Show plain JSON{"containers": {"cna": {"affected": [{"platforms": ["QTS 4.3.6"], "product": "HBS 3", "vendor": "QNAP Systems Inc.", "versions": [{"lessThan": "v3.0.210507", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"platforms": ["QTS 4.3.4"], "product": "HBS 3", "vendor": "QNAP Systems Inc.", "versions": [{"lessThan": "v3.0.210506", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"platforms": ["QTS 4.3.3"], "product": "HBS 3", "vendor": "QNAP Systems Inc.", "versions": [{"lessThan": "v3.0.210506", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Ta-Lun Yen of TXOne IoT/ICS Security Research Labs of Trend Micro working with Trend Micro\u2019s Zero Day Initiative"}], "datePublic": "2021-07-08T00:00:00", "descriptions": [{"lang": "en", "value": "An improper access control vulnerability has been reported to affect certain legacy versions of HBS 3. If exploited, this vulnerability allows attackers to compromise the security of the operating system.QNAP have already fixed this vulnerability in the following versions of HBS 3: QTS 4.3.6: HBS 3 v3.0.210507 and later QTS 4.3.4: HBS 3 v3.0.210506 and later QTS 4.3.3: HBS 3 v3.0.210506 and later"}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE"}]}, {"descriptions": [{"cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE"}]}, {"descriptions": [{"cweId": "CWE-749", "description": "CWE-749 Exposed Dangerous Method or Function", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2021-07-08T13:06:11", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://www.qnap.com/en/security-advisory/qsa-21-19"}, {"tags": ["x_refsource_MISC"], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-783/"}], "solutions": [{"lang": "en", "value": "QNAP have already fixed this vulnerability in the following versions of HBS 3:\nQTS 4.3.6: HBS 3 v3.0.210507 and later\nQTS 4.3.4: HBS 3 v3.0.210506 and later\nQTS 4.3.3: HBS 3 v3.0.210506 and later"}], "source": {"advisory": "QSA-21-19", "discovery": "EXTERNAL"}, "title": "Missing Authentication for Critical Function in RTRR Server\u00a0in HBS3", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security@qnap.com", "DATE_PUBLIC": "2021-07-08T15:22:00.000Z", "ID": "CVE-2021-28809", "STATE": "PUBLIC", "TITLE": "Missing Authentication for Critical Function in RTRR Server\u00a0in HBS3"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "HBS 3", "version": {"version_data": [{"platform": "QTS 4.3.6", "version_affected": "<", "version_value": "v3.0.210507"}, {"platform": "QTS 4.3.4", "version_affected": "<", "version_value": "v3.0.210506"}, {"platform": "QTS 4.3.3", "version_affected": "<", "version_value": "v3.0.210506"}]}}]}, "vendor_name": "QNAP Systems Inc."}]}}, "credit": [{"lang": "eng", "value": "Ta-Lun Yen of TXOne IoT/ICS Security Research Labs of Trend Micro working with Trend Micro\u2019s Zero Day Initiative"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "An improper access control vulnerability has been reported to affect certain legacy versions of HBS 3. If exploited, this vulnerability allows attackers to compromise the security of the operating system.QNAP have already fixed this vulnerability in the following versions of HBS 3: QTS 4.3.6: HBS 3 v3.0.210507 and later QTS 4.3.4: HBS 3 v3.0.210506 and later QTS 4.3.3: HBS 3 v3.0.210506 and later"}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-284 Improper Access Control"}]}, {"description": [{"lang": "eng", "value": "CWE-306 Missing Authentication for Critical Function"}]}, {"description": [{"lang": "eng", "value": "CWE-749 Exposed Dangerous Method or Function"}]}]}, "references": {"reference_data": [{"name": "https://www.qnap.com/en/security-advisory/qsa-21-19", "refsource": "MISC", "url": "https://www.qnap.com/en/security-advisory/qsa-21-19"}, {"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-783/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-783/"}]}, "solution": [{"lang": "en", "value": "QNAP have already fixed this vulnerability in the following versions of HBS 3:\nQTS 4.3.6: HBS 3 v3.0.210507 and later\nQTS 4.3.4: HBS 3 v3.0.210506 and later\nQTS 4.3.3: HBS 3 v3.0.210506 and later"}], "source": {"advisory": "QSA-21-19", "discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T21:55:11.617Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.qnap.com/en/security-advisory/qsa-21-19"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-783/"}]}]}, "cveMetadata": {"assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2021-28809", "datePublished": "2021-07-08T07:40:12.294698Z", "dateReserved": "2021-03-18T00:00:00", "dateUpdated": "2024-09-17T00:36:54.377Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}