ID

VAR-202111-0012


CVE

CVE-2021-42701


TITLE

DAQFactory  Vulnerability in data modification that is assumed to be immutable in

Trust: 0.8

sources: JVNDB: JVNDB-2021-003935

DESCRIPTION

An attacker could prepare a specially crafted project file that, if opened, would attempt to connect to the cloud and trigger a man in the middle (MiTM) attack. This could allow an attacker to obtain credentials and take over the user’s cloud account. DAQFactory There is a vulnerability in data modification that is supposed to be immutable.Information may be obtained and information may be tampered with. DAQFactory is a software and application development platform that provides various tools that allow you to easily create HMI/SCADA applications. A man-in-the-middle attack vulnerability exists in DAQFactory 18.1 Build 2347 and earlier

Trust: 2.16

sources: NVD: CVE-2021-42701 // JVNDB: JVNDB-2021-003935 // CNVD: CNVD-2021-85892

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-85892

AFFECTED PRODUCTS

vendor:azeotechmodel:daqfactoryscope:eqversion:18.1

Trust: 1.0

vendor:azeotechmodel:daqfactoryscope:lteversion:18.1

Trust: 1.0

vendor:azeotechmodel:daqfactoryscope:eqversion: -

Trust: 0.8

vendor:azeotechmodel:daqfactoryscope: - version: -

Trust: 0.8

vendor:azeotechmodel:daqfactory buildscope:lteversion:<=18.12347

Trust: 0.6

sources: CNVD: CNVD-2021-85892 // JVNDB: JVNDB-2021-003935 // NVD: CVE-2021-42701

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-42701
value: MEDIUM

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2021-42701
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-42701
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2021-85892
value: LOW

Trust: 0.6

CNNVD: CNNVD-202111-468
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2021-42701
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2021-85892
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-42701
baseSeverity: MEDIUM
baseScore: 6.3
vectorString: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.0
impactScore: 5.2
version: 3.1

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2021-42701
baseSeverity: MEDIUM
baseScore: 5.0
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.3
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-42701
baseSeverity: MEDIUM
baseScore: 6.3
vectorString: CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-85892 // JVNDB: JVNDB-2021-003935 // CNNVD: CNNVD-202111-468 // NVD: CVE-2021-42701 // NVD: CVE-2021-42701

PROBLEMTYPE DATA

problemtype:CWE-471

Trust: 1.0

problemtype:Data changes that are assumed to be immutable (CWE-471) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-003935 // NVD: CVE-2021-42701

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202111-468

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202111-468

PATCH

title:Top Pageurl:https://www.azeotech.com/j/index.php

Trust: 0.8

title:AzeoTech DAQFactory Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=169058

Trust: 0.6

sources: JVNDB: JVNDB-2021-003935 // CNNVD: CNNVD-202111-468

EXTERNAL IDS

db:ICS CERTid:ICSA-21-308-02

Trust: 3.0

db:NVDid:CVE-2021-42701

Trust: 3.0

db:JVNid:JVNVU91156086

Trust: 0.8

db:JVNDBid:JVNDB-2021-003935

Trust: 0.8

db:CNVDid:CNVD-2021-85892

Trust: 0.6

db:AUSCERTid:ESB-2021.3696

Trust: 0.6

db:CS-HELPid:SB2021110801

Trust: 0.6

db:CNNVDid:CNNVD-202111-468

Trust: 0.6

sources: CNVD: CNVD-2021-85892 // JVNDB: JVNDB-2021-003935 // CNNVD: CNNVD-202111-468 // NVD: CVE-2021-42701

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-308-02

Trust: 3.0

url:https://jvn.jp/vu/jvnvu91156086/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-42701

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2021.3696

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021110801

Trust: 0.6

sources: CNVD: CNVD-2021-85892 // JVNDB: JVNDB-2021-003935 // CNNVD: CNNVD-202111-468 // NVD: CVE-2021-42701

SOURCES

db:CNVDid:CNVD-2021-85892
db:JVNDBid:JVNDB-2021-003935
db:CNNVDid:CNNVD-202111-468
db:NVDid:CVE-2021-42701

LAST UPDATE DATE

2024-11-23T22:10:58.640000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-85892date:2022-01-18T00:00:00
db:JVNDBid:JVNDB-2021-003935date:2021-11-10T09:12:00
db:CNNVDid:CNNVD-202111-468date:2021-11-10T00:00:00
db:NVDid:CVE-2021-42701date:2024-11-21T06:28:00.137

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-85892date:2021-11-10T00:00:00
db:JVNDBid:JVNDB-2021-003935date:2021-11-10T00:00:00
db:CNNVDid:CNNVD-202111-468date:2021-11-05T00:00:00
db:NVDid:CVE-2021-42701date:2021-11-05T16:15:07.947