// For flags

CVE-2021-36718

SYNEL - eharmonynew / Synel Reports version 8.0.2 Default credentials , Security miscommunication , Sensetive data exposure

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

SYNEL - eharmonynew / Synel Reports - The attacker can log in to the system with default credentials and export a report of eharmony system with sensetive data (Employee name, Employee ID number, Working hours etc') The vulnerabilety has been addressed and fixed on version 11. Default credentials , Security miscommunication , Sensetive data exposure vulnerability in Synel Reports of SYNEL eharmonynew, Synel Reports allows an attacker to log into the system with default credentials. This issue affects: SYNEL eharmonynew, Synel Reports 8.0.2 version 11 and prior versions.

SYNEL - eharmonynew / Synel Reports - El atacante puede entrar en el sistema con credenciales por defecto y exportar un informe del sistema eharmony con datos confidenciales (nombre del empleado, número de identificación del empleado, horas de trabajo, etc) La vulnerabilidad ha sido abordada y corregida en la versión 11. Credenciales por defecto , Error de seguridad , Vulnerabilidad de exposición de datos confidenciales en Synel Reports de SYNEL eharmonynew, Synel Reports permite a un atacante iniciar sesión en el sistema con credenciales por defecto. Este problema afecta a: SYNEL eharmonynew, Synel Reports versión 8.0.2 versión 11 y versiones anteriores

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-07-12 CVE Reserved
  • 2021-12-08 CVE Published
  • 2023-07-01 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-287: Improper Authentication
CAPEC
References (1)
URL Tag Source
https://www.gov.il/en/departments/faq/cve_advisories Third Party Advisory
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Synel
Search vendor "Synel"
Eharmonynew
Search vendor "Synel" for product "Eharmonynew"
< 11.0
Search vendor "Synel" for product "Eharmonynew" and version " < 11.0"
-
Affected
Synel
Search vendor "Synel"
Synel Reports
Search vendor "Synel" for product "Synel Reports"
8.0.2
Search vendor "Synel" for product "Synel Reports" and version "8.0.2"
-
Affected