MEDIUM · 5.0

CVE-2021-40336

A vulnerability exists in the http web interface where the web interface does not validate data in an HTTP header. This causes a possible HTTP response splitting, which if exploited could lead an atta...

Vulnerability Description

A vulnerability exists in the http web interface where the web interface does not validate data in an HTTP header. This causes a possible HTTP response splitting, which if exploited could lead an attacker to channel down harmful code into the user’s web browser, such as to steal the session cookies. Thus, an attacker who successfully makes an MSM user who has already established a session to MSM web interface clicks a forged link to the MSM web interface, e.g., the link is sent per E-Mail, could trick the user into downloading malicious software onto his computer. This issue affects: Hitachi Energy MSM V2.2 and prior versions.

CVSS Score

5.0

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
LOW

Affected Products

VendorProductVersions
HitachienergyModular Switchgear Monitoring Firmware<= 2.2.0
HitachienergyModular Switchgear Monitoring-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2021-40336?

CVE-2021-40336 is a vulnerability with a CVSS score of 5.0 (MEDIUM). A vulnerability exists in the http web interface where the web interface does not validate data in an HTTP header. This causes a possible HTTP response splitting, which if exploited could lead an atta...

How severe is CVE-2021-40336?

CVE-2021-40336 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2021-40336?

Check the references section above for vendor advisories and patch information. Affected products include: Hitachienergy Modular Switchgear Monitoring Firmware, Hitachienergy Modular Switchgear Monitoring.