cvelist/2020/13xxx/CVE-2020-13552.json

70 lines
2.3 KiB
JSON
Raw Normal View History

2020-05-26 15:01:39 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-13552",
2021-02-17 19:00:50 +00:00
"ASSIGNER": "talos-cna@cisco.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Advantech",
"version": {
"version_data": [
{
"version_value": "Advantech WebAccess/SCADA 9.0.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2022-04-28 14:36:12 -04:00
"value": "CWE-276: Incorrect Default Permissions"
2021-02-17 19:00:50 +00:00
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169"
}
]
2020-05-26 15:01:39 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2021-02-17 19:00:50 +00:00
"value": "An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via multiple service executables in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege."
2020-05-26 15:01:39 +00:00
}
]
2022-04-18 17:22:54 -04:00
},
"impact": {
"cvss": {
"baseScore": 8.8,
"baseSeverity": "High",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
2020-05-26 15:01:39 +00:00
}
}