{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T01:30:46.536","vulnerabilities":[{"cve":{"id":"CVE-2021-20677","sourceIdentifier":"vultures@jpcert.or.jp","published":"2021-03-26T09:15:11.950","lastModified":"2024-11-21T05:46:59.470","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"UNIVERGE Aspire series PBX (UNIVERGE Aspire WX from 1.00 to 3.51, UNIVERGE Aspire UX from 1.00 to 9.70, UNIVERGE SV9100 from 1.00 to 10.70, and SL2100 from 1.00 to 3.00) allows a remote authenticated attacker to cause system down and a denial of service (DoS) condition by sending a specially crafted command."},{"lang":"es","value":"UNIVERGE Aspire series PBX (UNIVERGE Aspire WX desde versiones 1.00 hasta 3.51, UNIVERGE Aspire UX desde versiones 1.00 hasta 9.70, UNIVERGE SV9100 desde versiones 1.00 hasta 10.70 y SL2100 desde versiones 1.00 hasta 3.00) permite a un atacante autenticado remoto causar la caída del sistema y una denegación de servicio ( DoS) mediante el envío de un comando especialmente diseñado."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":3.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":1.6,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:N/A:P","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:necplatforms:univerge_aspire_wx_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.00","versionEndIncluding":"3.51","matchCriteriaId":"9C1A17B4-9A99-4772-BEE5-D69D6B4B4BEE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:necplatforms:univerge_aspire_wx:-:*:*:*:*:*:*:*","matchCriteriaId":"E57AF072-9F43-4F37-891B-1B68BA1D9C91"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:necplatforms:univerge_aspire_ux_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.00","versionEndIncluding":"9.70","matchCriteriaId":"BE390008-23F2-44BD-863C-C574DD7A97E0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:necplatforms:univerge_aspire_ux:-:*:*:*:*:*:*:*","matchCriteriaId":"A68A0CB3-7B3C-431D-A339-4CF1C5EBC0C6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:necplatforms:univerge_sv9100_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.00","versionEndIncluding":"10.70","matchCriteriaId":"D611FCE0-8B1B-43C3-BBE9-E7FA6801F947"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:necplatforms:univerge_sv9100:-:*:*:*:*:*:*:*","matchCriteriaId":"38FE4F0F-5112-4214-A8E0-A4858F368C69"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:necplatforms:sl2100_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.00","versionEndIncluding":"3.00","matchCriteriaId":"36778BAB-500F-444F-93F4-FBBE28ECDB40"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:necplatforms:sl2100:-:*:*:*:*:*:*:*","matchCriteriaId":"129B972F-8F69-48B8-B2A2-E3AD109EF05F"}]}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN12737530/index.html","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://www.necplatforms.co.jp/en/press/security_adv.html","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"https://jvn.jp/en/jp/JVN12737530/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.necplatforms.co.jp/en/press/security_adv.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}