Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:idec:microsmart_fc6a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59A9BAF0-7AFD-4918-81E2-6949B71E4208", "versionEndIncluding": "2.32", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:idec:microsmart_fc6a:-:*:*:*:*:*:*:*", "matchCriteriaId": "892DE7A7-7D54-4EE5-97B7-2B8A0B190DFB", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:idec:microsmart_plus_fc6a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FFD59B-27E0-4D27-A339-FE78D7407C02", "versionEndIncluding": "1.91", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:idec:microsmart_plus_fc6a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CFD58FF-AAE9-47F8-971C-442E2E8C4499", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:idec:data_file_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E7A2720-6B29-4BD1-B85B-293850D804A8", "versionEndIncluding": "2.12.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:idec:windedit:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA314D4B-B187-4238-B341-E2B9F94EBEBA", "versionEndIncluding": "1.3.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:idec:windldr:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ED0922F-93CB-41B3-A468-44845F428945", "versionEndIncluding": "8.19.1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Unprotected transport of credentials vulnerability in IDEC PLCs (FC6A Series MICROSmart All-in-One CPU module v2.32 and earlier, FC6A Series MICROSmart Plus CPU module v1.91 and earlier, WindLDR v8.19.1 and earlier, WindEDIT Lite v1.3.1 and earlier, and Data File Manager v2.12.1 and earlier) allows an attacker to obtain the PLC Web server user credentials from the communication between the PLC and the software. As a result, the complete access privileges to the PLC Web server may be obtained, and manipulation of the PLC output and/or suspension of the PLC may be conducted."}, {"lang": "es", "value": "Una vulnerabilidad de transporte de credenciales sin protecci\u00f3n en los PLC de IDEC (m\u00f3dulo de CPU MICROSmart All-in-One de la serie FC6A versiones v2.32 y anteriores, m\u00f3dulo de CPU MICROSmart Plus de la serie FC6A versiones v1.91 y anteriores, WindLDR versiones 8.19.1 y anteriores, WindEDIT Lite versiones v1.3.1 y anteriores, y Data File Manager versiones v2.12.1 y anteriores) permite a un atacante obtener las credenciales de usuario del servidor web del PLC a partir de la comunicaci\u00f3n entre el PLC y el software. Como resultado, pueden obtenerse los privilegios de acceso completo al servidor web del PLC, y es posible manipular la salida del PLC y/o suspenderlo"}], "id": "CVE-2021-20826", "lastModified": "2024-11-21T05:47:14.313", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-12-24T07:15:06.510", "references": [{"source": "vultures@jpcert.or.jp", "tags": ["Third Party Advisory"], "url": "https://jvn.jp/en/vu/JVNVU92279973/index.html"}, {"source": "vultures@jpcert.or.jp", "tags": ["Vendor Advisory"], "url": "https://www.idec.com/home/lp/pdf/2021-12-24-PLC.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://jvn.jp/en/vu/JVNVU92279973/index.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.idec.com/home/lp/pdf/2021-12-24-PLC.pdf"}], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-522"}], "source": "nvd@nist.gov", "type": "Primary"}]}