First published: Tue Nov 02 2021(Updated: )
Buffer overflow vulnerability in the compatible API with previous versions CLUSTERPRO X 4.3 for Windows and earlier, EXPRESSCLUSTER X 4.3 for Windows and earlier, CLUSTERPRO X 4.3 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 4.3 SingleServerSafe for Windows and earlier allows attacker to remote code execution via a network.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Nec Clusterpro X | >=1.0<=4.3 | |
Nec Clusterpro X Singleserversafe | >=1.0<=4.3 | |
Nec Expresscluster X | >=1.0<=4.3 | |
Nec Expresscluster X Singleserversafe | >=1.0<=4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20704 is a buffer overflow vulnerability found in various NEC software products, including CLUSTERPRO X 4.3 and EXPRESSCLUSTER X 4.3 for Windows.
CVE-2021-20704 has a severity rating of 9.8, which is considered critical.
CLUSTERPRO X 4.3 and earlier, EXPRESSCLUSTER X 4.3 and earlier, CLUSTERPRO X 4.3 SingleServerSafe and earlier, EXPRESSCLUSTER X 4.3 SingleServerSafe and earlier are affected by CVE-2021-20704.
An attacker can exploit CVE-2021-20704 by triggering a buffer overflow in the compatible API with previous versions of the affected software products.
You can find more information about CVE-2021-20704 at the following link: [CVE-2021-20704](https://jpn.nec.com/security-info/secinfo/nv21-015_en.html).