{"api_version":"1","generated_at":"2026-05-13T11:01:17+00:00","cve":"CVE-2021-43983","urls":{"html":"https://cve.report/CVE-2021-43983","api":"https://cve.report/api/cve/CVE-2021-43983.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-43983","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-43983"},"summary":{"title":"CVE-2021-43983","description":"WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to multiple stack-based buffer overflow instances while parsing project files, which may allow an attacker to execute arbitrary code.","state":"PUBLIC","assigner":"ics-cert@hq.dhs.gov","published_at":"2021-12-13 16:15:00","updated_at":"2022-02-28 15:20:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-038/","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-038/","refsource":"MISC","tags":[],"title":"ZDI-22-038 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-039/","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-039/","refsource":"MISC","tags":[],"title":"ZDI-22-039 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-045/","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-045/","refsource":"MISC","tags":[],"title":"ZDI-22-045 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-044/","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-044/","refsource":"MISC","tags":[],"title":"ZDI-22-044 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-043/","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-043/","refsource":"MISC","tags":[],"title":"ZDI-22-043 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-042/","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-042/","refsource":"MISC","tags":[],"title":"ZDI-22-042 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-034/","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-034/","refsource":"MISC","tags":[],"title":"ZDI-22-034 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-035/","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-035/","refsource":"MISC","tags":[],"title":"ZDI-22-035 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-047/","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-047/","refsource":"MISC","tags":[],"title":"ZDI-22-047 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-046/","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-046/","refsource":"MISC","tags":[],"title":"ZDI-22-046 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-21-343-02","name":"https://www.cisa.gov/uscert/ics/advisories/icsa-21-343-02","refsource":"MISC","tags":[],"title":"WECON LeviStudioU | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-036/","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-036/","refsource":"MISC","tags":[],"title":"ZDI-22-036 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-037/","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-037/","refsource":"MISC","tags":[],"title":"ZDI-22-037 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-041/","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-041/","refsource":"MISC","tags":[],"title":"ZDI-22-041 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-040/","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-040/","refsource":"MISC","tags":[],"title":"ZDI-22-040 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-43983","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43983","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"43983","vulnerable":"1","versionEndIncluding":"2019-09-21","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"we-con","cpe5":"levistudiou","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","DATE_PUBLIC":"2021-12-09T22:34:00.000Z","ID":"CVE-2021-43983","STATE":"PUBLIC","TITLE":"WECON LeviStudioU"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"LeviStudioU","version":{"version_data":[{"version_affected":"<=","version_name":"All","version_value":"2019-09-21"}]}}]},"vendor_name":"WECON"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to multiple stack-based buffer overflow instances while parsing project files, which may allow an attacker to execute arbitrary code."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-121 Stack-based Buffer Overflow"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://www.cisa.gov/uscert/ics/advisories/icsa-21-343-02","name":"https://www.cisa.gov/uscert/ics/advisories/icsa-21-343-02"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-046/","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-046/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-040/","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-040/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-043/","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-043/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-036/","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-036/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-037/","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-037/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-039/","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-039/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-044/","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-044/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-042/","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-042/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-035/","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-035/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-034/","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-034/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-047/","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-047/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-041/","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-041/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-038/","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-038/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-22-045/","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-045/"}]},"source":{"advisory":"ICSA-21-343-02","discovery":"UNKNOWN"},"work_around":[{"lang":"eng","value":"WECON has not responded to requests to work with CISA to mitigate this vulnerability. Users of this affected product are invited to contact WECON technical support for additional information. CISA also recommends users take the following measures to protect themselves from social engineering attacks:"}]},"nvd":{"publishedDate":"2021-12-13 16:15:00","lastModifiedDate":"2022-02-28 15:20:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:we-con:levistudiou:*:*:*:*:*:*:*:*","versionEndIncluding":"2019-09-21","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"43983","Ordinal":"221610","Title":"CVE-2021-43983","CVE":"CVE-2021-43983","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"43983","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}