{"containers":{"cna":{"affected":[{"platforms":["Windows"],"product":"Genian NAC Suite V4.0","vendor":"Genians Co., Ltd","versions":[{"lessThanOrEqual":"4.0.145.0831","status":"affected","version":"unspecified","versionType":"custom"}]},{"platforms":["Windows"],"product":"Genian NAC V5.0 & Genian NAC Suite V5.0","vendor":"Genians Co., Ltd","versions":[{"lessThanOrEqual":"5.0.42.0827","status":"affected","version":"unspecified","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"An remote code execution vulnerability due to SSTI vulnerability and insufficient file name parameter validation was discovered in Genian NAC. Remote attackers are able to execute arbitrary malicious code with SYSTEM privileges on all connected nodes in NAC through this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":9.6,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-03-25T18:02:39.000Z","orgId":"cdd7a122-0fae-4202-8d86-14efbacc2863","shortName":"krcert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66580"}],"source":{"discovery":"UNKNOWN"},"title":"Genian NAC remote code execution vulnerability","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"vuln@krcert.or.kr","ID":"CVE-2021-26622","STATE":"PUBLIC","TITLE":"Genian NAC remote code execution vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Genian NAC Suite V4.0","version":{"version_data":[{"platform":"Windows","version_affected":"<=","version_value":"4.0.145.0831"}]}}]},"vendor_name":"Genians Co., Ltd"},{"product":{"product_data":[{"product_name":"Genian NAC V5.0 & Genian NAC Suite V5.0","version":{"version_data":[{"platform":"Windows","version_affected":"<=","version_value":"5.0.42.0827"}]}}]},"vendor_name":"Genians Co., Ltd"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An remote code execution vulnerability due to SSTI vulnerability and insufficient file name parameter validation was discovered in Genian NAC. Remote attackers are able to execute arbitrary malicious code with SYSTEM privileges on all connected nodes in NAC through this vulnerability."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":9.6,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-20 Improper Input Validation"}]}]},"references":{"reference_data":[{"name":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66580","refsource":"MISC","url":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66580"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T20:26:25.560Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66580"}]}]},"cveMetadata":{"assignerOrgId":"cdd7a122-0fae-4202-8d86-14efbacc2863","assignerShortName":"krcert","cveId":"CVE-2021-26622","datePublished":"2022-03-25T18:02:39.000Z","dateReserved":"2021-02-03T00:00:00.000Z","dateUpdated":"2024-08-03T20:26:25.560Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}