{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T15:52:38.051","vulnerabilities":[{"cve":{"id":"CVE-2021-37102","sourceIdentifier":"psirt@huawei.com","published":"2021-11-23T16:15:09.980","lastModified":"2024-11-21T06:14:39.203","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"There is a command injection vulnerability in CMA service module of FusionCompute product when processing the default certificate file. The software constructs part of a command using external special input from users, but the software does not sufficiently validate the user input. Successful exploit could allow the attacker to inject certain commands to the system. Affected product versions include: FusionCompute 6.0.0, 6.3.0, 6.3.1, 6.5.0, 6.5.1, 8.0.0."},{"lang":"es","value":"Se presenta una vulnerabilidad de inyección de comandos en el módulo de servicio CMA del producto FusionCompute cuando es procesado el archivo de certificado predeterminado. El software construye parte de un comando usando una entrada especial externa de usuarios, pero el software no comprueba suficientemente la entrada del usuario. Una explotación con éxito podría permitir al atacante inyectar determinados comandos en el sistema. Las versiones del producto afectadas son: FusionCompute versiones 6.0.0, 6.3.0, 6.3.1, 6.5.0, 6.5.1, 8.0.0"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:huawei:fusioncompute:6.0.0:*:*:*:*:*:*:*","matchCriteriaId":"A044DA05-E139-4572-8562-09A4A54E8D0B"},{"vulnerable":true,"criteria":"cpe:2.3:a:huawei:fusioncompute:6.3.0:*:*:*:*:*:*:*","matchCriteriaId":"319C5290-36D1-4A96-80D3-18978161557D"},{"vulnerable":true,"criteria":"cpe:2.3:a:huawei:fusioncompute:6.3.1:*:*:*:*:*:*:*","matchCriteriaId":"9EFA1D96-F198-4424-8F5A-1C7DFF3F42AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:huawei:fusioncompute:6.5.0:*:*:*:*:*:*:*","matchCriteriaId":"EB149F98-77DF-40C3-A307-21D7B9BCB6DA"},{"vulnerable":true,"criteria":"cpe:2.3:a:huawei:fusioncompute:6.5.1:*:*:*:*:*:*:*","matchCriteriaId":"916284A3-6895-4F2C-9426-240F4EB7336F"},{"vulnerable":true,"criteria":"cpe:2.3:a:huawei:fusioncompute:8.0.0:*:*:*:*:*:*:*","matchCriteriaId":"5D251AD0-6227-4190-815F-B526F40D8A43"}]}]}],"references":[{"url":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210922-01-cmd-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210922-01-cmd-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}