{"api_version":"1","generated_at":"2026-04-26T20:21:42+00:00","cve":"CVE-2021-34546","urls":{"html":"https://cve.report/CVE-2021-34546","api":"https://cve.report/api/cve/CVE-2021-34546.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-34546","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-34546"},"summary":{"title":"CVE-2021-34546","description":"An unauthenticated attacker with physical access to a computer with NetSetMan Pro before 5.0 installed, that has the pre-logon profile switch button within the Windows logon screen enabled, is able to drop to an administrative shell and execute arbitrary commands as SYSTEM via the \"save log to file\" feature. To accomplish this, the attacker can navigate to cmd.exe.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-06-10 16:15:00","updated_at":"2021-06-22 00:52:00"},"problem_types":["CWE-287"],"metrics":[],"references":[{"url":"https://www.netsetman.com","name":"https://www.netsetman.com","refsource":"MISC","tags":[],"title":"Windows IP Freeware NetSetMan: Network Settings Manager (LAN & WiFi)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2021/Jun/17","name":"20210611 secuvera-SA-2021-01: Privilege Escalation in NetSetMan Pro 4.7.2","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: secuvera-SA-2021-01: Privilege Escalation in NetSetMan Pro\t4.7.2","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://packetstormsecurity.com/files/163097/NetSetManPro-4.7.2-Privilege-Escalation.html","name":"http://packetstormsecurity.com/files/163097/NetSetManPro-4.7.2-Privilege-Escalation.html","refsource":"MISC","tags":[],"title":"NetSetManPro 4.7.2 Privilege Escalation ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.secuvera.de","name":"https://www.secuvera.de","refsource":"MISC","tags":[],"title":"Sicherheitsberatung, Penetrationstests, BSI-Prüfstelle - secuvera GmbH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.secuvera.de/advisories/secuvera-SA-2021-01.txt","name":"https://www.secuvera.de/advisories/secuvera-SA-2021-01.txt","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-34546","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-34546","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"34546","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netsetman","cpe5":"netsetman","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"pro","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-34546","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An unauthenticated attacker with physical access to a computer with NetSetMan Pro before 5.0 installed, that has the pre-logon profile switch button within the Windows logon screen enabled, is able to drop to an administrative shell and execute arbitrary commands as SYSTEM via the \"save log to file\" feature. To accomplish this, the attacker can navigate to cmd.exe."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.secuvera.de/advisories/secuvera-SA-2021-01.txt","refsource":"MISC","name":"https://www.secuvera.de/advisories/secuvera-SA-2021-01.txt"},{"url":"https://www.secuvera.de","refsource":"MISC","name":"https://www.secuvera.de"},{"url":"https://www.netsetman.com","refsource":"MISC","name":"https://www.netsetman.com"},{"refsource":"FULLDISC","name":"20210611 secuvera-SA-2021-01: Privilege Escalation in NetSetMan Pro 4.7.2","url":"http://seclists.org/fulldisclosure/2021/Jun/17"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/163097/NetSetManPro-4.7.2-Privilege-Escalation.html","url":"http://packetstormsecurity.com/files/163097/NetSetManPro-4.7.2-Privilege-Escalation.html"}]}},"nvd":{"publishedDate":"2021-06-10 16:15:00","lastModifiedDate":"2021-06-22 00:52:00","problem_types":["CWE-287"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM"},"exploitabilityScore":0.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netsetman:netsetman:*:*:*:*:pro:*:*:*","versionEndExcluding":"5.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"34546","Ordinal":"210006","Title":"CVE-2021-34546","CVE":"CVE-2021-34546","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"34546","Ordinal":"1","NoteData":"An unauthenticated attacker with physical access to a computer with NetSetMan Pro before 5.0 installed, that has the pre-logon profile switch button within the Windows logon screen enabled, is able to drop to an administrative shell and execute arbitrary commands as SYSTEM via the \"save log to file\" feature. To accomplish this, the attacker can navigate to cmd.exe.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"34546","Ordinal":"2","NoteData":"2021-06-10","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"34546","Ordinal":"3","NoteData":"2021-06-11","Type":"Other","Title":"Modified"}]}}}