mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 13:36:56 +00:00
304 lines
12 KiB
JSON
304 lines
12 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2020-14496",
|
||
|
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||
|
"published": "2022-05-19T18:15:08.360",
|
||
|
"lastModified": "2022-06-07T21:15:13.723",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Successful exploitation of this vulnerability for multiple Mitsubishi Electric Factory Automation Engineering Software Products of various versions could allow an attacker to escalate privilege and execute malicious programs, which could cause a denial-of-service condition, and allow information to be disclosed, tampered with, and/or destroyed."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad para m\u00faltiples Productos Mitsubishi Electric Factory Automation Engineering Software de varias versiones podr\u00eda permitir a un atacante escalar privilegios y ejecutar programas maliciosos, lo que podr\u00eda causar una condici\u00f3n de denegaci\u00f3n de servicio, y permitir que la informaci\u00f3n sea divulgada, manipulada y/o destruida"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "HIGH",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 9.8,
|
||
|
"baseSeverity": "CRITICAL"
|
||
|
},
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 5.9
|
||
|
},
|
||
|
{
|
||
|
"source": "ics-cert@hq.dhs.gov",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "HIGH",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "REQUIRED",
|
||
|
"scope": "CHANGED",
|
||
|
"confidentialityImpact": "HIGH",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 8.3,
|
||
|
"baseSeverity": "HIGH"
|
||
|
},
|
||
|
"exploitabilityScore": 1.6,
|
||
|
"impactScore": 6.0
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "PARTIAL",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "PARTIAL",
|
||
|
"baseScore": 7.5
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 10.0,
|
||
|
"impactScore": 6.4,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "NVD-CWE-noinfo"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"source": "ics-cert@hq.dhs.gov",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-275"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.106k",
|
||
|
"matchCriteriaId": "69A02BE6-633A-4A94-890C-586B3A42E19F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.011m",
|
||
|
"matchCriteriaId": "60875630-C0F2-434E-8D11-51B44F62CBA5"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "3.41t",
|
||
|
"matchCriteriaId": "EE83331F-B795-410A-8510-351945025444"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:em_configurator:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.015r",
|
||
|
"matchCriteriaId": "A0A01F0C-0B10-4906-9389-4D53AE3CD7FD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "4.6",
|
||
|
"matchCriteriaId": "A9FFEA10-20FA-4B73-ACA5-AB7462820123"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.23z",
|
||
|
"matchCriteriaId": "2877EB49-8A69-426B-B7EB-87DEF3975562"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:gt_designer3:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.236w",
|
||
|
"matchCriteriaId": "C3393020-A6E6-431A-B572-E28948F6A970"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "3.245f",
|
||
|
"matchCriteriaId": "3DC963D1-281A-48DE-B822-5254643C98E7"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.236w",
|
||
|
"matchCriteriaId": "20E2D739-F982-4ED4-ADFB-505777CF9888"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.106k",
|
||
|
"matchCriteriaId": "0809A627-EEC8-475E-997F-E3FAE2C39261"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.595v",
|
||
|
"matchCriteriaId": "7F2B0AC1-1BEC-4D79-9995-527E3A770A66"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.065t",
|
||
|
"matchCriteriaId": "80BF474D-E018-4612-93FD-F3A661C13A6D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:m_commdtm-hart:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.01b",
|
||
|
"matchCriteriaId": "9C9ECB87-B07E-4E52-BF3F-8AD4AA03826B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:m_commdtm-io-link:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.04e",
|
||
|
"matchCriteriaId": "50FA8FAD-3DF4-453C-A55C-5F622DD76460"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:melfa-works:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "4.4",
|
||
|
"matchCriteriaId": "ED888C84-4CD8-464A-A3A0-F623EB0F4920"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:melsoft_fielddeviceconfigurator:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.04e",
|
||
|
"matchCriteriaId": "EE1E2976-38B4-4B1B-AC01-B3D8C26A1BB2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:melsoft_navigator:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "2.70y",
|
||
|
"matchCriteriaId": "01D32795-831A-43D6-9F90-82A67F5E9081"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:mh11_settingtool_version2:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "2.003d",
|
||
|
"matchCriteriaId": "7A6DE218-D030-4DDF-B504-B176DFE7662A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:motorizer:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.010l",
|
||
|
"matchCriteriaId": "0FD24F8E-869B-413A-9BF1-555CF827F3C9"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.106l",
|
||
|
"matchCriteriaId": "470498DC-4A30-4EC2-B9C7-B5348D2F1381"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:mt_works2:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.160s",
|
||
|
"matchCriteriaId": "7926DBE1-335C-40E2-AD74-AE89DC9A0095"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "4.20w",
|
||
|
"matchCriteriaId": "DCBBBA97-3C41-423F-8534-098070E49A97"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:network_interface_board_cc-link_ver.2_utility:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.24a",
|
||
|
"matchCriteriaId": "3CFA2E01-1D66-40D6-8575-0E216376CC25"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:network_interface_board_cc_ie_control_utility:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.30g",
|
||
|
"matchCriteriaId": "EBC15323-7468-4688-A9C2-01208B4849A4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:network_interface_board_cc_ie_field_utility:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.17t",
|
||
|
"matchCriteriaId": "F605A144-5A10-44C9-94DC-3B0D66E39431"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:network_interface_board_mneth_utility:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "35m",
|
||
|
"matchCriteriaId": "54DBB417-5543-4AEB-9467-6197868C8C18"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:px_developer:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.53f",
|
||
|
"matchCriteriaId": "9987641F-1BD4-445A-86E4-778CFFFFEBD2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:rt_toolbox2:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "3.73b",
|
||
|
"matchCriteriaId": "A11F999D-CE97-49B6-9AF3-DD32D0E0779F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.80j",
|
||
|
"matchCriteriaId": "B03CE992-45F6-48EA-BE86-0041F0CDBEF7"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-212-02",
|
||
|
"source": "ics-cert@hq.dhs.gov",
|
||
|
"tags": [
|
||
|
"Third Party Advisory",
|
||
|
"US Government Resource"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|