{"api_version":"1","generated_at":"2026-04-23T08:05:03+00:00","cve":"CVE-2021-32570","urls":{"html":"https://cve.report/CVE-2021-32570","api":"https://cve.report/api/cve/CVE-2021-32570.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-32570","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-32570"},"summary":{"title":"CVE-2021-32570","description":"In Ericsson Network Manager (ENM) releases before 21.2, users belonging to the same AMOS authorization group can retrieve the data from certain log files. All AMOS users are considered to be highly privileged users in ENM system and all must be previously defined and authorized by the Security Administrator. Those users can access some log’s files, under a common path, and read information stored in the log’s files in order to conduct privilege escalation.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-08-26 00:15:00","updated_at":"2022-09-09 18:36:00"},"problem_types":["CWE-532"],"metrics":[],"references":[{"url":"https://www.ericsson.com","name":"https://www.ericsson.com","refsource":"MISC","tags":[],"title":"Ericsson - Helping to shape a world of communication","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.gruppotim.it/it/footer/red-team.html","name":"https://www.gruppotim.it/it/footer/red-team.html","refsource":"MISC","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-32570","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32570","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"32570","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ericsson","cpe5":"network_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-32570","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Ericsson Network Manager (ENM) releases before 21.2, users belonging to the same AMOS authorization group can retrieve the data from certain log files. All AMOS users are considered to be highly privileged users in ENM system and all must be previously defined and authorized by the Security Administrator. Those users can access some log’s files, under a common path, and read information stored in the log’s files in order to conduct privilege escalation."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.ericsson.com","refsource":"MISC","name":"https://www.ericsson.com"},{"refsource":"MISC","name":"https://www.gruppotim.it/it/footer/red-team.html","url":"https://www.gruppotim.it/it/footer/red-team.html"}]}},"nvd":{"publishedDate":"2022-08-26 00:15:00","lastModifiedDate":"2022-09-09 18:36:00","problem_types":["CWE-532"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.2,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ericsson:network_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"21.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"32570","Ordinal":"207955","Title":"CVE-2021-32570","CVE":"CVE-2021-32570","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"32570","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}