Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-28209


The specific function in ASUS BMC’s firmware Web management page (Delete video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 4.9, indicating it can be exploited remotely over the network with relatively low complexity without requiring user interaction . The vulnerability impacts confidentiality (data exposure), for affected systems. Impacting 88 products from asus, from asus, from asus and 85 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2021, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2021-04-06T05:15:17.473

Last Modified

2024-11-21T05:59:22.177

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.0

Impact Score

6.9

Weaknesses
  • Type: Secondary
    CWE-22
  • Type: Primary
    CWE-22

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System asus asmb9-ikvm_firmware 1.11.12 Yes
Hardware asus asmb9-ikvm - No
Operating System asus rs720a-e9-rs24-e_firmware 1.10.3 Yes
Hardware asus rs720a-e9-rs24-e - No
Operating System asus rs700a-e9-rs4_firmware 1.10.0 Yes
Hardware asus rs700a-e9-rs4 - No
Operating System asus rs700-e9-rs4_firmware 1.09 Yes
Hardware asus rs700-e9-rs4 - No
Operating System asus esc4000_g4x_firmware 1.11.6 Yes
Hardware asus esc4000_g4x - No
Operating System asus rs700-e9-rs12_firmware 1.11.5 Yes
Hardware asus rs700-e9-rs12 - No
Operating System asus rs100-e10-pi2_firmware 1.13.6 Yes
Hardware asus rs100-e10-pi2 - No
Operating System asus rs300-e10-ps4_firmware 1.13.6 Yes
Hardware asus rs300-e10-ps4 - No
Operating System asus rs300-e10-rs4_firmware 1.13.6 Yes
Hardware asus rs300-e10-rs4 - No
Operating System asus rs500a-e9-ps4_firmware 1.14.1 Yes
Hardware asus rs500a-e9-ps4 - No
Operating System asus rs500a-e9-rs4_firmware 1.14.1 Yes
Hardware asus rs500a-e9-rs4 - No
Operating System asus rs500a-e9_rs4_u_firmware 1.14.1 Yes
Hardware asus rs500a-e9_rs4_u - No
Operating System asus e700_g4_firmware 1.14.1 Yes
Hardware asus e700_g4 - No
Operating System asus ws_c422_pro\/se_firmware 1.14.1 Yes
Hardware asus ws_c422_pro\/se - No
Operating System asus ws_x299_pro\/se_firmware 1.14.1 Yes
Hardware asus ws_x299_pro\/se - No
Operating System asus z11pa-u12_firmware 1.15.1 Yes
Hardware asus z11pa-u12 - No
Operating System asus z11pa-u12\/10g-2s_firmware 1.15.1 Yes
Hardware asus z11pa-u12\/10g-2s - No
Operating System asus knpa-u16_firmware 1.13.4 Yes
Hardware asus knpa-u16 - No
Operating System asus esc4000_dhd_g4_firmware 1.13.7 Yes
Hardware asus esc4000_dhd_g4 - No
Operating System asus esc4000_g4_firmware 1.15.2 Yes
Hardware asus esc4000_g4 - No
Operating System asus rs720q-e9-rs24-s_firmware 1.15.0 Yes
Hardware asus rs720q-e9-rs24-s - No
Operating System asus rs720q-e9-rs8_firmware 1.15.0 Yes
Hardware asus rs720q-e9-rs8 - No
Operating System asus rs720q-e9-rs8-s_firmware 1.15.0 Yes
Hardware asus rs720q-e9-rs8-s - No
Operating System asus z11pa-d8_firmware 1.14.1 Yes
Hardware asus z11pa-d8 - No
Operating System asus z11pa-d8c_firmware 1.14.1 Yes
Hardware asus z11pa-d8c - No
Operating System asus rs720-e9-rs24-u_firmware 1.14.3 Yes
Hardware asus rs720-e9-rs24-u - No
Operating System asus rs720-e9-rs8-g_firmware 1.15.2 Yes
Hardware asus rs720-e9-rs8-g - No
Operating System asus rs500-e9-ps4_firmware 1.15.4 Yes
Hardware asus rs500-e9-ps4 - No
Operating System asus pro_e800_g4_firmware 1.14.2 Yes
Hardware asus pro_e800_g4 - No
Operating System asus rs500-e9-rs4_firmware 1.15.4 Yes
Hardware asus rs500-e9-rs4 - No
Operating System asus rs500-e9-rs4-u_firmware 1.15.4 Yes
Hardware asus rs500-e9-rs4-u - No
Operating System asus rs520-e9-rs12-e_firmware 1.15.3 Yes
Hardware asus rs520-e9-rs12-e - No
Operating System asus rs520-e9-rs8_firmware 1.15.3 Yes
Hardware asus rs520-e9-rs8 - No
Operating System asus esc8000_g4_firmware 1.15.4 Yes
Hardware asus esc8000_g4 - No
Operating System asus esc8000_g4\/10g_firmware 1.15.4 Yes
Hardware asus esc8000_g4\/10g - No
Operating System asus rs720-e9-rs12-e_firmware 1.15.2 Yes
Hardware asus rs720-e9-rs12-e - No
Operating System asus ws_c621e_sage_firmware 1.15.1 Yes
Hardware asus ws_c621e_sage - No
Operating System asus rs500a-e10-ps4_firmware 1.15.2 Yes
Hardware asus rs500a-e10-ps4 - No
Operating System asus rs500a-e10-rs4_firmware 1.15.2 Yes
Hardware asus rs500a-e10-rs4 - No
Operating System asus rs700a-e9-rs12v2_firmware 1.15.1 Yes
Hardware asus rs700a-e9-rs12v2 - No
Operating System asus rs700a-e9-rs4v2_firmware 1.15.1 Yes
Hardware asus rs700a-e9-rs4v2 - No
Operating System asus rs720a-e9-rs12v2_firmware 1.15.2 Yes
Hardware asus rs720a-e9-rs12v2 - No
Operating System asus rs720a-e9-rs24v2_firmware 1.15.1 Yes
Hardware asus rs720a-e9-rs24v2 - No
Operating System asus z11pr-d16_firmware 1.15.3 Yes
Hardware asus z11pr-d16 - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For asus's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.