// For flags

CVE-2021-31989

 

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A user with permission to log on to the machine hosting the AXIS Device Manager client could under certain conditions extract a memory dump from the built-in Windows Task Manager application. The memory dump may potentially contain credentials of connected Axis devices.

Un usuario con permiso para iniciar sesión en la máquina que aloja el cliente AXIS Device Manager podría en determinadas condiciones, extraer un volcado de memoria de la aplicación integrada Windows Task Manager. El volcado de memoria puede contener potencialmente unas credenciales de los dispositivos Axis conectados.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-04-30 CVE Reserved
  • 2021-08-25 CVE Published
  • 2023-03-18 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-312: Cleartext Storage of Sensitive Information
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Axis
Search vendor "Axis"
Device Manager
Search vendor "Axis" for product "Device Manager"
>= 5.00.010 <= 5.16.063
Search vendor "Axis" for product "Device Manager" and version " >= 5.00.010 <= 5.16.063"
-
Affected