cvelist/2024/3xxx/CVE-2024-3980.json

89 lines
3.0 KiB
JSON
Raw Normal View History

2024-04-19 13:00:33 +00:00
{
2024-08-27 13:00:33 +00:00
"data_version": "4.0",
2024-04-19 13:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-3980",
2024-08-27 13:00:33 +00:00
"ASSIGNER": "cybersecurity@hitachienergy.com",
"STATE": "PUBLIC"
2024-04-19 13:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-08-27 13:00:33 +00:00
"value": "The product allows user input to control or influence paths or file\nnames that are used in filesystem operations, allowing the attacker to access or modify system files or other files that are\ncritical to the application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')",
"cweId": "CWE-88"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Hitachi Energy",
"product": {
"product_data": [
{
"product_name": "MicroSCADA SYS600",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "10.0",
"version_value": "10.5"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch",
"refsource": "MISC",
"name": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
2024-04-19 13:00:33 +00:00
}
]
}
}