diff --git a/2020/11xxx/CVE-2020-11896.json b/2020/11xxx/CVE-2020-11896.json index 5d209179004..9065832577d 100644 --- a/2020/11xxx/CVE-2020-11896.json +++ b/2020/11xxx/CVE-2020-11896.json @@ -67,6 +67,11 @@ "refsource": "MISC", "name": "https://jsof-tech.com/vulnerability-disclosure-policy/" }, + { + "refsource": "CERT-VN", + "name": "VU#257161", + "url": "https://www.kb.cert.org/vuls/id/257161" + }, { "refsource": "MISC", "name": "https://www.jsof-tech.com/ripple20/", @@ -91,6 +96,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf" + }, + { + "refsource": "HP", + "name": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us" } ] } diff --git a/2020/12xxx/CVE-2020-12027.json b/2020/12xxx/CVE-2020-12027.json index ede6183f05e..baaebe83f31 100644 --- a/2020/12xxx/CVE-2020-12027.json +++ b/2020/12xxx/CVE-2020-12027.json @@ -1,18 +1,105 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", + "DATE_PUBLIC": "2020-06-18T00:00:00.000Z", "ID": "CVE-2020-12027", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Rockwell Automation FactoryTalk View SE" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "FactoryTalk View SE", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "all versions" + } + ] + } + } + ] + }, + "vendor_name": "Rockwell Automation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Trend Micro\u2019s Zero Day Initiative reported these vulnerabilities to Rockwell Automation" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "All versions of FactoryTalk View SE disclose the hostnames and file paths for certain files within the system. A remote, authenticated attacker may be able to leverage this information for reconnaissance efforts. Rockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05" + }, + { + "refsource": "MISC", + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944", + "name": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Rockwell Automation has released new versions of the affected products to mitigate the reported vulnerabilities. Affected users who are not able to apply the latest update are encouraged to seek additional mitigations or workarounds from the vendor\u2019s published guidelines in their security advisory.\nRockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs." + } + ], + "source": { + "advisory": "ICSA-20-170-05 Rockwell Automation FactoryTalk View SE", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12028.json b/2020/12xxx/CVE-2020-12028.json index 75930329f77..f6eb39858c0 100644 --- a/2020/12xxx/CVE-2020-12028.json +++ b/2020/12xxx/CVE-2020-12028.json @@ -1,18 +1,105 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", + "DATE_PUBLIC": "2020-06-18T00:00:00.000Z", "ID": "CVE-2020-12028", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Rockwell Automation FactoryTalk View SE" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "FactoryTalk View SE", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "all versions" + } + ] + } + } + ] + }, + "vendor_name": "Rockwell Automation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Trend Micro\u2019s Zero Day Initiative reported these vulnerabilities to Rockwell Automation" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of FactoryTalk View SEA remote, an authenticated attacker may be able to utilize certain handlers to interact with the data on the remote endpoint since those handlers do not enforce appropriate permissions. Rockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "PERMISSIONS, PRIVILEGES, AND ACCESS CONTROLS CWE-264" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05" + }, + { + "refsource": "MISC", + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944", + "name": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Rockwell Automation has released new versions of the affected products to mitigate the reported vulnerabilities. Affected users who are not able to apply the latest update are encouraged to seek additional mitigations or workarounds from the vendor\u2019s published guidelines in their security advisory.\nRockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs." + } + ], + "source": { + "advisory": "ICSA-20-170-05 Rockwell Automation FactoryTalk View SE", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12031.json b/2020/12xxx/CVE-2020-12031.json index 75f5782f06b..10662981088 100644 --- a/2020/12xxx/CVE-2020-12031.json +++ b/2020/12xxx/CVE-2020-12031.json @@ -1,18 +1,105 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", + "DATE_PUBLIC": "2020-06-18T00:00:00.000Z", "ID": "CVE-2020-12031", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Rockwell Automation FactoryTalk View SE" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "FactoryTalk View SE", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "all versions" + } + ] + } + } + ] + }, + "vendor_name": "Rockwell Automation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Trend Micro\u2019s Zero Day Initiative reported these vulnerabilities to Rockwell Automation" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In all versions of FactoryTalk View SE, after bypassing memory corruption mechanisms found in the operating system, a local, authenticated attacker may corrupt the associated memory space allowing for arbitrary code execution. Rockwell Automation recommends applying patch 1126290. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 \u2013 Patch Roll-up for CPR9 SRx." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05" + }, + { + "refsource": "MISC", + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944", + "name": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Rockwell Automation has released new versions of the affected products to mitigate the reported vulnerabilities. Affected users who are not able to apply the latest update are encouraged to seek additional mitigations or workarounds from the vendor\u2019s published guidelines in their security advisory.\nRockwell Automation recommends applying patch 1126290. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 \u2013 Patch Roll-up for CPR9 SRx." + } + ], + "source": { + "advisory": "ICSA-20-170-05 Rockwell Automation FactoryTalk View SE", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7680.json b/2020/7xxx/CVE-2020-7680.json index a67fb797b1f..d9e11182a3e 100644 --- a/2020/7xxx/CVE-2020-7680.json +++ b/2020/7xxx/CVE-2020-7680.json @@ -4,14 +4,68 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-7680", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "report@snyk.io", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "docsify", + "version": { + "version_data": [ + { + "version_value": "All versions prior to 4.11.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/docsifyjs/docsify/issues/1126", + "url": "https://github.com/docsifyjs/docsify/issues/1126" + }, + { + "refsource": "MISC", + "name": "https://github.com/docsifyjs/docsify/pull/1128", + "url": "https://github.com/docsifyjs/docsify/pull/1128" + }, + { + "refsource": "MISC", + "name": "https://snyk.io/vuln/SNYK-JS-DOCSIFY-567099", + "url": "https://snyk.io/vuln/SNYK-JS-DOCSIFY-567099" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page." } ] } diff --git a/2020/8xxx/CVE-2020-8214.json b/2020/8xxx/CVE-2020-8214.json index aa2bfdb48bf..4168e64c094 100644 --- a/2020/8xxx/CVE-2020-8214.json +++ b/2020/8xxx/CVE-2020-8214.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-8214", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "servey", + "version": { + "version_data": [ + { + "version_value": "Vulnerable versions < 3" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Path Traversal (CWE-22)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/355501", + "url": "https://hackerone.com/reports/355501" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A path traversal vulnerability in servey version < 3 allows an attacker to read content of any arbitrary file." } ] }