ID

VAR-202109-0598


CVE

CVE-2021-33545


TITLE

GEUTEBRUCK  Made  G-Cam E2  and  G-Code  Multiple vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2021-002023

DESCRIPTION

Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in the counter parameter which may allow an attacker to remotely execute arbitrary code. GEUTEBRUCK Provided by the company G-Cam E2 and G-Code The following multiple vulnerabilities exist in. * Lack of authentication for important features (CWE-306) - CVE-2021-33543 ‥ * Command injection (CWE-77) - CVE-2021-33544 , CVE-2021-33548 , CVE-2021-33550 , CVE-2021-33551 , CVE-2021-33552 , CVE-2021-33553 , CVE-2021-33554 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2021-33545 , CVE-2021-33546 , CVE-2021-33547 , CVE-2021-33549The expected impact depends on each vulnerability, but it may be affected as follows. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Trust: 2.25

sources: NVD: CVE-2021-33545 // JVNDB: JVNDB-2021-002023 // CNNVD: CNNVD-202104-975 // VULMON: CVE-2021-33545

IOT TAXONOMY

category:['camera device']sub_category:camera

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:geutebrueckmodel:g-code een-2010scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2110scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2112scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2250scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2275scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-code een-2040scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2271scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2111scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2239scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2230scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2249scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-code een-2010scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2241scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2110scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-code een-2040scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2271scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2111scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2239scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2250scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2249scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2230scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2270scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-code eec-2400scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-code een-2010scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2241scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2240scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2251scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2230scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2241scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-code eec-2400scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2270scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2249scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-code eec-2400scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2240scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2251scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2275scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2112scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2270scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2275scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2110scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2250scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2251scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2240scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-code een-2040scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2112scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2271scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2111scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2239scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebruckmodel: - scope:eqversion:‥ * firmware 1.12.13.2 1.12.14.5

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:* een-20xx

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:* efd-22xx

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:* ethc-22xx

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:‥ * g-cam

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:* eec-2xx

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:works with the above firmware s e2 series camera models encoders

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion: -

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:* ebc-21xx

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:‥ * g-code

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:( multiple products )

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:* ewpc-22xx

Trust: 0.8

sources: JVNDB: JVNDB-2021-002023 // NVD: CVE-2021-33545

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-33545
value: HIGH

Trust: 1.0

info@cert.vde.com: CVE-2021-33545
value: HIGH

Trust: 1.0

OTHER: JVNDB-2021-002023
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202107-2092
value: HIGH

Trust: 0.6

VULMON: CVE-2021-33545
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-33545
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

nvd@nist.gov: CVE-2021-33545
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 2.0

OTHER: JVNDB-2021-002023
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-33545 // JVNDB: JVNDB-2021-002023 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202107-2092 // NVD: CVE-2021-33545 // NVD: CVE-2021-33545

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:CWE-787

Trust: 1.0

problemtype:Command injection (CWE-77) [ Other ]

Trust: 0.8

problemtype: Stack-based buffer overflow (CWE-121) [ Other ]

Trust: 0.8

problemtype: Lack of authentication for important features (CWE-306) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-002023 // NVD: CVE-2021-33545

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202107-2092

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

PATCH

title:GEUTEBRUCK ’ s web portal  (Login required)url:https://portal.geutebrueck.com/

Trust: 0.8

title:Geutebrück G-Cam E2 and G-Code Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=158072

Trust: 0.6

sources: JVNDB: JVNDB-2021-002023 // CNNVD: CNNVD-202107-2092

EXTERNAL IDS

db:NVDid:CVE-2021-33545

Trust: 2.6

db:ICS CERTid:ICSA-21-208-03

Trust: 1.7

db:JVNid:JVNVU97817785

Trust: 0.8

db:ICS CERTid:ICSA-21-208-05

Trust: 0.8

db:JVNDBid:JVNDB-2021-002023

Trust: 0.8

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:CS-HELPid:SB2021072807

Trust: 0.6

db:AUSCERTid:ESB-2021.2550

Trust: 0.6

db:CNNVDid:CNNVD-202107-2092

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:VULMONid:CVE-2021-33545

Trust: 0.1

sources: OTHER: None // VULMON: CVE-2021-33545 // JVNDB: JVNDB-2021-002023 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202107-2092 // NVD: CVE-2021-33545

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-208-03

Trust: 2.3

url:https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/

Trust: 1.7

url:https://jvn.jp/vu/jvnvu97817785/

Trust: 0.8

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-208-05

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2550

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021072807

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-33545

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/121.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: OTHER: None // VULMON: CVE-2021-33545 // JVNDB: JVNDB-2021-002023 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202107-2092 // NVD: CVE-2021-33545

CREDITS

Titouan Lazard and Ibrahim Ayadhi from RandoriSec reported these vulnerabilities to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202107-2092

SOURCES

db:OTHERid: -
db:VULMONid:CVE-2021-33545
db:JVNDBid:JVNDB-2021-002023
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202107-2092
db:NVDid:CVE-2021-33545

LAST UPDATE DATE

2025-01-30T19:32:01.831000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-33545date:2021-09-27T00:00:00
db:JVNDBid:JVNDB-2021-002023date:2021-07-29T08:30:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202107-2092date:2021-10-08T00:00:00
db:NVDid:CVE-2021-33545date:2021-09-27T14:30:38.633

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-33545date:2021-09-13T00:00:00
db:JVNDBid:JVNDB-2021-002023date:2021-07-29T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202107-2092date:2021-07-27T00:00:00
db:NVDid:CVE-2021-33545date:2021-09-13T18:15:21.720