mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
196 lines
7.3 KiB
JSON
196 lines
7.3 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2020-36162",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2021-01-06T01:15:12.857",
|
||
|
"lastModified": "2021-01-11T21:27:34.547",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "An issue was discovered in Veritas CloudPoint before 8.3.0.1+hotfix. The CloudPoint Windows Agent leverages OpenSSL. This OpenSSL library attempts to load the \\usr\\local\\ssl\\openssl.cnf configuration file, which does not exist. By default, on Windows systems users can create directories under <drive>:\\. A low privileged user can create a <drive>:\\usr\\local\\ssl\\openssl.cnf configuration file to load a malicious OpenSSL engine, which may result in arbitrary code execution. This would give the attacker administrator access on the system, allowing the attacker (by default) to access all data, access all installed applications, etc."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Se detect\u00f3 un problema en Veritas CloudPoint versiones anteriores a la 8.3.0.1+hotfix. El CloudPoint Windows Agent aprovecha el OpenSSL. Esta biblioteca OpenSSL intenta cargar el archivo de configuraci\u00f3n \\usr\\local\\ssl\\openssl.cnf, que no existe. Por defecto, en los sistemas Windows, los usuarios pueden crear directorios en (drive):\\. Un usuario poco privilegiado puede crear un archivo de configuraci\u00f3n (drive):\\usr\\local\\ssl\\openssl.cnf para cargar un motor OpenSSL malicioso, resultando en una ejecuci\u00f3n de c\u00f3digo arbitraria. Esto le dar\u00eda al atacante acceso de administrador al sistema, permitiendo al atacante (por defecto) acceder a todos los datos, acceder a todas las aplicaciones instaladas, etc"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||
|
"attackVector": "LOCAL",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "LOW",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "CHANGED",
|
||
|
"confidentialityImpact": "HIGH",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 8.8,
|
||
|
"baseSeverity": "HIGH"
|
||
|
},
|
||
|
"exploitabilityScore": 2.0,
|
||
|
"impactScore": 6.0
|
||
|
},
|
||
|
{
|
||
|
"source": "cve@mitre.org",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
|
"attackVector": "LOCAL",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "CHANGED",
|
||
|
"confidentialityImpact": "HIGH",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 9.3,
|
||
|
"baseSeverity": "CRITICAL"
|
||
|
},
|
||
|
"exploitabilityScore": 2.5,
|
||
|
"impactScore": 6.0
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
|
"accessVector": "LOCAL",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "COMPLETE",
|
||
|
"integrityImpact": "COMPLETE",
|
||
|
"availabilityImpact": "COMPLETE",
|
||
|
"baseScore": 7.2
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 10.0,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "NVD-CWE-noinfo"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:veritas:cloudpoint:1.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "9FC8A714-5AD7-4223-B0B6-00DAA00A52CD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:veritas:cloudpoint:1.0.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F1680BD1-C6FB-4026-A7DB-3940D13C6F7B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:veritas:cloudpoint:2.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5AA2D930-D796-4BE5-81DA-99BE6568AA21"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:veritas:cloudpoint:2.0.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "4A0BFE1C-A065-4C6A-BB38-374A51A8CAB2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:veritas:cloudpoint:2.0.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "01F576F9-0BC7-497F-8DF7-D1169AD06C34"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:veritas:cloudpoint:2.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "92F21043-677F-481C-8B57-266E35E98B8A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:veritas:cloudpoint:2.1.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "48A6DCB8-4401-449A-B325-98FF65EC4613"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:veritas:cloudpoint:2.1.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "BF37DB9E-BB66-463F-862D-3455777F1FB7"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:veritas:cloudpoint:2.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E7BC0855-A724-4CCA-B185-2BDCE2761A06"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:veritas:cloudpoint:2.2.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A65FA984-C993-4F3F-97B0-15B9410A19BF"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:veritas:cloudpoint:2.2.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CB38DF3A-CE0F-4A04-AE1B-AA3CCFCC5884"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:veritas:netbackup_cloudpoint:8.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "450E2586-EE96-4402-A5F8-40938C1D4A1D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:veritas:netbackup_cloudpoint:8.3.0.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7C976FE2-DBFF-4DD6-AB7C-1451AACD7E05"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://www.veritas.com/content/support/en_US/security/VTS20-011",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|