Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:zte:zxhn_hs562_firmware:1.0.0.0b2.0000:*:*:*:*:*:*:*", "matchCriteriaId": "24F3CB00-7212-4F3A-928B-F0278ADF6085", "vulnerable": true}, {"criteria": "cpe:2.3:o:zte:zxhn_hs562_firmware:1.0.0.0b3.0000:*:*:*:*:*:*:*", "matchCriteriaId": "9494CC2D-9E39-43C4-B21D-FFE658A9EBF0", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:zte:zxhn_hs562:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FD6DC75-6AAF-44A3-95A5-C19D34C56B47", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "A smart camera product of ZTE is impacted by a permission and access control vulnerability. Due to the defect of user permission management by the cloud-end app, users whose sharing permissions have been revoked can still control the camera, such as restarting the camera, restoring factory settings, etc.. This affects ZXHN HS562 V1.0.0.0B2.0000, V1.0.0.0B3.0000E"}, {"lang": "es", "value": "Un producto de c\u00e1mara inteligente de ZTE est\u00e1 afectado por una vulnerabilidad de control de permisos y acceso. Debido al defecto de la gesti\u00f3n de permisos de usuario por parte de la aplicaci\u00f3n en la nube, los usuarios cuyos permisos de compartici\u00f3n han sido revocados pueden seguir controlando la c\u00e1mara, como reiniciar la c\u00e1mara, restaurar los ajustes de f\u00e1brica, etc. Esto afecta al producto ZXHN HS562 en las versiones V1.0.0.0B2.0000, V1.0.0B3.0000E"}], "id": "CVE-2021-21736", "lastModified": "2024-11-21T05:48:54.530", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:C", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 8.5, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-06-10T12:15:08.490", "references": [{"source": "psirt@zte.com.cn", "tags": ["Vendor Advisory"], "url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1015964"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1015964"}], "sourceIdentifier": "psirt@zte.com.cn", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-276"}], "source": "nvd@nist.gov", "type": "Primary"}]}