
Cloud Vulnerability DB
A community-led vulnerabilities database
The AGG Software Web Server version 4.0.40.1014 and prior contains a path traversal vulnerability identified as CVE-2021-32964. This vulnerability was discovered and reported to CISA by researcher Michael Heinzl. The affected software is deployed worldwide across multiple critical infrastructure sectors, with the company headquarters located in Canada (CISA Advisory).
The vulnerability is classified as a path traversal attack (CWE-23) that allows an attacker to read arbitrary files from the file system. The vulnerability has been assigned a CVSS v3 base score of 6.5 with the vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N), indicating it is network accessible with low attack complexity and requires no privileges or user interaction (CISA Advisory).
Successful exploitation of this vulnerability could allow attackers to read arbitrary files from the system, potentially exposing sensitive system files and information (CISA Advisory).
AGG Software recommends users update to Web Server plugin version 4.0.42 Build 512 or later. Additionally, CISA recommends implementing defensive measures including minimizing network exposure for control system devices, ensuring systems are not accessible from the Internet, locating control system networks behind firewalls, isolating them from business networks, and using secure methods like VPNs when remote access is required (CISA Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."