U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-42631

Change History

Initial Analysis by NIST 2/02/2022 2:16:01 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:* versions up to (including) 20.0.1304
          *cpe:2.3:a:printerlogic:web_stack:*:*:*:*:*:*:*:* versions up to (excluding) 19.1.1.13
          *cpe:2.3:a:printerlogic:web_stack:19.1.1.13:-:*:*:*:*:*:*
          *cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp2:*:*:*:*:*:*
          *cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp3-3:*:*:*:*:*:*
          *cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp9:*:*:*:*:*:*
     OR
          cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-502
Changed Reference Type
http://printerlogic.com No Types Assigned
http://printerlogic.com Vendor Advisory
Changed Reference Type
https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints No Types Assigned
https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints Press/Media Coverage, Third Party Advisory
Changed Reference Type
https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html No Types Assigned
https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html Third Party Advisory
Changed Reference Type
https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite No Types Assigned
https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite Press/Media Coverage, Third Party Advisory
Changed Reference Type
https://www.printerlogic.com/security-bulletin/ No Types Assigned
https://www.printerlogic.com/security-bulletin/ Vendor Advisory
Changed Reference Type
https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite No Types Assigned
https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite Press/Media Coverage, Third Party Advisory
Changed Reference Type
https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/ No Types Assigned
https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/ Exploit, Press/Media Coverage, Third Party Advisory