{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T16:16:54.373","vulnerabilities":[{"cve":{"id":"CVE-2021-30642","sourceIdentifier":"secure@symantec.com","published":"2021-04-27T15:15:07.587","lastModified":"2024-11-21T06:04:21.270","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An input validation flaw in the Symantec Security Analytics web UI 7.2 prior 7.2.7, 8.1, prior to 8.1.3-NSR3, 8.2, prior to 8.2.1-NSR2 or 8.2.2 allows a remote, unauthenticated attacker to execute arbitrary OS commands on the target with elevated privileges."},{"lang":"es","value":"Un fallo de comprobación de entrada en la Interfaz de Usuario web de Symantec Security Analytics 7.2 anterior a versión 7.2.7, 8.1, anterior a versión 8.1.3-NSR3, 8.2, anterior a versión 8.2.1-NSR2 o 8.2.2, permite a un atacante remoto no autenticado ejecutar un Sistema Operativo arbitrario comandos en el destino con privilegios elevados"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:security_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"7.2","versionEndExcluding":"7.2.7","matchCriteriaId":"3A5351FB-9C96-4F7C-A62A-0589B2175475"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:security_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"8.1","versionEndExcluding":"8.1.3-nsr3","matchCriteriaId":"16947737-D883-4138-B28F-A70320DB8A7C"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:security_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"8.2","versionEndExcluding":"8.2.2","matchCriteriaId":"7404068A-A0CE-4C69-9236-CCDC2BFE32F5"}]}]}],"references":[{"url":"https://support.broadcom.com/security-advisory/content/security-advisories/0/SYMSA17969","source":"secure@symantec.com","tags":["Third Party Advisory"]},{"url":"https://support.broadcom.com/security-advisory/content/security-advisories/0/SYMSA17969","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}