Vulnerability Description
FileZen (V3.0.0 to V4.2.7 and V5.0.0 to V5.0.2) allows a remote attacker with administrator rights to execute arbitrary OS commands via unspecified vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Soliton | Filezen | >= 3.0.0, <= 4.2.7 |
Related Weaknesses (CWE)
References
- https://jvn.jp/en/jp/JVN58774946/index.htmlThird Party Advisory
- https://www.soliton.co.jp/support/2021/004334.htmlExploitVendor Advisory
- https://jvn.jp/en/jp/JVN58774946/index.htmlThird Party Advisory
- https://www.soliton.co.jp/support/2021/004334.htmlExploitVendor Advisory
FAQ
What is CVE-2021-20655?
CVE-2021-20655 is a vulnerability with a CVSS score of 7.2 (HIGH). FileZen (V3.0.0 to V4.2.7 and V5.0.0 to V5.0.2) allows a remote attacker with administrator rights to execute arbitrary OS commands via unspecified vectors.
How severe is CVE-2021-20655?
CVE-2021-20655 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-20655?
Check the references section above for vendor advisories and patch information. Affected products include: Soliton Filezen.