From 7494ddd1fd45acadb2b5928f1f9174575eb508eb Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 1 Dec 2020 14:01:35 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13799.json | 2 +- 2020/4xxx/CVE-2020-4128.json | 56 ++++++++++++++++++++++++++++++++-- 2 files changed, 54 insertions(+), 4 deletions(-) diff --git a/2020/13xxx/CVE-2020-13799.json b/2020/13xxx/CVE-2020-13799.json index 8cf10ba392a..3a88313aa4f 100644 --- a/2020/13xxx/CVE-2020-13799.json +++ b/2020/13xxx/CVE-2020-13799.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Western Digital iNAND devices through 2020-06-03 allow Authentication Bypass via a capture-replay attack." + "value": "Western Digital has identified a security vulnerability in the Replay Protected Memory Block (RPMB) protocol as specified in multiple standards for storage device interfaces, including all versions of eMMC, UFS, and NVMe. The RPMB protocol is specified by industry standards bodies and is implemented by storage devices from multiple vendors to assist host systems in securing trusted firmware. Several scenarios have been identified in which the RPMB state may be affected by an attacker without the knowledge of the trusted component that uses the RPMB feature." } ] }, diff --git a/2020/4xxx/CVE-2020-4128.json b/2020/4xxx/CVE-2020-4128.json index 2e9680dc295..71c7dd8795f 100644 --- a/2020/4xxx/CVE-2020-4128.json +++ b/2020/4xxx/CVE-2020-4128.json @@ -4,14 +4,64 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-4128", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@hcl.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "HCL Domino", + "version": { + "version_data": [ + { + "version_value": "v9" + }, + { + "version_value": "v10" + }, + { + "version_value": "v11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "\"Lockout policy bypass \"" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0085408", + "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0085408" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "HCL Domino is susceptible to a lockout policy bypass vulnerability in the ID Vault service. An unauthenticated attacker could use this vulnerability to mount a brute force attack against the ID Vault service." } ] }