First published: Tue Nov 02 2021(Updated: )
Buffer overflow vulnerability in the Transaction Server CLUSTERPRO X 4.3 for Windows and earlier, EXPRESSCLUSTER X 4.3 for Windows and earlier, CLUSTERPRO X 4.3 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 4.3 SingleServerSafe for Windows and earlier allows attacker to remote code execution via a network.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Nec Clusterpro X | >=1.0<=4.3 | |
Nec Clusterpro X Singleserversafe | >=1.0<=4.3 | |
Nec Expresscluster X | >=1.0<=4.3 | |
Nec Expresscluster X Singleserversafe | >=1.0<=4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-20703.
The severity of CVE-2021-20703 is critical with a CVSS score of 9.8.
The software products affected by CVE-2021-20703 are NEC Clusterpro X, NEC Clusterpro X Singleserversafe, NEC Expresscluster X, and NEC Expresscluster X Singleserversafe.
An attacker can exploit CVE-2021-20703 to achieve remote code execution.
You can find more information about CVE-2021-20703 at https://jpn.nec.com/security-info/secinfo/nv21-015_en.html.