{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T22:20:05.372","vulnerabilities":[{"cve":{"id":"CVE-2021-28913","sourceIdentifier":"cve@mitre.org","published":"2021-09-09T18:15:09.030","lastModified":"2024-11-21T06:00:23.580","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow unauthenticated attackers access to /webif/SecurityModule to validate the so called and hard coded unique 'eibPort String' which acts as the root SSH key passphrase. This is usable and part of an attack chain to gain SSH root access."},{"lang":"es","value":"BAB TECHNOLOGIE GmbH eibPort versiones V3 anteriores a 3.9.1, permite a atacantes no autenticados acceder a /webif/SecurityModule para comprender la llamada y codificada cadena única \"eibPort String\" que actúa como la frase de contraseña de la clave SSH root. Esto es usable y forma parte de una cadena de ataque para conseguir acceso root SSH"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bab-technologie:eibport_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.9.1","matchCriteriaId":"E1608441-C7C0-45B8-8141-8B1A0477749E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:bab-technologie:eibport:v3:*:*:*:*:*:*:*","matchCriteriaId":"36B8476A-E1CC-4C60-9EC1-05AD71A3EF56"}]}]}],"references":[{"url":"https://psytester.github.io/CVE-2021-28913","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://psytester.github.io/CVE-2021-28913","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}