ID

VAR-202106-1415


CVE

CVE-2021-23020


TITLE

NAAS API keys  Vulnerability in Insufficient Use of Random Values

Trust: 0.8

sources: JVNDB: JVNDB-2021-007662

DESCRIPTION

The NAAS 3.x before 3.10.0 API keys were generated using an insecure pseudo-random string and hashing algorithm which could lead to predictable keys. NAAS API keys Is vulnerable to the use of insufficient random values.Information may be obtained. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. F5 NGINX Controller is a centralized monitoring and management platform for NGINX from F5 Corporation in the United States. The platform supports managing multiple NGINX instances using a visual interface. A security signature issue vulnerability exists in the NGINX controller that allows local users to bypass implemented security restrictions. Affected products and versions are as follows: NGINX Controller: 3.0.0, 3.1.0, 3.2.0, 3.3.0, 3.4.0, 3.5.0, 3.6.0, 3.7.0, 3.8.0, 3.9. 0

Trust: 2.25

sources: NVD: CVE-2021-23020 // JVNDB: JVNDB-2021-007662 // CNNVD: CNNVD-202104-975 // VULHUB: VHN-381506

AFFECTED PRODUCTS

vendor:f5model:nginx controllerscope:ltversion:3.10.0

Trust: 1.0

vendor:f5model:nginx controllerscope:gteversion:3.0.0

Trust: 1.0

vendor:f5model:nginx controllerscope:eqversion: -

Trust: 0.8

vendor:f5model:nginx controllerscope:eqversion:3.10.0

Trust: 0.8

vendor:f5model:nginx controllerscope:ltversion:3.x

Trust: 0.8

sources: JVNDB: JVNDB-2021-007662 // NVD: CVE-2021-23020

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-23020
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-23020
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202105-1582
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

VULHUB: VHN-381506
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-23020
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-381506
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-23020
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-23020
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-381506 // JVNDB: JVNDB-2021-007662 // CNNVD: CNNVD-202105-1582 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-23020

PROBLEMTYPE DATA

problemtype:CWE-330

Trust: 1.1

problemtype:Use of insufficient random values (CWE-330) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-381506 // JVNDB: JVNDB-2021-007662 // NVD: CVE-2021-23020

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202105-1582

TYPE

security feature problem

Trust: 0.6

sources: CNNVD: CNNVD-202105-1582

PATCH

title:K45263486url:https://support.f5.com/csp/article/K45263486

Trust: 0.8

title:NGINX Controller Fixing measures for security feature vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=152568

Trust: 0.6

sources: JVNDB: JVNDB-2021-007662 // CNNVD: CNNVD-202105-1582

EXTERNAL IDS

db:NVDid:CVE-2021-23020

Trust: 3.3

db:JVNDBid:JVNDB-2021-007662

Trust: 0.8

db:CS-HELPid:SB2021052547

Trust: 0.6

db:AUSCERTid:ESB-2021.1802

Trust: 0.6

db:CNNVDid:CNNVD-202105-1582

Trust: 0.6

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:VULHUBid:VHN-381506

Trust: 0.1

sources: VULHUB: VHN-381506 // JVNDB: JVNDB-2021-007662 // CNNVD: CNNVD-202105-1582 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-23020

REFERENCES

url:https://support.f5.com/csp/article/k45263486

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-23020

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021052547

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1802

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-f5-nginx-controller-affect-ibm-cloud-pak-for-automation/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

sources: VULHUB: VHN-381506 // JVNDB: JVNDB-2021-007662 // CNNVD: CNNVD-202105-1582 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-23020

SOURCES

db:VULHUBid:VHN-381506
db:JVNDBid:JVNDB-2021-007662
db:CNNVDid:CNNVD-202105-1582
db:CNNVDid:CNNVD-202104-975
db:NVDid:CVE-2021-23020

LAST UPDATE DATE

2024-08-14T12:27:16.413000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-381506date:2021-06-11T00:00:00
db:JVNDBid:JVNDB-2021-007662date:2022-02-18T09:04:00
db:CNNVDid:CNNVD-202105-1582date:2021-07-21T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:NVDid:CVE-2021-23020date:2021-06-11T19:46:46.253

SOURCES RELEASE DATE

db:VULHUBid:VHN-381506date:2021-06-01T00:00:00
db:JVNDBid:JVNDB-2021-007662date:2022-02-18T00:00:00
db:CNNVDid:CNNVD-202105-1582date:2021-05-25T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:NVDid:CVE-2021-23020date:2021-06-01T13:15:07.960