2020-01-22 14:01:07 +00:00
{
"CVE_data_meta" : {
2020-07-02 13:01:28 +00:00
"ASSIGNER" : "vuln@krcert.or.kr" ,
2020-01-22 14:01:07 +00:00
"ID" : "CVE-2020-7820" ,
2020-07-02 13:01:28 +00:00
"STATE" : "PUBLIC" ,
"TITLE" : "Tobesoft NEXACRO14/17 ExCommonApiV13 Arbitrary Code Execution Vulnerability"
2020-01-22 14:01:07 +00:00
} ,
2020-07-02 13:01:28 +00:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "NEXACRO14/17 ExCommonApiV13" ,
"version" : {
"version_data" : [
{
"platform" : "Windows OS" ,
"version_affected" : "<" ,
"version_name" : "2019.9.6" ,
"version_value" : "2019.9.6"
}
]
}
}
]
} ,
"vendor_name" : "Tobesoft"
}
]
}
} ,
"credit" : [
{
"lang" : "eng" ,
"value" : "Thanks to Joengun Baek for this vulnerability report."
}
] ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2020-01-22 14:01:07 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2020-07-02 13:01:28 +00:00
"value" : "Nexacro14/17 ExtCommonApiV13 Library under 2019.9.6 version contain a vulnerability that could allow remote attacker to execute arbitrary code by setting the arguments to the vulnerable API. This can be leveraged for code execution by rebooting the victim\u2019s PC"
2020-01-22 14:01:07 +00:00
}
]
2020-07-02 13:01:28 +00:00
} ,
"generator" : {
"engine" : "Vulnogram 0.0.9"
} ,
"impact" : {
"cvss" : {
"attackComplexity" : "LOW" ,
"attackVector" : "LOCAL" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"scope" : "UNCHANGED" ,
"userInteraction" : "REQUIRED" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
"version" : "3.1"
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-20 Improper Input Validation"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM" ,
"url" : "http://support.tobesoft.co.kr/Support/index.html" ,
"name" : "http://support.tobesoft.co.kr/Support/index.html"
} ,
{
"refsource" : "CONFIRM" ,
"url" : "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35491" ,
"name" : "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35491"
}
]
} ,
"source" : {
"discovery" : "EXTERNAL"
2020-01-22 14:01:07 +00:00
}
}