Vulnerability Details : CVE-2021-26639
This vulnerability is caused by the lack of validation of input values for specific functions if WISA Smart Wing CMS. Remote attackers can use this vulnerability to leak all files in the server without logging in system.
Vulnerability category: Input validation
Products affected by CVE-2021-26639
- cpe:2.3:a:wisa:smart_wing_cms:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-26639
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-26639
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
2.8
|
5.2
|
KrCERT/CC |
CWE ids for CVE-2021-26639
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by:
- nvd@nist.gov (Primary)
- vuln@krcert.or.kr (Secondary)
-
The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.Assigned by:
- nvd@nist.gov (Primary)
- vuln@krcert.or.kr (Secondary)
References for CVE-2021-26639
-
https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66875
Third Party Advisory
Jump to