Дата публикации: | 08.12.2021 |
Дата изменения: | 09.12.2021 |
Всего просмотров: | 777 |
Опасность: | Высокая |
Наличие исправления: | Да |
Количество уязвимостей: | 40 |
CVSSv3.1 рейтинг: | 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C] 4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C] 4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C] 4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C] 4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C] 4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] |
CVE ID: |
CVE-2021-34937 CVE-2021-34930 CVE-2021-34931 CVE-2021-34932 CVE-2021-34933 CVE-2021-34934 CVE-2021-34935 CVE-2021-34936 CVE-2021-34938 CVE-2021-34928 CVE-2021-34939 CVE-2021-34940 CVE-2021-34941 CVE-2021-34942 CVE-2021-34943 CVE-2021-34944 CVE-2021-34945 CVE-2021-34946 CVE-2021-34929 CVE-2021-34927 CVE-2021-34876 CVE-2021-34898 CVE-2021-34877 CVE-2021-34878 CVE-2021-34913 CVE-2021-34885 CVE-2021-34888 CVE-2021-34890 CVE-2021-34891 CVE-2021-34892 CVE-2021-34899 CVE-2021-34926 CVE-2021-34909 CVE-2021-34912 CVE-2021-34920 CVE-2021-34921 CVE-2021-34922 CVE-2021-34923 CVE-2021-34924 CVE-2021-34925 |
Вектор эксплуатации: | Удаленная |
Воздействие: |
Обход ограничений безопасности Компрометация системы |
CWE ID: | Нет данных |
Наличие эксплоита: | Нет данных |
Уязвимые продукты: |
MicroStation 7.x
Bentley View |
Уязвимые версии: | MicroStation версии 10.16.01.56, 10.16.00.80, 10.15.02.11, 10.15.00.75, 10.15.00.74, 10.14.02.01, 10.13.00.41, 10.14.00.109, 10.13.01.01, 10.13.00.48, 10.12.00.43, 10.12.00.42, 10.12.00.40, 10.11.00.39, 10.11.00.42, 10.11.00.36, 10.10.00.28, 10.10.00.32, 10.10.00.23, 10.09.00.24, 10.09.01.02, 10.09.00.26, 10.09.01.01, 10.08.00.41, 10.08.00.39, 10.08.00.37, 10.07.00.39, 10.06.00.38, 10.05.00.43, 10.05.00.40, 10.04.00.49, 10.04.00.46, 10.03.00.30, 10.02.00.39, 10.01.00.13, 10.00.00.25 Bentley View версии 10.16.01.56, 10.16.00.80, 10.15.02.11, 10.15.00.75, 10.15.00.74, 10.14.02.01, 10.13.00.41, 10.14.00.109, 10.13.01.01, 10.13.00.48, 10.12.00.43, 10.12.00.42, 10.12.00.40, 10.11.00.39, 10.11.00.42, 10.11.00.36, 10.10.00.28, 10.10.00.32, 10.10.00.23, 10.09.00.24, 10.09.01.02, 10.09.00.26, 10.09.01.01, 10.08.00.41, 10.08.00.39, 10.08.00.37, 10.07.00.39, 10.06.00.38, 10.05.00.43, 10.05.00.40, 10.04.00.49, 10.04.00.46, 10.03.00.30, 10.02.00.39, 10.01.00.13, 10.00.00.25 |
Описание: | Множественные уязвимости в Bentley View and MicroStation |
Решение: | Установите исправление с сайта производителя. |
Ссылки: |
https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 https://www.zerodayinitiative.com/advisories/ZDI-21-1525/ https://www.zerodayinitiative.com/advisories/ZDI-21-1518/ https://www.zerodayinitiative.com/advisories/ZDI-21-1519/ https://www.zerodayinitiative.com/advisories/ZDI-21-1520/ https://www.zerodayinitiative.com/advisories/ZDI-21-1521/ https://www.zerodayinitiative.com/advisories/ZDI-21-1522/ https://www.zerodayinitiative.com/advisories/ZDI-21-1523/ https://www.zerodayinitiative.com/advisories/ZDI-21-1524/ https://www.zerodayinitiative.com/advisories/ZDI-21-1526/ https://www.zerodayinitiative.com/advisories/ZDI-21-1516/ https://www.zerodayinitiative.com/advisories/ZDI-21-1527/ https://www.zerodayinitiative.com/advisories/ZDI-21-1528/ https://www.zerodayinitiative.com/advisories/ZDI-21-1529/ https://www.zerodayinitiative.com/advisories/ZDI-21-1530/ https://www.zerodayinitiative.com/advisories/ZDI-21-1531/ https://www.zerodayinitiative.com/advisories/ZDI-21-1532/ https://www.zerodayinitiative.com/advisories/ZDI-21-1533/ https://www.zerodayinitiative.com/advisories/ZDI-21-1534/ https://www.zerodayinitiative.com/advisories/ZDI-21-1517/ https://www.zerodayinitiative.com/advisories/ZDI-21-1515/ https://www.zerodayinitiative.com/advisories/ZDI-21-1464/ https://www.zerodayinitiative.com/advisories/ZDI-21-1487/ https://www.zerodayinitiative.com/advisories/ZDI-21-1465/ https://www.zerodayinitiative.com/advisories/ZDI-21-1466/ https://www.zerodayinitiative.com/advisories/ZDI-21-1467/ https://www.zerodayinitiative.com/advisories/ZDI-21-1474/ https://www.zerodayinitiative.com/advisories/ZDI-21-1477/ https://www.zerodayinitiative.com/advisories/ZDI-21-1479/ https://www.zerodayinitiative.com/advisories/ZDI-21-1480/ https://www.zerodayinitiative.com/advisories/ZDI-21-1481/ https://www.zerodayinitiative.com/advisories/ZDI-21-1488/ https://www.zerodayinitiative.com/advisories/ZDI-21-1514/ https://www.zerodayinitiative.com/advisories/ZDI-21-1498/ https://www.zerodayinitiative.com/advisories/ZDI-21-1501/ https://www.zerodayinitiative.com/advisories/ZDI-21-1508/ https://www.zerodayinitiative.com/advisories/ZDI-21-1509/ https://www.zerodayinitiative.com/advisories/ZDI-21-1510/ https://www.zerodayinitiative.com/advisories/ZDI-21-1511/ https://www.zerodayinitiative.com/advisories/ZDI-21-1512/ https://www.zerodayinitiative.com/advisories/ZDI-21-1513/ |