CVE-2021-42538

The affected product is vulnerable to a parameter injection via passphrase, which enables the attacker to supply uncontrolled input.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-278-02 Patch Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:emerson:wireless_1410_gateway_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:emerson:wireless_1410_gateway:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:emerson:wireless_1410d_gateway_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:emerson:wireless_1410d_gateway:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:emerson:wireless_1420_gateway_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:emerson:wireless_1420_gateway:-:*:*:*:*:*:*:*

History

27 Oct 2021, 17:10

Type Values Removed Values Added
References (CONFIRM) https://us-cert.cisa.gov/ics/advisories/icsa-21-278-02 - (CONFIRM) https://us-cert.cisa.gov/ics/advisories/icsa-21-278-02 - Patch, Third Party Advisory, US Government Resource
CPE cpe:2.3:o:emerson:wireless_1410d_gateway_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:emerson:wireless_1420_gateway_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:emerson:wireless_1410d_gateway:*:*:*:*:*:*:*:*
cpe:2.3:o:emerson:wireless_1410_gateway_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:emerson:wireless_1420_gateway:-:*:*:*:*:*:*:*
cpe:2.3:h:emerson:wireless_1410_gateway:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8
CWE CWE-78 CWE-77

22 Oct 2021, 14:33

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-22 14:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-42538

Mitre link : CVE-2021-42538

CVE.ORG link : CVE-2021-42538


JSON object : View

Products Affected

emerson

  • wireless_1410_gateway
  • wireless_1410_gateway_firmware
  • wireless_1420_gateway_firmware
  • wireless_1420_gateway
  • wireless_1410d_gateway_firmware
  • wireless_1410d_gateway
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')