6.8
CVSSv2

CVE-2021-44564

Published: 06/01/2022 Updated: 14/01/2022
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

A security vulnerability originally reported in the SYNC2101 product, and applicable to specific sub-families of SYNC devices, allows an malicious user to download the configuration file used in the device and apply a modified configuration file back to the device. The attack requires network access to the SYNC device and knowledge of its IP address. The attack exploits the unsecured communication channel used between the administration tool Easyconnect and the SYNC device (in the affected family of SYNC products).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kalkitech sync241-m1_firmware

kalkitech sync241-m2_firmware

kalkitech sync241-m4_firmware

kalkitech sync261-m1_firmware

kalkitech sync2000-m1_firmware

kalkitech sync2000-m2_firmware

kalkitech sync2000-m4_firmware

kalkitech sync2101-m1_firmware

kalkitech sync2101-m2_firmware

kalkitech sync2101-m6_firmware

kalkitech sync2101-m7_firmware

kalkitech sync2101-m8_firmware

kalkitech sync2111-m2_firmware

kalkitech sync2111-m3_firmware

kalkitech sync3000-m1_firmware

kalkitech sync3000-m2_firmware

kalkitech sync3000-m3_firmware

kalkitech sync3000-m4_firmware

kalkitech sync3000-m12_firmware

kalkitech sync221-m1_firmware