First published: Tue Nov 02 2021(Updated: )
Buffer overflow vulnerability in the Transaction Server CLUSTERPRO X 4.3 for Windows and earlier, EXPRESSCLUSTER X 4.3 for Windows and earlier, CLUSTERPRO X 4.3 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 4.3 SingleServerSafe for Windows and earlier allows attacker to remote code execution via a network.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Nec Clusterpro X | >=1.0<=4.3 | |
Nec Clusterpro X Singleserversafe | >=1.0<=4.3 | |
Nec Expresscluster X | >=1.0<=4.3 | |
Nec Expresscluster X Singleserversafe | >=1.0<=4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20702 is a buffer overflow vulnerability in the Transaction Server CLUSTERPRO X, EXPRESSCLUSTER X, CLUSTERPRO X SingleServerSafe, and EXPRESSCLUSTER X SingleServerSafe for Windows.
The severity of CVE-2021-20702 is critical with a CVSS score of 9.8.
The affected software versions are NEC Clusterpro X (1.0 to 4.3), NEC Clusterpro X Singleserversafe (1.0 to 4.3), NEC Expresscluster X (1.0 to 4.3), and NEC Expresscluster X Singleserversafe (1.0 to 4.3) for Windows.
The CWE ID for CVE-2021-20702 is CWE-119 and CWE-120.
To fix the vulnerability, it is recommended to update the affected software to a version above 4.3 or apply the necessary patches provided by NEC.