Learn about CVE-2021-41297, a high-severity vulnerability in ECOA BAS controller allowing authenticated users to escalate privileges via plain-text credentials. Follow mitigation steps for enhanced security.
ECOA BAS controller is vulnerable to weak access control mechanism allowing authenticated users to remotely escalate privileges by disclosing credentials of administrative accounts in plain-text.
Understanding CVE-2021-41297
CVE-2021-41297 is a vulnerability in ECOA BAS controller that exposes a weak access control mechanism, potentially leading to unauthorized privilege escalation.
What is CVE-2021-41297?
The CVE-2021-41297 vulnerability in the ECOA BAS controller permits authenticated users to elevate their privileges remotely by uncovering plain-text administrative account credentials.
The Impact of CVE-2021-41297
This vulnerability has a CVSS v3.1 base score of 8.8, indicating a high-severity impact with significant confidentiality, integrity, and availability risks. The attack vector is through the network, requiring low privileges with no user interaction necessary.
Technical Details of CVE-2021-41297
Vulnerability Description
The vulnerability arises from insufficiently protected credentials within the ECOA BAS controller, allowing unauthorized privilege escalation.
Affected Systems and Versions
The following products and versions are affected:
Exploitation Mechanism
Attackers can exploit this vulnerability over the network without user interaction, requiring only low privileges to compromise confidentiality, integrity, and availability.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates