{"containers":{"cna":{"affected":[{"product":"Secure Remote Access (SRA) Site","vendor":"Claroty","versions":[{"status":"affected","version":"versions 3.0 through 3.2"}]}],"credits":[{"lang":"en","value":"Alphastrike Labs reported this vulnerability to Claroty."}],"descriptions":[{"lang":"en","value":"Successful exploitation of this vulnerability on Claroty Secure Remote Access (SRA) Site versions 3.0 through 3.2 allows an attacker with local command line interface access to gain the secret key, subsequently allowing them to generate valid session tokens for the web user interface (UI). With access to the web UI an attacker can access assets managed by the SRA installation and could compromise the installation."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-288","description":"CWE-288 Authentication Bypass Using an Alternate Path or Channel","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-05-23T19:34:55.000Z","orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-06"}],"source":{"advisory":"ICSA-21-180-06","discovery":"UNKNOWN"},"title":"Claroty Secure Remote Access Site - Authentication Bypass Using an Alternate Path or Channel","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","ID":"CVE-2021-32958","STATE":"PUBLIC","TITLE":"Claroty Secure Remote Access Site - Authentication Bypass Using an Alternate Path or Channel"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Secure Remote Access (SRA) Site","version":{"version_data":[{"version_affected":"=","version_value":"versions 3.0 through 3.2"}]}}]},"vendor_name":"Claroty"}]}},"credit":[{"lang":"eng","value":"Alphastrike Labs reported this vulnerability to Claroty."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Successful exploitation of this vulnerability on Claroty Secure Remote Access (SRA) Site versions 3.0 through 3.2 allows an attacker with local command line interface access to gain the secret key, subsequently allowing them to generate valid session tokens for the web user interface (UI). With access to the web UI an attacker can access assets managed by the SRA installation and could compromise the installation."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-288 Authentication Bypass Using an Alternate Path or Channel"}]}]},"references":{"reference_data":[{"name":"https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-06","refsource":"MISC","url":"https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-06"}]},"source":{"advisory":"ICSA-21-180-06","discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T23:33:56.077Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-06"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-16T15:51:52.995705Z","id":"CVE-2021-32958","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-16T16:19:02.719Z"}}]},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2021-32958","datePublished":"2022-05-23T19:34:55.000Z","dateReserved":"2021-05-13T00:00:00.000Z","dateUpdated":"2025-04-16T16:19:02.719Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}