CVE-2021-38469

Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 Patch Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:auvesy:versiondog:*:*:*:*:*:*:*:*

History

28 Oct 2021, 18:52

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.3
v3 : 7.1
CPE cpe:2.3:a:auvesy:versiondog:*:*:*:*:*:*:*:*
References (CONFIRM) https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 - (CONFIRM) https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 - Patch, Third Party Advisory, US Government Resource

22 Oct 2021, 12:43

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-22 12:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-38469

Mitre link : CVE-2021-38469

CVE.ORG link : CVE-2021-38469


JSON object : View

Products Affected

auvesy

  • versiondog
CWE
CWE-427

Uncontrolled Search Path Element