Vulnerability Description
An attacker can gain knowledge of a session temporary working folder where the getfile and putfile commands are used in MDT AutoSave versions prior to v6.02.06. An attacker can leverage this knowledge to provide a malicious command to the working directory where the read and write activity can be initiated.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Auvesy-Mdt | Autosave | < 6.02.06 |
| Auvesy-Mdt | Autosave For System Platform | < 4.01 |
Related Weaknesses (CWE)
References
- https://www.cisa.gov/uscert/ics/advisories/icsa-21-189-02Third Party AdvisoryUS Government Resource
- https://www.cisa.gov/uscert/ics/advisories/icsa-21-189-02Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2021-32937?
CVE-2021-32937 is a vulnerability with a CVSS score of 7.5 (HIGH). An attacker can gain knowledge of a session temporary working folder where the getfile and putfile commands are used in MDT AutoSave versions prior to v6.02.06. An attacker can leverage this knowledge...
How severe is CVE-2021-32937?
CVE-2021-32937 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32937?
Check the references section above for vendor advisories and patch information. Affected products include: Auvesy-Mdt Autosave, Auvesy-Mdt Autosave For System Platform.