{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T23:09:08.745","vulnerabilities":[{"cve":{"id":"CVE-2021-40350","sourceIdentifier":"cve@mitre.org","published":"2021-09-01T15:15:12.887","lastModified":"2024-11-21T06:23:55.700","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"webctrl.cgi.elf on Christie Digital DWU850-GS V06.46 devices allows attackers to perform any desired action via a crafted query containing an unspecified Cookie header. Authentication bypass can be achieved by including an administrative cookie that the device does not validate."},{"lang":"es","value":"webctrl.cgi.elf en los dispositivos Christie Digital DWU850-GS versión V06.46, permite a atacantes llevar a cabo cualquier acción deseada por medio de una consulta diseñada que contenga un encabezado Cookie no especificada. Una omisión de autenticación puede lograrse al incluir una cookie administrativa que el dispositivo no comprueba"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:christiedigital:dwu850-gs_firmware:06.46:*:*:*:*:*:*:*","matchCriteriaId":"F22BE444-2399-4D88-AEDB-DB6E388C17D1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:christiedigital:dwu850-gs:-:*:*:*:*:*:*:*","matchCriteriaId":"0D5EE0C4-C915-4976-BD59-49E0F07F98BA"}]}]}],"references":[{"url":"https://securityshards.wordpress.com/2021/08/31/cve-pending-christie-dwu850-gs-authentication-bypass/","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://securityshards.wordpress.com/2021/08/31/cve-pending-christie-dwu850-gs-authentication-bypass/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}