{"api_version":"1","generated_at":"2026-04-22T19:59:40+00:00","cve":"CVE-2021-32966","urls":{"html":"https://cve.report/CVE-2021-32966","api":"https://cve.report/api/cve/CVE-2021-32966.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-32966","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-32966"},"summary":{"title":"CVE-2021-32966","description":"Philips Interoperability Solution XDS versions 2.5 through 3.11 and 2018-1 through 2021-1 are vulnerable to clear text transmission of sensitive information when configured to use LDAP via TLS and where the domain controller returns LDAP referrals, which may allow an attacker to remotely read LDAP system credentials.","state":"PUBLIC","assigner":"ics-cert@hq.dhs.gov","published_at":"2022-05-25 14:15:00","updated_at":"2022-06-08 14:29:00"},"problem_types":["CWE-319"],"metrics":[],"references":[{"url":"https://www.cisa.gov/uscert/ics/advisories/icsma-21-175-01","name":"https://www.cisa.gov/uscert/ics/advisories/icsma-21-175-01","refsource":"MISC","tags":[],"title":"Philips Interoperability Solution XDS | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-32966","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32966","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Philips reported this vulnerability to CISA.","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"32966","vulnerable":"1","versionEndIncluding":"2021-1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"philips","cpe5":"interoperability_solution_xds","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"32966","vulnerable":"1","versionEndIncluding":"3.11","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"philips","cpe5":"interoperability_solution_xds","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","ID":"CVE-2021-32966","STATE":"PUBLIC","TITLE":"Philips Interoperability Solution XDS - Clear Text Transmission of Sensitive Information"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Interoperability Solution XDS","version":{"version_data":[{"version_affected":"=","version_value":"2.5 through 3.11"},{"version_affected":"=","version_value":"2018-1 through 2021-1"}]}}]},"vendor_name":"Philips"}]}},"credit":[{"lang":"eng","value":"Philips reported this vulnerability to CISA."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Philips Interoperability Solution XDS versions 2.5 through 3.11 and 2018-1 through 2021-1 are vulnerable to clear text transmission of sensitive information when configured to use LDAP via TLS and where the domain controller returns LDAP referrals, which may allow an attacker to remotely read LDAP system credentials."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.7,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-319 Cleartext Transmission of Sensitive Information"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://www.cisa.gov/uscert/ics/advisories/icsma-21-175-01","name":"https://www.cisa.gov/uscert/ics/advisories/icsma-21-175-01"}]},"source":{"advisory":"ICSMA-21-175-01","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-05-25 14:15:00","lastModifiedDate":"2022-06-08 14:29:00","problem_types":["CWE-319"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:philips:interoperability_solution_xds:*:*:*:*:*:*:*:*","versionStartIncluding":"2018-1","versionEndIncluding":"2021-1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:philips:interoperability_solution_xds:*:*:*:*:*:*:*:*","versionStartIncluding":"2.5","versionEndIncluding":"3.11","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"32966","Ordinal":"208356","Title":"CVE-2021-32966","CVE":"CVE-2021-32966","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"32966","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}