Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-32570
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Ericsson Network Manager (ENM) releases before 21.2, users belonging to the same AMOS authorization group can retrieve the data from certain log files. All AMOS users are considered to be highly privileged users in ENM system and all must be previously defined and authorized by the Security Administrator. Those users can access some log’s files, under a common path, and read information stored in the log’s files in order to conduct privilege escalation.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Ericsson Network Manager 日志信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Ericsson Network Manager是瑞典爱立信(Ericsson)公司的一款网络管理器。涵盖网络的监控、故障排除、配置、自动化和优化。 Ericsson Network Manager(ENM) 21.2之前的版本存在安全漏洞,该漏洞源于所有处于同一个AMOS授权组的用户都被认为是ENM系统中的高权限用户,所有用户必须事先由安全管理员定义并授权。这些用户可以在一个公共路径下访问一些日志文件,并读取存储在日志文件中的信息,以便进行特权升级。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2021-32570
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-32570
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-32570

No comments yet


Leave a comment