{"containers":{"cna":{"affected":[{"product":"BMC firmware for Z10PR-D16","vendor":"ASUS","versions":[{"status":"affected","version":"1.14.51"}]},{"product":"BMC firmware for ASMB8-iKVM","vendor":"ASUS","versions":[{"status":"affected","version":"1.14.51"}]},{"product":"BMC firmware for Z10PE-D16 WS","vendor":"ASUS","versions":[{"status":"affected","version":"1.14.2"}]}],"datePublic":"2021-04-06T00:00:00.000Z","descriptions":[{"lang":"en","value":"The Web Set Media Image function in ASUS BMC’s firmware Web management page does not filter the specific parameter. As obtaining the administrator permission, remote attackers can launch command injection to execute command arbitrary."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78 OS Command Injection","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-04-06T05:02:20.000Z","orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.asus.com/content/ASUS-Product-Security-Advisory/"},{"tags":["x_refsource_MISC"],"url":"https://www.asus.com/tw/support/callus/"},{"tags":["x_refsource_MISC"],"url":"https://www.twcert.org.tw/tw/cp-132-4573-aa336-1.html"}],"solutions":[{"lang":"en","value":"update BMC's firmwares to the following versions:\nZ10PR-D16 1.16.1\nASMB8-iKVM 1.16.1\nZ10PE-D16 WS 1.16.1"}],"source":{"advisory":"TVN-202103030","discovery":"EXTERNAL"},"title":"ASUS BMC's firmware: command injection - Web Set Media Image function","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"AKA":"TWCERT/CC","ASSIGNER":"cve@cert.org.tw","DATE_PUBLIC":"2021-04-06T02:48:00.000Z","ID":"CVE-2021-28203","STATE":"PUBLIC","TITLE":"ASUS BMC's firmware: command injection - Web Set Media Image function"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"BMC firmware for Z10PR-D16","version":{"version_data":[{"version_affected":"=","version_value":"1.14.51"}]}},{"product_name":"BMC firmware for ASMB8-iKVM","version":{"version_data":[{"version_affected":"=","version_value":"1.14.51"}]}},{"product_name":"BMC firmware for Z10PE-D16 WS","version":{"version_data":[{"version_affected":"=","version_value":"1.14.2"}]}}]},"vendor_name":"ASUS"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Web Set Media Image function in ASUS BMC’s firmware Web management page does not filter the specific parameter. As obtaining the administrator permission, remote attackers can launch command injection to execute command arbitrary."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-78 OS Command Injection"}]}]},"references":{"reference_data":[{"name":"https://www.asus.com/content/ASUS-Product-Security-Advisory/","refsource":"MISC","url":"https://www.asus.com/content/ASUS-Product-Security-Advisory/"},{"name":"https://www.asus.com/tw/support/callus/","refsource":"MISC","url":"https://www.asus.com/tw/support/callus/"},{"name":"https://www.twcert.org.tw/tw/cp-132-4573-aa336-1.html","refsource":"MISC","url":"https://www.twcert.org.tw/tw/cp-132-4573-aa336-1.html"}]},"solution":[{"lang":"en","value":"update BMC's firmwares to the following versions:\nZ10PR-D16 1.16.1\nASMB8-iKVM 1.16.1\nZ10PE-D16 WS 1.16.1"}],"source":{"advisory":"TVN-202103030","discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T21:40:12.667Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.asus.com/content/ASUS-Product-Security-Advisory/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.asus.com/tw/support/callus/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.twcert.org.tw/tw/cp-132-4573-aa336-1.html"}]}]},"cveMetadata":{"assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","assignerShortName":"twcert","cveId":"CVE-2021-28203","datePublished":"2021-04-06T05:02:20.959Z","dateReserved":"2021-03-12T00:00:00.000Z","dateUpdated":"2024-09-16T23:51:25.462Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}