{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T03:55:32.097","vulnerabilities":[{"cve":{"id":"CVE-2021-39244","sourceIdentifier":"cve@mitre.org","published":"2021-08-23T05:15:08.283","lastModified":"2024-11-21T06:19:00.323","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Authenticated Semi-Blind Command Injection (via Parameter Injection) exists on Altus Nexto, Nexto Xpress, and Hadron Xtorm devices via the getlogs.cgi tcpdump feature. This affects Nexto NX3003 1.8.11.0, Nexto NX3004 1.8.11.0, Nexto NX3005 1.8.11.0, Nexto NX3010 1.8.3.0, Nexto NX3020 1.8.3.0, Nexto NX3030 1.8.3.0, Nexto NX5100 1.8.11.0, Nexto NX5101 1.8.11.0, Nexto NX5110 1.1.2.8, Nexto NX5210 1.1.2.8, Nexto Xpress XP300 1.8.11.0, Nexto Xpress XP315 1.8.11.0, Nexto Xpress XP325 1.8.11.0, Nexto Xpress XP340 1.8.11.0, and Hadron Xtorm HX3040 1.7.58.0."},{"lang":"es","value":"Se presenta una Inyección de Comandos Semiclandestina Autenticada (mediante inyección de parámetros) en los dispositivos Altus Nexto, Nexto Xpress y Hadron Xtorm por medio de la función tcpdump en el archivo getlogs.cgi. Esto afecta a Nexto NX3003 versión 1.8.11.0, Nexto NX3004 versión 1.8.11.0, Nexto NX3005 versión 1.8.11.0, Nexto NX3010 versión 1.8.3.0, Nexto NX3020 versión 1.8.3.0, Nexto NX3030 versión 1.8.3.0, Nexto NX5100 versión 1.8.11.0, Nexto NX5101 versión 1.8.11. 0, Nexto NX5110 versión 1.1.2.8, Nexto NX5210 versión 1.1.2.8, Nexto Xpress XP300 versión 1.8.11.0, Nexto Xpress XP315 versión 1.8.11.0, Nexto Xpress XP325 versión 1.8.11.0, Nexto Xpress XP340 versión 1.8.11.0 y Hadron Xtorm HX3040 versión 1.7.58.0."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:nexto_nx3003_firmware:1.8.11.0:*:*:*:*:*:*:*","matchCriteriaId":"7A5848CF-312E-4053-B838-27CEDF388204"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:nexto_nx3003:-:*:*:*:*:*:*:*","matchCriteriaId":"50B12BD3-2585-4504-A61F-7FF929604269"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:nexto_nx3004_firmware:1.8.11.0:*:*:*:*:*:*:*","matchCriteriaId":"3152151F-5313-4016-BA72-68B26F9AD5DC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:nexto_nx3004:-:*:*:*:*:*:*:*","matchCriteriaId":"5360B24F-4EFA-404D-95AF-6F9A60064594"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:nexto_nx3005_firmware:1.8.11.0:*:*:*:*:*:*:*","matchCriteriaId":"4FF5DDB4-4E37-4F02-BA5C-9FB6B9DEFDF0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:nexto_nx3005:-:*:*:*:*:*:*:*","matchCriteriaId":"B0C06EAE-E56C-405C-8E01-807F21F8E959"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:nexto_nx3010_firmware:1.8.3.0:*:*:*:*:*:*:*","matchCriteriaId":"6A8ADE03-CCFF-4E02-A800-0F493BBF893C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:nexto_nx3010:-:*:*:*:*:*:*:*","matchCriteriaId":"AB8D19E7-4346-4190-9C1E-8E8DE27F1097"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:nexto_nx3020_firmware:1.8.3.0:*:*:*:*:*:*:*","matchCriteriaId":"28992202-3C21-4C5C-BEC3-190DDCA4BDB2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:nexto_nx3020:-:*:*:*:*:*:*:*","matchCriteriaId":"8848DA89-0ECA-4CB7-AC13-E08CD3FCBBC8"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:nexto_nx3030_firmware:1.8.3.0:*:*:*:*:*:*:*","matchCriteriaId":"115AA6E9-89A1-49D7-967C-5C41F114C166"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:nexto