{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T04:25:26.976","vulnerabilities":[{"cve":{"id":"CVE-2021-35001","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2024-05-07T23:15:14.120","lastModified":"2025-04-11T14:50:03.303","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"BMC Track-It! GetData Missing Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of BMC Track-It!. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the GetData endpoint. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-14527."},{"lang":"es","value":"¡BMC Track-It! Vulnerabilidad de divulgación de información de autorización faltante de GetData. Esta vulnerabilidad permite a atacantes remotos revelar información confidencial sobre las instalaciones afectadas de BMC Track-It!. Se requiere autenticación para aprovechar esta vulnerabilidad. La falla específica existe dentro del endpoint GetData. El problema se debe a la falta de autorización antes de permitir el acceso a la funcionalidad. Un atacante puede aprovechar esta vulnerabilidad para revelar las credenciales almacenadas, lo que provocaría un mayor compromiso. Era ZDI-CAN-14527."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":1.4}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:track-it\\!:20.19.01:*:*:*:*:*:*:*","matchCriteriaId":"74E8F32E-A350-4EF5-ACD2-CF001101F474"},{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:track-it\\!:20.19.02:*:*:*:*:*:*:*","matchCriteriaId":"9F31ED78-C6B7-4BB4-AB79-F7AE38546BBA"},{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:track-it\\!:20.19.03:*:*:*:*:*:*:*","matchCriteriaId":"80B5F6EB-E001-4D1F-8428-99AF9DC3D4B3"},{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:track-it\\!:20.20.01:*:*:*:*:*:*:*","matchCriteriaId":"8D2C30FF-FF7C-4F8C-ACB8-A3BC3CFE1EAC"},{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:track-it\\!:20.20.02:*:*:*:*:*:*:*","matchCriteriaId":"9F8B4BD9-9197-49C7-9E1D-EEA831E0CCF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:track-it\\!:20.20.03:*:*:*:*:*:*:*","matchCriteriaId":"DFA184EF-A951-4E16-B11B-EE7A6456D974"},{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:track-it\\!:20.21.01:*:*:*:*:*:*:*","matchCriteriaId":"5A0E5F78-3CA7-4E92-B714-09E2FCC51DB7"}]}]}],"references":[{"url":"https://community.bmc.com/s/article/Security-vulnerabilities-patched-in-Track-It","source":"zdi-disclosures@trendmicro.com","tags":["Vendor Advisory"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-001/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]},{"url":"https://community.bmc.com/s/article/Security-vulnerabilities-patched-in-Track-It","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-001/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}