Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2021-40341", "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17", "state": "PUBLISHED", "assignerShortName": "Hitachi Energy", "dateReserved": "2021-08-31T20:24:21.498Z", "datePublished": "2023-01-05T21:26:42.760Z", "dateUpdated": "2025-04-10T13:31:25.498Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "FOXMAN-UN", "vendor": "Hitachi Energy", "versions": [{"status": "affected", "version": "FOXMAN-UN R16A"}, {"status": "affected", "version": "FOXMAN-UN R15B"}, {"status": "affected", "version": "FOXMAN-UN R15A"}, {"status": "affected", "version": "FOXMAN-UN R14B"}, {"status": "affected", "version": "FOXMAN-UN R14A"}, {"status": "affected", "version": "FOXMAN-UN R11B"}, {"status": "affected", "version": "FOXMAN-UN R11A"}, {"status": "affected", "version": "FOXMAN-UN R10C"}, {"status": "affected", "version": "FOXMAN-UN R9C"}]}, {"defaultStatus": "unaffected", "product": "UNEM", "vendor": "Hitachi Energy", "versions": [{"status": "affected", "version": "UNEM R16A"}, {"status": "affected", "version": "UNEM R15B"}, {"status": "affected", "version": "UNEM R15A"}, {"status": "affected", "version": "UNEM R14B"}, {"status": "affected", "version": "UNEM R14A"}, {"status": "affected", "version": "UNEM R11B"}, {"status": "affected", "version": "UNEM R11A"}, {"status": "affected", "version": "UNEM R10C"}, {"status": "affected", "version": "UNEM R9C"}]}], "credits": [{"lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "K-Businessom AG, Austria"}], "datePublic": "2022-12-13T13:30:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "DES cipher, which has inadequate encryption strength, is used Hitachi Energy FOXMAN-UN to encrypt user credentials used to access the Network Elements. Successful exploitation allows sensitive information to be decrypted easily. <p>This issue affects </p><p></p><ul><li>FOXMAN-UN product: FOXMAN-UN R16A, FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C; </li><li>UNEM product: UNEM R16A, UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C.</li></ul><p></p>List of CPEs: <br><ul><li>cpe:2.3:a:hitachienergy:foxman-un:R16A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R16A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*</li></ul><br>"}], "value": "DES cipher, which has inadequate encryption strength, is used Hitachi Energy FOXMAN-UN to encrypt user credentials used to access the Network Elements. Successful exploitation allows sensitive information to be decrypted easily.\u00a0This issue affects\u00a0\n\n\n\n * FOXMAN-UN product: FOXMAN-UN R16A, FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C;\u00a0\n * UNEM product: UNEM R16A, UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C.\n\n\n\n\nList of CPEs:\u00a0\n * cpe:2.3:a:hitachienergy:foxman-un:R16A:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:unem:R16A:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*\n\n\n\n"}], "impacts": [{"capecId": "CAPEC-20", "descriptions": [{"lang": "en", "value": "CAPEC-20 Encryption Brute Forcing"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-326", "description": "CWE-326 Inadequate Encryption Strength", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "e383dce4-0c27-4495-91c4-0db157728d17", "shortName": "Hitachi Energy", "dateUpdated": "2023-01-05T21:26:42.760Z"}, "references": [{"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch"}, {"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084&LanguageCode=en&DocumentPartId=&Action=Launch"}], "source": {"discovery": "EXTERNAL"}, "title": "Weak DES encryption", "workarounds": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "\n\nThe vulnerabilities are partially remediated in FOXMAN-UN R16A or UNEM R16A, the full remediation will be done in the upcoming release (planned).\n<br><br>For immediate recommended mitigation actions if using FOXMAN-UN R16A or UNEM R16A,\nplease refer to the \n\n<span style=\"background-color: rgb(255, 255, 255);\">Database contains credentials with weak encryption</span>\n\nclause of section Mitigation Factors/Workarounds\nin the respective products' advisory.\n<br><br>For immediate recommended mitigation actions if using FOXMAN-UN R15B or UNEM R15B and earlier, please refer to the multiple clauses of section Mitigation Factors/Workarounds in the advisory<br><ul><li>Secure the NMS CLIENT/SERVER communication. </li><li>Embedded FOXCST with RADIUS authentication should be avoided. </li><li>Database contains credentials with weak encryption.\n\n</li></ul>"}], "value": "\nThe vulnerabilities are partially remediated in FOXMAN-UN R16A or UNEM R16A, the full remediation will be done in the upcoming release (planned).\n\n\nFor immediate recommended mitigation actions if using FOXMAN-UN R16A or UNEM R16A,\nplease refer to the \n\nDatabase contains credentials with weak encryption\n\nclause of section Mitigation Factors/Workarounds\nin the respective products' advisory.\n\n\nFor immediate recommended mitigation actions if using FOXMAN-UN R15B or UNEM R15B and earlier, please refer to the multiple clauses of section Mitigation Factors/Workarounds in the advisory\n * Secure the NMS CLIENT/SERVER communication.\u00a0\n * Embedded FOXCST with RADIUS authentication should be avoided.\u00a0\n * Database contains credentials with weak encryption.\n\n\n\n\n"}], "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T02:27:31.978Z"}, "title": "CVE Program Container", "references": [{"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch", "tags": ["x_transferred"]}, {"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084&LanguageCode=en&DocumentPartId=&Action=Launch", "tags": ["x_transferred"]}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-04-10T13:30:48.243722Z", "id": "CVE-2021-40341", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-04-10T13:31:25.498Z"}}]}}