CVE-2021-31399: n/a in n/a
On 2N Access Unit 2.0 2.31.0.40.5 devices, an attacker can pose as the web relay for a man-in-the-middle attack.
AI Analysis
Technical Summary
CVE-2021-31399 is a medium-severity vulnerability affecting 2N Access Unit devices running firmware version 2.0 2.31.0.40.5. The vulnerability allows an attacker to impersonate the web relay component of the device, enabling a man-in-the-middle (MITM) attack. In such an attack, the adversary intercepts and potentially alters communications between the legitimate user and the access control device. The CVSS 3.1 base score is 4.6, reflecting a vulnerability that requires low attack complexity and no privileges but does require user interaction. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same or a connected network segment, such as a local network or VPN. The impact primarily affects availability (A:L) and confidentiality (C:L) but not integrity (I:N). This suggests that the attacker can disrupt service and gain limited access to sensitive information but cannot modify data or configurations directly. The vulnerability does not require authentication, increasing its risk, but user interaction is necessary, possibly involving the user accessing a malicious web relay or interface controlled by the attacker. No known exploits in the wild have been reported, and no patches or vendor advisories are linked in the provided data. The lack of detailed vendor or product information limits the ability to assess the full scope but the mention of 2N Access Unit devices indicates the affected product is a physical access control system used for secure entry management.
Potential Impact
For European organizations, especially those using 2N Access Unit devices for physical access control, this vulnerability could lead to unauthorized interception of access control communications. This might allow attackers to disrupt access control operations, potentially causing denial of service or unauthorized monitoring of access events. Confidentiality of access logs or user credentials transmitted via the web relay could be compromised, increasing the risk of targeted attacks or social engineering. Organizations in sectors with high physical security requirements—such as government, critical infrastructure, finance, and transportation—may face operational disruptions and increased risk of physical breaches. The requirement for user interaction and adjacency limits remote exploitation but does not eliminate risk in environments where attackers can gain network proximity, such as through compromised internal devices or guest networks. The absence of known exploits suggests limited active threat but also underscores the importance of proactive mitigation to prevent future exploitation.
Mitigation Recommendations
1. Network Segmentation: Isolate 2N Access Unit devices on dedicated VLANs or network segments with strict access controls to limit attacker proximity. 2. Use Encrypted Communication: Ensure that all communications with the access control devices use strong encryption protocols (e.g., HTTPS with valid certificates) to prevent interception or impersonation of web relays. 3. Firmware Updates: Regularly check for and apply firmware updates from 2N or authorized vendors, even though no patch link is provided here, to address this and other vulnerabilities. 4. Monitor Network Traffic: Implement network monitoring to detect unusual traffic patterns or attempts to impersonate devices within the local network. 5. User Awareness: Train users to recognize suspicious prompts or interactions that could facilitate MITM attacks, reducing the risk from required user interaction. 6. Access Control Hardening: Limit administrative access to the devices and use multi-factor authentication where possible to reduce the impact of intercepted credentials. 7. Incident Response Planning: Prepare for potential access control disruptions by having contingency plans to maintain physical security if devices are compromised.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2021-31399: n/a in n/a
Description
On 2N Access Unit 2.0 2.31.0.40.5 devices, an attacker can pose as the web relay for a man-in-the-middle attack.
AI-Powered Analysis
Technical Analysis
CVE-2021-31399 is a medium-severity vulnerability affecting 2N Access Unit devices running firmware version 2.0 2.31.0.40.5. The vulnerability allows an attacker to impersonate the web relay component of the device, enabling a man-in-the-middle (MITM) attack. In such an attack, the adversary intercepts and potentially alters communications between the legitimate user and the access control device. The CVSS 3.1 base score is 4.6, reflecting a vulnerability that requires low attack complexity and no privileges but does require user interaction. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same or a connected network segment, such as a local network or VPN. The impact primarily affects availability (A:L) and confidentiality (C:L) but not integrity (I:N). This suggests that the attacker can disrupt service and gain limited access to sensitive information but cannot modify data or configurations directly. The vulnerability does not require authentication, increasing its risk, but user interaction is necessary, possibly involving the user accessing a malicious web relay or interface controlled by the attacker. No known exploits in the wild have been reported, and no patches or vendor advisories are linked in the provided data. The lack of detailed vendor or product information limits the ability to assess the full scope but the mention of 2N Access Unit devices indicates the affected product is a physical access control system used for secure entry management.
Potential Impact
For European organizations, especially those using 2N Access Unit devices for physical access control, this vulnerability could lead to unauthorized interception of access control communications. This might allow attackers to disrupt access control operations, potentially causing denial of service or unauthorized monitoring of access events. Confidentiality of access logs or user credentials transmitted via the web relay could be compromised, increasing the risk of targeted attacks or social engineering. Organizations in sectors with high physical security requirements—such as government, critical infrastructure, finance, and transportation—may face operational disruptions and increased risk of physical breaches. The requirement for user interaction and adjacency limits remote exploitation but does not eliminate risk in environments where attackers can gain network proximity, such as through compromised internal devices or guest networks. The absence of known exploits suggests limited active threat but also underscores the importance of proactive mitigation to prevent future exploitation.
Mitigation Recommendations
1. Network Segmentation: Isolate 2N Access Unit devices on dedicated VLANs or network segments with strict access controls to limit attacker proximity. 2. Use Encrypted Communication: Ensure that all communications with the access control devices use strong encryption protocols (e.g., HTTPS with valid certificates) to prevent interception or impersonation of web relays. 3. Firmware Updates: Regularly check for and apply firmware updates from 2N or authorized vendors, even though no patch link is provided here, to address this and other vulnerabilities. 4. Monitor Network Traffic: Implement network monitoring to detect unusual traffic patterns or attempts to impersonate devices within the local network. 5. User Awareness: Train users to recognize suspicious prompts or interactions that could facilitate MITM attacks, reducing the risk from required user interaction. 6. Access Control Hardening: Limit administrative access to the devices and use multi-factor authentication where possible to reduce the impact of intercepted credentials. 7. Incident Response Planning: Prepare for potential access control disruptions by having contingency plans to maintain physical security if devices are compromised.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2021-04-15T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839d93e182aa0cae2b72fb6
Added to database: 5/30/2025, 4:13:50 PM
Last enriched: 7/8/2025, 3:28:42 PM
Last updated: 8/11/2025, 3:20:15 PM
Views: 11
Related Threats
CVE-2025-8285: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54525: CWE-1287: Improper Validation of Specified Type of Input in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54478: CWE-306: Missing Authentication for Critical Function in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54463: CWE-754: Improper Check for Unusual or Exceptional Conditions in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54458: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.