Show plain JSON{"containers": {"cna": {"affected": [{"product": "CC612", "vendor": "Bender / ebee", "versions": [{"lessThan": "5.11.2", "status": "affected", "version": "5.11.x", "versionType": "custom"}, {"lessThan": "5.12.5", "status": "affected", "version": "5.12.x", "versionType": "custom"}, {"lessThan": "5.13.2", "status": "affected", "version": "5.13.x", "versionType": "custom"}, {"lessThan": "5.20.2", "status": "affected", "version": "5.20.x", "versionType": "custom"}]}, {"product": "CC613", "vendor": "Bender / ebee", "versions": [{"lessThan": "5.11.2", "status": "affected", "version": "5.11.x", "versionType": "custom"}, {"lessThan": "5.12.5", "status": "affected", "version": "5.12.x", "versionType": "custom"}, {"lessThan": "5.13.2", "status": "affected", "version": "5.13.x", "versionType": "custom"}, {"lessThan": "5.20.2", "status": "affected", "version": "5.20.x", "versionType": "custom"}]}, {"product": "ICC15xx", "vendor": "Bender / ebee", "versions": [{"lessThan": "5.11.2", "status": "affected", "version": "5.11.x", "versionType": "custom"}, {"lessThan": "5.12.5", "status": "affected", "version": "5.12.x", "versionType": "custom"}, {"lessThan": "5.13.2", "status": "affected", "version": "5.13.x", "versionType": "custom"}, {"lessThan": "5.20.2", "status": "affected", "version": "5.20.x", "versionType": "custom"}]}, {"product": "ICC16xx", "vendor": "Bender / ebee", "versions": [{"lessThan": "5.11.2", "status": "affected", "version": "5.11.x", "versionType": "custom"}, {"lessThan": "5.12.5", "status": "affected", "version": "5.12.x", "versionType": "custom"}, {"lessThan": "5.13.2", "status": "affected", "version": "5.13.x", "versionType": "custom"}, {"lessThan": "5.20.2", "status": "affected", "version": "5.20.x", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Bender thanks Qianxin StarV Security Lab, China. The issue was coordinated by CERT@VDE."}], "datePublic": "2022-04-27T00:00:00", "descriptions": [{"lang": "en", "value": "In Bender/ebee Charge Controllers in multiple versions are prone to Hardcoded Credentials. Bender charge controller CC612 in version 5.20.1 and below is prone to hardcoded ssh credentials. An attacker may use the password to gain administrative access to the web-UI."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-259", "description": "CWE-259 Use of Hard-coded Password", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-04-27T15:15:33", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://cert.vde.com/en/advisories/VDE-2021-047"}], "source": {"advisory": "VDE-2021-047", "defect": ["CERT@VDE#64026"], "discovery": "EXTERNAL"}, "title": "Bender Charge Controller: Hardcoded Credentials in Charge Controller", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2022-04-27T10:00:00.000Z", "ID": "CVE-2021-34601", "STATE": "PUBLIC", "TITLE": "Bender Charge Controller: Hardcoded Credentials in Charge Controller"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "CC612", "version": {"version_data": [{"version_affected": "<", "version_name": "5.11.x", "version_value": "5.11.2"}, {"version_affected": "<", "version_name": "5.12.x", "version_value": "5.12.5"}, {"version_affected": "<", "version_name": "5.13.x", "version_value": "5.13.2"}, {"version_affected": "<", "version_name": "5.20.x", "version_value": "5.20.2"}]}}, {"product_name": "CC613", "version": {"version_data": [{"version_affected": "<", "version_name": "5.11.x", "version_value": "5.11.2"}, {"version_affected": "<", "version_name": "5.12.x", "version_value": "5.12.5"}, {"version_affected": "<", "version_name": "5.13.x", "version_value": "5.13.2"}, {"version_affected": "<", "version_name": "5.20.x", "version_value": "5.20.2"}]}}, {"product_name": "ICC15xx", "version": {"version_data": [{"version_affected": "<", "version_name": "5.11.x", "version_value": "5.11.2"}, {"version_affected": "<", "version_name": "5.12.x", "version_value": "5.12.5"}, {"version_affected": "<", "version_name": "5.13.x", "version_value": "5.13.2"}, {"version_affected": "<", "version_name": "5.20.x", "version_value": "5.20.2"}]}}, {"product_name": "ICC16xx", "version": {"version_data": [{"version_affected": "<", "version_name": "5.11.x", "version_value": "5.11.2"}, {"version_affected": "<", "version_name": "5.12.x", "version_value": "5.12.5"}, {"version_affected": "<", "version_name": "5.13.x", "version_value": "5.13.2"}, {"version_affected": "<", "version_name": "5.20.x", "version_value": "5.20.2"}]}}]}, "vendor_name": "Bender / ebee"}]}}, "credit": [{"lang": "eng", "value": "Bender thanks Qianxin StarV Security Lab, China. The issue was coordinated by CERT@VDE."}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "In Bender/ebee Charge Controllers in multiple versions are prone to Hardcoded Credentials. Bender charge controller CC612 in version 5.20.1 and below is prone to hardcoded ssh credentials. An attacker may use the password to gain administrative access to the web-UI."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-259 Use of Hard-coded Password"}]}]}, "references": {"reference_data": [{"name": "https://cert.vde.com/en/advisories/VDE-2021-047", "refsource": "CONFIRM", "url": "https://cert.vde.com/en/advisories/VDE-2021-047"}]}, "source": {"advisory": "VDE-2021-047", "defect": ["CERT@VDE#64026"], "discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T00:19:47.864Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://cert.vde.com/en/advisories/VDE-2021-047"}]}]}, "cveMetadata": {"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-34601", "datePublished": "2022-04-27T15:15:33.375616Z", "dateReserved": "2021-06-10T00:00:00", "dateUpdated": "2024-09-16T19:47:12.796Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}