_nx3030:-:*:*:*:*:*:*:*","matchCriteriaId":"14DF8FB7-9BED-4195-A496-26087C4B0E53"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:nexto_nx5100_firmware:1.8.11.0:*:*:*:*:*:*:*","matchCriteriaId":"DA3F5402-EA1C-46EC-9AC1-BC38C4904B18"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:nexto_nx5100:-:*:*:*:*:*:*:*","matchCriteriaId":"548AF25D-1275-4881-8740-E5A0EA7374C2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:nexto_nx5101_firmware:1.8.11.0:*:*:*:*:*:*:*","matchCriteriaId":"E1431A2A-DC65-4B6B-AB7D-35BFDA97555B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:nexto_nx5101:-:*:*:*:*:*:*:*","matchCriteriaId":"E11B7273-046E-458F-AE2E-A5AEFABDA577"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:nexto_nx5110_firmware:1.1.2.8:*:*:*:*:*:*:*","matchCriteriaId":"CEEA3B8D-1E80-4A56-9840-150DCAA7A192"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:nexto_nx5110:-:*:*:*:*:*:*:*","matchCriteriaId":"8DBF577A-EA51-41B8-915C-75EDBEE2AAE5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:nexto_nx5210_firmware:1.1.2.8:*:*:*:*:*:*:*","matchCriteriaId":"66F25371-1B64-4D5A-A4BD-D1F90CB2B7C3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:nexto_nx5210:-:*:*:*:*:*:*:*","matchCriteriaId":"571E4999-3708-4F95-8436-ACFAF7F13A37"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:nexto_xpress_xp300_firmware:1.8.11.0:*:*:*:*:*:*:*","matchCriteriaId":"641542F1-E275-42D6-B0E2-EF677DC7E760"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:nexto_xpress_xp300:-:*:*:*:*:*:*:*","matchCriteriaId":"AA8AA07F-E8FE-4599-A65B-71E2416EFBF0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:nexto_xpress_xp315_firmware:1.8.11.0:*:*:*:*:*:*:*","matchCriteriaId":"3CBAB5F2-E302-494D-9D81-938DCF9510B3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:nexto_xpress_xp315:-:*:*:*:*:*:*:*","matchCriteriaId":"7AAB7834-2BBF-40C5-9671-4696C889ADA1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:nexto_xpress_xp325_firmware:1.8.11.0:*:*:*:*:*:*:*","matchCriteriaId":"B81B3D6D-3F37-45DE-82F9-DA32925F965F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:nexto_xpress_xp325:-:*:*:*:*:*:*:*","matchCriteriaId":"4B9D2F20-49F8-4BBE-81C8-C7B7ED58B524"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:nexto_xpress_xp340_firmware:1.8.11.0:*:*:*:*:*:*:*","matchCriteriaId":"035270A8-485C-4109-A61F-A5B22B63D3BF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:nexto_xpress_xp340:-:*:*:*:*:*:*:*","matchCriteriaId":"F09EAD1C-9A59-4E82-B267-AF99BDFDDBD8"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altus:hadron_xtorm_hx3040_firmware:1.7.58.0:*:*:*:*:*:*:*","matchCriteriaId":"671F0A89-017A-4552-8408-7E39C01421E6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:altus:hadron_xtorm_hx3040:-:*:*:*:*:*:*:*","matchCriteriaId":"A81D05A0-BC2F-40AD-8E06-AF5E0D1B85AB"}]}]}],"references":[{"url":"https://seclists.org/fulldisclosure/2021/Aug/21","source":"cve@mitre.org","tags":["Exploit","Mailing List","Third Party Advisory"]},{"url":"https://www.altus.com.br/","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://seclists.org/fulldisclosure/2021/Aug/21","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mailing List","Third Party Advisory"]},{"url":"https://www.altus.com.br/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}