CVE-2021-38142
Summary
| CVE | CVE-2021-38142 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-09-07 18:15:00 UTC |
| Updated | 2022-07-12 17:42:00 UTC |
| Description | Barco MirrorOp Windows Sender before 2.5.3.65 uses cleartext HTTP and thus allows rogue software upgrades. An attacker on the local network can achieve remote code execution on any computer that tries to update Windows Sender due to the fact that the upgrade mechanism is not secured (is not protected with TLS). |
Risk And Classification
Problem Types: CWE-319
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Barco | Mirrorop Windows Sender | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| TransForm N CMS - Product support - Barco | MISC | www.barco.com | |
| Installer (.msi) for MirrorOp Windows Sender v2.5.3.65 - Barco | MISC | www.barco.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.