Risk | High |
Patch available | YES |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2021-32945 CVE-2021-32953 CVE-2021-32949 CVE-2021-32933 CVE-2021-32957 CVE-2021-32937 CVE-2021-32961 |
CWE-ID | CWE-326 CWE-89 CWE-22 CWE-77 CWE-426 CWE-209 CWE-434 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
MDT AutoSave Other software / Other software solutions AutoSave for System Platform (A4SP) Other software / Other software solutions |
Vendor | MDT Software |
Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU54632
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32945
CWE-ID:
CWE-326 - Inadequate Encryption Strength
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a weak encryption algorithm. A remote attacker can decipher the encryption and gain access to the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMDT AutoSave: 7.00 - 7.04
AutoSave for System Platform (A4SP): 5.00
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-189-02
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54633
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32953
CWE-ID:
CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMDT AutoSave: 7.00 - 7.04
AutoSave for System Platform (A4SP): 5.00
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-189-02
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54634
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32949
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can replace an existing file with a malicious file.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMDT AutoSave: 7.00 - 7.04
AutoSave for System Platform (A4SP): 5.00
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-189-02
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54635
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32933
CWE-ID:
CWE-77 - Command injection
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary commands on the target system.
The vulnerability exists due to improper input validation. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMDT AutoSave: 7.00 - 7.04
AutoSave for System Platform (A4SP): 5.00
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-189-02
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54636
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32957
CWE-ID:
CWE-426 - Untrusted Search Path
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to uncontrolled search path element. A remote attacker can perform a binary hijacking attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMDT AutoSave: 7.00 - 7.04
AutoSave for System Platform (A4SP): 5.00
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-189-02
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54637
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32937
CWE-ID:
CWE-209 - Information Exposure Through an Error Message
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote attacker can gain knowledge of a session temporary working folder where the getfile and putfile commands are used.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMDT AutoSave: 7.00 - 7.04
AutoSave for System Platform (A4SP): 5.00
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-189-02
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54638
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32961
CWE-ID:
CWE-434 - Unrestricted Upload of File with Dangerous Type
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insufficient validation of file during file upload within the getfile function. A remote attacker can execute an unzip command and place a malicious .exe file in one of the locations the function looks for and get execution capabilities.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMDT AutoSave: 7.00 - 7.04
AutoSave for System Platform (A4SP): 5.00
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-189-02
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.