Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://docs.aviatrix.com/Downloads/samlclient.html", "name": "https://docs.aviatrix.com/Downloads/samlclient.html", "tags": ["Product", "Vendor Advisory"], "refsource": "MISC"}, {"url": "https://docs.aviatrix.com/Downloads/samlclient.html#windows-win", "name": "https://docs.aviatrix.com/Downloads/samlclient.html#windows-win", "tags": ["Product", "Vendor Advisory"], "refsource": "MISC"}, {"url": "https://docs.aviatrix.com/HowTos/changelog.html#aviatrix-vpn-client-changelog", "name": "https://docs.aviatrix.com/HowTos/changelog.html#aviatrix-vpn-client-changelog", "tags": ["Release Notes", "Vendor Advisory"], "refsource": "CONFIRM"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Aviatrix VPN Client before 2.14.14 on Windows has an unquoted search path that enables local privilege escalation to the SYSTEM user, if the machine is misconfigured to allow unprivileged users to write to directories that are supposed to be restricted to administrators."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-428"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2021-31776", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "acInsufInfo": false, "impactScore": 10.0, "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}}, "publishedDate": "2021-04-29T01:15Z", "configurations": {"nodes": [{"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:aviatrix:vpn_client:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "2.14.14"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2021-05-13T14:17Z"}