Show plain JSON{"containers": {"cna": {"affected": [{"product": "Versiondog", "vendor": "AUVESY", "versions": [{"lessThanOrEqual": "8.0", "status": "affected", "version": "All", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Amir Preminger of Claroty reported these vulnerabilities to CISA."}], "datePublic": "2021-08-19T00:00:00", "descriptions": [{"lang": "en", "value": "Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product\u2019s binaries, thus hijacking the loaded DLL."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2021-10-22T11:22:44", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01"}], "solutions": [{"lang": "en", "value": "AUVESY recommends upgrading Versiondog to Version 8.1 or later (login required)."}], "source": {"advisory": "https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01", "discovery": "UNKNOWN"}, "title": "AUVESY Versiondog", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2021-08-19T15:34:00.000Z", "ID": "CVE-2021-38469", "STATE": "PUBLIC", "TITLE": "AUVESY Versiondog"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Versiondog", "version": {"version_data": [{"version_affected": "<=", "version_name": "All", "version_value": "8.0"}]}}]}, "vendor_name": "AUVESY"}]}}, "credit": [{"lang": "eng", "value": "Amir Preminger of Claroty reported these vulnerabilities to CISA."}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product\u2019s binaries, thus hijacking the loaded DLL."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-427 Uncontrolled Search Path Element"}]}]}, "references": {"reference_data": [{"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01", "refsource": "CONFIRM", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01"}]}, "solution": [{"lang": "en", "value": "AUVESY recommends upgrading Versiondog to Version 8.1 or later (login required)."}], "source": {"advisory": "https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01", "discovery": "UNKNOWN"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T01:44:22.837Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01"}]}]}, "cveMetadata": {"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-38469", "datePublished": "2021-10-22T11:22:44.045095Z", "dateReserved": "2021-08-10T00:00:00", "dateUpdated": "2024-09-16T19:30:55.153Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}