{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T22:37:43.197","vulnerabilities":[{"cve":{"id":"CVE-2021-32794","sourceIdentifier":"security-advisories@github.com","published":"2021-07-26T19:15:07.650","lastModified":"2024-11-21T06:07:45.357","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ArchiSteamFarm is a C# application with primary purpose of idling Steam cards from multiple accounts simultaneously. Due to a bug in ASF code `POST /Api/ASF` ASF API endpoint responsible for updating global ASF config incorrectly removed `IPCPassword` from the resulting config when the caller did not specify it explicitly. Due to the above, it was possible for the user to accidentally remove `IPCPassword` security measure from his IPC interface when updating global ASF config, which exists as part of global config update functionality in ASF-ui. Removal of `IPCPassword` possesses a security risk, as unauthorized users may in result access the IPC interface after such modification. The issue is patched in ASF V5.1.2.4 and future versions. We recommend to manually verify that `IPCPassword` is specified after update, and if not, set it accordingly. In default settings, ASF is configured to allow IPC access from `localhost` only and should not affect majority of users."},{"lang":"es","value":"ArchiSteamFarm es una aplicación en C# con el propósito principal de ralentizar las tarjetas de Steam de múltiples cuentas simultáneamente. Debido a un bug en el código de ASF \"POST /Api/ASF\" el endpoint de la API de ASF responsable de actualizar la configuración global de ASF eliminaba incorrectamente \"IPCPassword\" de la configuración resultante cuando el llamante no lo especificaba explícitamente. Debido a lo anterior, era posible que el usuario eliminara accidentalmente la medida de seguridad \"IPCPassword\" de su interfaz IPC cuando actualizaba la configuración global de ASF, quese presenta como parte de la funcionalidad de actualización de la configuración global en ASF-ui. Una eliminación de \"IPCPassword\" supone un riesgo de seguridad, ya que usuarios no autorizados pueden en consecuencia acceder a la interfaz IPC después de dicha modificación. El problema está parcheado en ASF versiones V5.1.2.4 y futuras versiones. Recomendamos verificar manualmente que se especifica \"IPCPassword\" después de la actualización, y si no es así, configurarlo en consecuencia. En la configuración predeterminada, ASF está configurado para permitir el acceso IPC desde \"localhost\" solamente y no debería afectar a la mayoría de usuarios"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:P","baseScore":6.0,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":6.8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:archisteamfarm_project:archisteamfarm:*:*:*:*:*:*:*:*","versionEndExcluding":"5.1.2.4","matchCriteriaId":"DA4624DB-015C-487B-B6AD-5D6EBFFD98CE"}]}]}],"references":[{"url":"https://github.com/JustArchiNET/ArchiSteamFarm/pull/2379","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/JustArchiNET/ArchiSteamFarm/security/advisories/GHSA-wxx4-66c2-vj2v","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://steamcommunity.com/groups/archiasf/discussions/6/3057365873428498659/","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/JustArchiNET/ArchiSteamFarm/pull/2379","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/JustArchiNET/ArchiSteamFarm/security/advisories/GHSA-wxx4-66c2-vj2v","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://steamcommunity.com/groups/archiasf/discussions/6/3057365873428498659/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}