ID

VAR-202109-0870


CVE

CVE-2021-35205


TITLE

NETSCOUT Systems nGeniusONE  Open redirect vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-012632

DESCRIPTION

NETSCOUT Systems nGeniusONE version 6.3.0 build 1196 allows URL redirection in redirector. NETSCOUT Systems nGeniusONE Exists in an open redirect vulnerability.Information may be obtained and information may be tampered with

Trust: 1.8

sources: NVD: CVE-2021-35205 // JVNDB: JVNDB-2021-012632 // VULHUB: VHN-395484 // VULMON: CVE-2021-35205

AFFECTED PRODUCTS

vendor:netscoutmodel:ngeniusonescope:eqversion:6.3.0

Trust: 1.0

sources: NVD: CVE-2021-35205

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-35205
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-35205
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202109-1991
value: MEDIUM

Trust: 0.6

VULHUB: VHN-395484
value: MEDIUM

Trust: 0.1

VULMON: CVE-2021-35205
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-35205
severity: MEDIUM
baseScore: 4.9
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-395484
severity: MEDIUM
baseScore: 4.9
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-35205
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.3
impactScore: 2.7
version: 3.1

Trust: 1.0

NVD: CVE-2021-35205
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-395484 // VULMON: CVE-2021-35205 // JVNDB: JVNDB-2021-012632 // CNNVD: CNNVD-202109-1991 // NVD: CVE-2021-35205

PROBLEMTYPE DATA

problemtype:CWE-601

Trust: 1.1

problemtype:Open redirect (CWE-601) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-395484 // JVNDB: JVNDB-2021-012632 // NVD: CVE-2021-35205

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202109-1991

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202109-1991

PATCH

title:Open Redirectionurl:https://www.netscout.com/securityadvisories

Trust: 0.8

title:Netscout NgeniusOne Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=164591

Trust: 0.6

sources: JVNDB: JVNDB-2021-012632 // CNNVD: CNNVD-202109-1991

EXTERNAL IDS

db:NVDid:CVE-2021-35205

Trust: 3.4

db:JVNDBid:JVNDB-2021-012632

Trust: 0.8

db:CNNVDid:CNNVD-202109-1991

Trust: 0.6

db:VULHUBid:VHN-395484

Trust: 0.1

db:VULMONid:CVE-2021-35205

Trust: 0.1

sources: VULHUB: VHN-395484 // VULMON: CVE-2021-35205 // JVNDB: JVNDB-2021-012632 // CNNVD: CNNVD-202109-1991 // NVD: CVE-2021-35205

REFERENCES

url:https://www.netscout.com/securityadvisories

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-35205

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/601.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-395484 // VULMON: CVE-2021-35205 // JVNDB: JVNDB-2021-012632 // CNNVD: CNNVD-202109-1991 // NVD: CVE-2021-35205

SOURCES

db:VULHUBid:VHN-395484
db:VULMONid:CVE-2021-35205
db:JVNDBid:JVNDB-2021-012632
db:CNNVDid:CNNVD-202109-1991
db:NVDid:CVE-2021-35205

LAST UPDATE DATE

2024-08-14T13:53:54.754000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-395484date:2021-10-04T00:00:00
db:VULMONid:CVE-2021-35205date:2021-10-04T00:00:00
db:JVNDBid:JVNDB-2021-012632date:2022-09-05T02:21:00
db:CNNVDid:CNNVD-202109-1991date:2021-10-09T00:00:00
db:NVDid:CVE-2021-35205date:2021-10-04T17:36:44.177

SOURCES RELEASE DATE

db:VULHUBid:VHN-395484date:2021-09-30T00:00:00
db:VULMONid:CVE-2021-35205date:2021-09-30T00:00:00
db:JVNDBid:JVNDB-2021-012632date:2022-09-05T00:00:00
db:CNNVDid:CNNVD-202109-1991date:2021-09-30T00:00:00
db:NVDid:CVE-2021-35205date:2021-09-30T18:15:07.900