#VU67919 HTTP response splitting in Modular Switchgear Monitoring (MSM) - CVE-2021-40336 

 

#VU67919 HTTP response splitting in Modular Switchgear Monitoring (MSM) - CVE-2021-40336

Published: October 5, 2022


Vulnerability identifier: #VU67919
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2021-40336
CWE-ID: CWE-113
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Modular Switchgear Monitoring (MSM)
Software vendor:
Hitachi Energy

Description

The vulnerability allows a remote attacker to perform HTTP splitting attacks.

The vulnerability exists due to software does not corrector process CRLF character sequences. A remote attacker can send specially crafted request containing CRLF sequence and make the application to send a split HTTP response.

Successful exploitation of the vulnerability may allow an attacker perform cache poisoning attack.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links