cvelist/2020/9xxx/CVE-2020-9474.json

62 lines
1.9 KiB
JSON
Raw Normal View History

2020-02-28 21:01:09 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-05-07 21:01:25 +00:00
"ID": "CVE-2020-9474",
"STATE": "PUBLIC"
2020-02-28 21:01:09 +00:00
},
2020-05-07 21:01:25 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-02-28 21:01:09 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-05-07 21:01:25 +00:00
"value": "The S. Siedle & Soehne SG 150-0 Smart Gateway before 1.2.4 allows remote code execution via the backup functionality in the web frontend. By using an exploit chain, an attacker with access to the network can get root access on the gateway."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://research.hisolutions.com/2020/04/open-the-gates-insecurity-of-cloudless-smart-door-systems/",
"url": "https://research.hisolutions.com/2020/04/open-the-gates-insecurity-of-cloudless-smart-door-systems/"
2020-02-28 21:01:09 +00:00
}
]
}
}