{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T20:39:04.750","vulnerabilities":[{"cve":{"id":"CVE-2021-43442","sourceIdentifier":"cve@mitre.org","published":"2022-04-11T19:15:08.413","lastModified":"2024-11-21T06:29:13.983","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Logic Flaw vulnerability exists in i3 International Inc Annexxus Camera V5.2.0 build 150317 (Ax46), V5.0.9 build 151106 (Ax68), and V5.0.9 build 150615 (Ax78) due to a failure to allow the creation of more than one administrator account; however, this can be bypassed by parameter maniulation using PUT and DELETE and by calling the 'UserPermission' endpoint with the ID of created account and set it to 'admin' userType, successfully adding a second administrative account."},{"lang":"es","value":"Se presenta una vulnerabilidad de fallo lógico en i3 International Inc Annexxus Camera versiones V5.2.0 build 150317 (Ax46), V5.0.9 build 151106 (Ax68), y V5.0. 9 build 150615 (Ax78), debido a un fallo al permitir la creación de más de una cuenta de administrador; sin embargo, esto puede omitirse mediante la manipulación de parámetros usando PUT y DELETE y llamando al endpoint \"UserPermission\" con el ID de la cuenta creada y estableciéndolo como userType \"admin\", añadiendo con éxito una segunda cuenta administrativa"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:i3international:ax46_firmware:5.2.0:*:*:*:*:*:*:*","matchCriteriaId":"E9A271DB-68C8-4E4A-830C-13E19A57A0B2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:i3international:ax46:-:*:*:*:*:*:*:*","matchCriteriaId":"0FF3F449-B851-40CD-B78F-BBCDFE10A94F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:i3international:ax68_firmware:5.0.9:*:*:*:*:*:*:*","matchCriteriaId":"185497CC-04B3-4625-B108-B880442FEB04"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:i3international:ax68:-:*:*:*:*:*:*:*","matchCriteriaId":"5D4363AA-28B2-4C9A-8A38-E79F2E0A94B2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:i3international:ax78_firmware:5.0.9:*:*:*:*:*:*:*","matchCriteriaId":"E4310F53-0F21-4F44-A020-97A5CF1C20EB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:i3international:ax78:-:*:*:*:*:*:*:*","matchCriteriaId":"374BB372-BE56-4B7D-8A26-CABD32A3DB1B"}]}]}],"references":[{"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5688.php","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5688.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}