Vulnerability Details : CVE-2021-32958
Successful exploitation of this vulnerability on Claroty Secure Remote Access (SRA) Site versions 3.0 through 3.2 allows an attacker with local command line interface access to gain the secret key, subsequently allowing them to generate valid session tokens for the web user interface (UI). With access to the web UI an attacker can access assets managed by the SRA installation and could compromise the installation.
Exploit prediction scoring system (EPSS) score for CVE-2021-32958
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-32958
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
nvd@nist.gov |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
ics-cert@hq.dhs.gov |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
nvd@nist.gov |
CWE ids for CVE-2021-32958
-
A product requires authentication, but the product has an alternate path or channel that does not require authentication.Assigned by: ics-cert@hq.dhs.gov (Secondary)
References for CVE-2021-32958
-
https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-06
Claroty Secure Remote Access Site | CISAThird Party Advisory;US Government Resource
Products affected by CVE-2021-32958
- cpe:2.3:a:claroty:secure_remote_access:*:*:*:*:*:*:*:*