CVE-2021-39244
high-risk
Published 2021-08-23
Authenticated Semi-Blind Command Injection (via Parameter Injection) exists on Altus Nexto, Nexto Xpress, and Hadron Xtorm devices via the getlogs.cgi tcpdump feature. This affects Nexto NX3003 1.8.11.0, Nexto NX3004 1.8.11.0, Nexto NX3005 1.8.11.0, Nexto NX3010 1.8.3.0, Nexto NX3020 1.8.3.0, Nexto NX3030 1.8.3.0, Nexto NX5100 1.8.11.0, Nexto NX5101 1.8.11.0, Nexto NX5110 1.1.2.8, Nexto NX5210 1.1.2.8, Nexto Xpress XP300 1.8.11.0, Nexto Xpress XP315 1.8.11.0, Nexto Xpress XP325 1.8.11.0, Nexto Xpress XP340 1.8.11.0, and Hadron Xtorm HX3040 1.7.58.0.
Do I need to act?
~
5.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (15)
Nexto Nx3003 Firmware
Nexto Nx3004 Firmware
Nexto Nx3005 Firmware
Nexto Nx3010 Firmware
Nexto Nx3020 Firmware
Nexto Nx3030 Firmware
Nexto Nx5100 Firmware
Nexto Nx5101 Firmware
Nexto Nx5110 Firmware
Nexto Nx5210 Firmware
Nexto Xpress Xp300 Firmware
Nexto Xpress Xp315 Firmware
Nexto Xpress Xp325 Firmware
Nexto Xpress Xp340 Firmware
Hadron Xtorm Hx3040 Firmware
Affected Vendors
References (4)
Vendor Advisory
https://www.altus.com.br/
Vendor Advisory
https://www.altus.com.br/
56
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
8/34 · Low
Exposure
18/34 · Moderate