"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-05-29 18:01:27 +00:00
parent b3fa17f285
commit 07956f332b
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743

View File

@ -1,111 +1,111 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"generator": {
"engine": "Vulnogram 0.0.9"
},
"CVE_data_meta": {
"ID": "CVE-2020-12493",
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "",
"TITLE": "Critical Vulnerability in SWARCO CPU LS4000",
"AKA": "",
"STATE": "PUBLIC"
},
"source": {
"defect": [],
"advisory": "VDE-2020-016",
"discovery": "EXTERNAL"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SWARCO",
"product": {
"product_data": [
{
"product_name": "CPU LS4000",
"version": {
"version_data": [
{
"version_name": "Operating System",
"version_affected": "=",
"version_value": "G4...",
"platform": "all"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284 Improper Access Control"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "An open port used for debugging in SWARCOs CPU LS4000 Series with versions starting with G4... grants root access to the device without access control via network.\nA malicious user could use this vulnerability to get access to the device and disturb operations with connected devices."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert.vde.com/de-de/advisories/vde-2020-016",
"name": ""
}
]
},
"configuration": [],
"impact": {
"cvss": {
"version": "3.1",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10,
"baseSeverity": "CRITICAL"
}
},
"exploit": [],
"work_around": [],
"solution": [
{
"lang": "eng",
"value": "SWARCO TRAFFIC SYSTEMS released a patch to fix the vulnerability and close the port. Please contact your SWARCO TRAFFIC SYSTEMS contact person for further information."
}
],
"credit": [
{
"lang": "eng",
"value": "Martin Aman (ProtectEM) reported this vulnerability."
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"generator": {
"engine": "Vulnogram 0.0.9"
},
{
"lang": "eng",
"value": "Coordinated by CERT@VDE."
}
]
}
"CVE_data_meta": {
"ID": "CVE-2020-12493",
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "",
"TITLE": "Critical Vulnerability in SWARCO CPU LS4000",
"AKA": "",
"STATE": "PUBLIC"
},
"source": {
"defect": [],
"advisory": "VDE-2020-016",
"discovery": "EXTERNAL"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SWARCO",
"product": {
"product_data": [
{
"product_name": "CPU LS4000",
"version": {
"version_data": [
{
"version_name": "Operating System",
"version_affected": "=",
"version_value": "G4...",
"platform": "all"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284 Improper Access Control"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "An open port used for debugging in SWARCOs CPU LS4000 Series with versions starting with G4... grants root access to the device without access control via network. A malicious user could use this vulnerability to get access to the device and disturb operations with connected devices."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://cert.vde.com/de-de/advisories/vde-2020-016",
"url": "https://cert.vde.com/de-de/advisories/vde-2020-016"
}
]
},
"configuration": [],
"impact": {
"cvss": {
"version": "3.1",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10,
"baseSeverity": "CRITICAL"
}
},
"exploit": [],
"work_around": [],
"solution": [
{
"lang": "eng",
"value": "SWARCO TRAFFIC SYSTEMS released a patch to fix the vulnerability and close the port. Please contact your SWARCO TRAFFIC SYSTEMS contact person for further information."
}
],
"credit": [
{
"lang": "eng",
"value": "Martin Aman (ProtectEM) reported this vulnerability."
},
{
"lang": "eng",
"value": "Coordinated by CERT@VDE."
}
]
}