Vulnerability Details : CVE-2021-28175
The Radius configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
Vulnerability category: Overflow
Products affected by CVE-2021-28175
- cpe:2.3:o:asus:z10pr-d16_firmware:1.14.51:*:*:*:*:*:*:*
- cpe:2.3:o:asus:asmb8-ikvm_firmware:1.14.51:*:*:*:*:*:*:*
- cpe:2.3:o:asus:z10pe-d16_ws_firmware:1.14.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-28175
0.35%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-28175
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST | |
4.9
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
1.2
|
3.6
|
NIST | |
4.9
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
1.2
|
3.6
|
TWCERT/CC |
CWE ids for CVE-2021-28175
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by:
- nvd@nist.gov (Primary)
- twcert@cert.org.tw (Secondary)
References for CVE-2021-28175
-
https://www.asus.com/tw/support/callus/
官方支援 | ASUS 台灣Vendor Advisory
-
https://www.twcert.org.tw/tw/cp-132-4543-98220-1.html
TWCERT/CC台灣電腦網路危機處理暨協調中心-ASUS BMC's firmware: buffer overflow - 設定Radius功能Third Party Advisory
-
https://www.asus.com/content/ASUS-Product-Security-Advisory/
ASUS Product Security Advisory | ASUS GlobalVendor Advisory
Jump to