Risk | High |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2021-40333 CVE-2021-40334 |
CWE-ID | CWE-521 CWE-431 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
XMC20 Hardware solutions / Routers & switches, VoIP, GSM, etc FOX61x Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | Hitachi Energy |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU58653
Risk: Low
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-40333
CWE-ID:
CWE-521 - Weak Password Requirements
Exploit availability: No
DescriptionThe vulnerability allows an attacker to perform brute-force attack and guess the password.
The vulnerability exists due to weak password requirements. A remote administrator can perform a brute-force attack and gain unauthorized access to the DCN routing configuration.
MitigationInstall updates from vendor's website.
Vulnerable software versionsXMC20: before R15A
FOX61x: before R15A
CPE2.3 External linkshttps://search.abb.com/library/Download.aspx?DocumentID=8DBD000062&LanguageCode=en&DocumentPartId=&Action=Launch
https://search.abb.com/library/Download.aspx?DocumentID=8DBD000069&LanguageCode=en&DocumentPartId=&Action=Launch
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58661
Risk: High
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-40334
CWE-ID:
CWE-431 - Missing Handler
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the implementation of the proprietary management protocol. A remote attacker can cause a disruption to the NMS and NE communication.
MitigationInstall updates from vendor's website.
Vulnerable software versionsXMC20: before R15A
FOX61x: before R15A
CPE2.3 External linkshttps://search.abb.com/library/Download.aspx?DocumentID=8DBD000062&LanguageCode=en&DocumentPartId=&Action=Launch
https://search.abb.com/library/Download.aspx?DocumentID=8DBD000069&LanguageCode=en&DocumentPartId=&Action=Launch
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.