A missing authorization vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote, unauthenticated attacker to download a configuration archive. The attacker needs to know or correctly guess the hostname of the target system since the hostname is used as part of the configuration archive file name. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA003.
Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
This CVE is not in the KEV list.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
Vendors | Products |
---|---|
Fatpipeinc |
|
Configuration 1 [-]
AND |
|
Configuration 2 [-]
AND |
|
Configuration 3 [-]
AND |
|
No data.
References
History
Tue, 17 Sep 2024 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | FatPipe software allows unauthenticated configuration download | FatPipe software allows unauthenticated configuration download |
MITRE
Status: PUBLISHED
Assigner: certcc
Published: 2021-12-15T16:14:48.650988Z
Updated: 2024-09-17T04:29:07.048Z
Reserved: 2021-03-01T00:00:00
Link: CVE-2021-27857
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-12-15T20:15:08.057
Modified: 2024-11-21T05:58:39.150
Link: CVE-2021-27857
Redhat
No data.