{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-40341","assignerOrgId":"e383dce4-0c27-4495-91c4-0db157728d17","state":"PUBLISHED","assignerShortName":"Hitachi Energy","dateReserved":"2021-08-31T20:24:21.498Z","datePublished":"2023-01-05T21:26:42.760Z","dateUpdated":"2025-04-10T13:31:25.498Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"FOXMAN-UN","vendor":"Hitachi Energy","versions":[{"status":"affected","version":"FOXMAN-UN R16A"},{"status":"affected","version":"FOXMAN-UN R15B"},{"status":"affected","version":"FOXMAN-UN R15A"},{"status":"affected","version":"FOXMAN-UN R14B"},{"status":"affected","version":"FOXMAN-UN R14A"},{"status":"affected","version":"FOXMAN-UN R11B"},{"status":"affected","version":"FOXMAN-UN R11A"},{"status":"affected","version":"FOXMAN-UN R10C"},{"status":"affected","version":"FOXMAN-UN R9C"}]},{"defaultStatus":"unaffected","product":"UNEM","vendor":"Hitachi Energy","versions":[{"status":"affected","version":"UNEM R16A"},{"status":"affected","version":"UNEM R15B"},{"status":"affected","version":"UNEM R15A"},{"status":"affected","version":"UNEM R14B"},{"status":"affected","version":"UNEM R14A"},{"status":"affected","version":"UNEM R11B"},{"status":"affected","version":"UNEM R11A"},{"status":"affected","version":"UNEM R10C"},{"status":"affected","version":"UNEM R9C"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"K-Businessom AG, Austria"}],"datePublic":"2022-12-13T13:30:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"DES cipher, which has inadequate encryption strength, is used Hitachi Energy FOXMAN-UN to encrypt user credentials used to access the Network Elements. Successful exploitation allows sensitive information to be decrypted easily.&nbsp;<p>This issue affects&nbsp;</p><p></p><ul><li>FOXMAN-UN product: FOXMAN-UN R16A, FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C;&nbsp;</li><li>UNEM product: UNEM R16A, UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C.</li></ul><p></p>List of CPEs:&nbsp;<br><ul><li>cpe:2.3:a:hitachienergy:foxman-un:R16A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R16A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*</li></ul><br>"}],"value":"DES cipher, which has inadequate encryption strength, is used Hitachi Energy FOXMAN-UN to encrypt user credentials used to access the Network Elements. Successful exploitation allows sensitive information to be decrypted easily. This issue affects \n\n\n\n  *  FOXMAN-UN product: FOXMAN-UN R16A, FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C; \n  *  UNEM product: UNEM R16A, UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C.\n\n\n\n\nList of CPEs: \n  *  cpe:2.3:a:hitachienergy:foxman-un:R16A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R16A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*\n\n\n\n"}],"impacts":[{"capecId":"CAPEC-20","descriptions":[{"lang":"en","value":"CAPEC-20 Encryption Brute Forcing"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-326","description":"CWE-326 Inadequate Encryption Strength","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"e383dce4-0c27-4495-91c4-0db157728d17","shortName":"Hitachi Energy","dateUpdated":"2023-01-05T21:26:42.760Z"},"references":[{"url":"https://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch"},{"url":"https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084&LanguageCode=en&DocumentPartId=&Action=Launch"}],"source":{"discovery":"EXTERNAL"},"title":"Weak DES encryption","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\nThe vulnerabilities are partially remediated in FOXMAN-UN R16A or UNEM R16A, the full remediation will be done in the upcoming release (planned).\n<br><br>For immediate recommended mitigation actions if using FOXMAN-UN R16A or UNEM R16A,\nplease refer to the \n\n<span style=\"background-color: rgb(255, 255, 255);\">Database contains credentials with weak encryption</span>\n\nclause of section Mitigation Factors/Workarounds\nin the respective products' advisory.\n<br><br>For immediate recommended mitigation actions if using FOXMAN-UN R15B or UNEM R15B and earlier, please refer to the multiple clauses of section Mitigation Factors/Workarounds in the advisory<br><ul><li>Secure the NMS CLIENT/SERVER communication.&nbsp;</li><li>Embedded FOXCST with RADIUS authentication should be avoided.&nbsp;</li><li>Database contains credentials with weak encryption.\n\n</li></ul>"}],"value":"\nThe vulnerabilities are partially remediated in FOXMAN-UN R16A or UNEM R16A, the full remediation will be done in the upcoming release (planned).\n\n\nFor immediate recommended mitigation actions if using FOXMAN-UN R16A or UNEM R16A,\nplease refer to the \n\nDatabase contains credentials with weak encryption\n\nclause of section Mitigation Factors/Workarounds\nin the respective products' advisory.\n\n\nFor immediate recommended mitigation actions if using FOXMAN-UN R15B or UNEM R15B and earlier, please refer to the multiple clauses of section Mitigation Factors/Workarounds in the advisory\n  *  Secure the NMS CLIENT/SERVER communication. \n  *  Embedded FOXCST with RADIUS authentication should be avoided. \n  *  Database contains credentials with weak encryption.\n\n\n\n\n"}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T02:27:31.978Z"},"title":"CVE Program Container","references":[{"url":"https://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch","tags":["x_transferred"]},{"url":"https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084&LanguageCode=en&DocumentPartId=&Action=Launch","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-10T13:30:48.243722Z","id":"CVE-2021-40341","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-10T13:31:25.498Z"}}]}}