cvelist/2020/8xxx/CVE-2020-8539.json

67 lines
2.2 KiB
JSON
Raw Normal View History

2020-02-03 15:01:20 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-12-01 18:02:21 +00:00
"ID": "CVE-2020-8539",
"STATE": "PUBLIC"
2020-02-03 15:01:20 +00:00
},
2020-12-01 18:02:21 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-02-03 15:01:20 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-12-01 18:02:21 +00:00
"value": "Kia Motors Head Unit with Software version: SOP.003.30.18.0703, SOP.005.7.181019, and SOP.007.1.191209 may allow an attacker to inject unauthorized commands, by executing the micomd executable deamon, to trigger unintended functionalities. In addition, this executable may be used by an attacker to inject commands to generate CAN frames that are sent into the M-CAN bus (Multimedia CAN bus) of the vehicle."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://sowhat.iit.cnr.it/pdf/IIT-20-2020.pdf",
"url": "https://sowhat.iit.cnr.it/pdf/IIT-20-2020.pdf"
},
{
"refsource": "MISC",
"name": "https://gist.github.com/gianpyc/4dc8b0d0c29774a10a97785711e325c3",
"url": "https://gist.github.com/gianpyc/4dc8b0d0c29774a10a97785711e325c3"
2020-02-03 15:01:20 +00:00
}
]
}
}