Vulnerability Description
All versions of CEVAS prior to 1.01.46 do not sufficiently validate user-controllable input and could allow a user to bypass authentication and retrieve data with specially crafted SQL queries.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Johnsoncontrols | Cevas | < 1.01.46 |
Related Weaknesses (CWE)
References
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-05Third Party AdvisoryUS Government Resource
- https://www.johnsoncontrols.com/cyber-solutions/security-advisoriesVendor Advisory
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-05Third Party AdvisoryUS Government Resource
- https://www.johnsoncontrols.com/cyber-solutions/security-advisoriesVendor Advisory
FAQ
What is CVE-2021-36206?
CVE-2021-36206 is a vulnerability with a CVSS score of 10.0 (CRITICAL). All versions of CEVAS prior to 1.01.46 do not sufficiently validate user-controllable input and could allow a user to bypass authentication and retrieve data with specially crafted SQL queries.
How severe is CVE-2021-36206?
CVE-2021-36206 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-36206?
Check the references section above for vendor advisories and patch information. Affected products include: Johnsoncontrols Cevas.