2022-42746
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202104-2281
value: CRITICAL

Trust: 0.6

VULMON: CVE-2021-21507
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-21507
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2022-42746
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-21507
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

security_alert@emc.com: CVE-2021-21507
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-21507
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-42746 // VULMON: CVE-2021-21507 // JVNDB: JVNDB-2021-006326 // CNNVD: CNNVD-202104-2281 // NVD: CVE-2021-21507 // NVD: CVE-2021-21507

PROBLEMTYPE DATA

problemtype:CWE-261

Trust: 1.0

problemtype:CWE-326

Trust: 1.0

problemtype:Inadequate encryption strength (CWE-326) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-006326 // NVD: CVE-2021-21507

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202104-2281

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-202104-2281

PATCH

title:DSA-2021-080url:https://www.dell.com/support/kbdoc/ja-jp/000185252/dsa-2020-080-dell-emc-poweredge-vrtx-security-update-for-a-vrtx-switch-module-vulnerability

Trust: 0.8

title:Patch for Dell EMC Networking X-Series Encryption Issue Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/334666

Trust: 0.6

title:Dell EMC Networking X-Series Fixes for encryption problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=149946

Trust: 0.6

sources: CNVD: CNVD-2022-42746 // JVNDB: JVNDB-2021-006326 // CNNVD: CNNVD-202104-2281

EXTERNAL IDS

db:NVDid:CVE-2021-21507

Trust: 3.9

db:JVNDBid:JVNDB-2021-006326

Trust: 0.8

db:CNVDid:CNVD-2022-42746

Trust: 0.6

db:CNNVDid:CNNVD-202104-2281

Trust: 0.6

db:VULMONid:CVE-2021-21507

Trust: 0.1

sources: CNVD: CNVD-2022-42746 // VULMON: CVE-2021-21507 // JVNDB: JVNDB-2021-006326 // CNNVD: CNNVD-202104-2281 // NVD: CVE-2021-21507

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2021-21507

Trust: 2.0

url:https://www.dell.com/support/kbdoc/000185252

Trust: 1.7

url:https://cwe.mitre.org/data/definitions/326.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2022-42746 // VULMON: CVE-2021-21507 // JVNDB: JVNDB-2021-006326 // CNNVD: CNNVD-202104-2281 // NVD: CVE-2021-21507

SOURCES

db:CNVDid:CNVD-2022-42746
db:VULMONid:CVE-2021-21507
db:JVNDBid:JVNDB-2021-006326
db:CNNVDid:CNNVD-202104-2281
db:NVDid:CVE-2021-21507

LAST UPDATE DATE

2024-08-14T15:01:29.675000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-42746date:2022-06-02T00:00:00
db:VULMONid:CVE-2021-21507date:2021-05-10T00:00:00
db:JVNDBid:JVNDB-2021-006326date:2022-01-05T06:28:00
db:CNNVDid:CNNVD-202104-2281date:2021-05-11T00:00:00
db:NVDid:CVE-2021-21507date:2021-05-10T19:54:30.157

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-42746date:2021-06-02T00:00:00
db:VULMONid:CVE-2021-21507date:2021-04-30T00:00:00
db:JVNDBid:JVNDB-2021-006326date:2022-01-05T00:00:00
db:CNNVDid:CNNVD-202104-2281date:2021-04-30T00:00:00
db:NVDid:CVE-2021-21507date:2021-04-30T21:15:08.597