2024-01-15 05:00:28 +00:00
{
"id" : "CVE-2024-0552" ,
"sourceIdentifier" : "twcert@cert.org.tw" ,
"published" : "2024-01-15T04:15:08.260" ,
2024-10-14 08:03:23 +00:00
"lastModified" : "2024-10-14T07:15:02.297" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-01-15 05:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Intumit inc. SmartRobot's web framwork has a remote code execution vulnerability. An unauthorized remote attacker can exploit this vulnerability to execute arbitrary commands on the remote server."
2024-01-16 15:00:29 +00:00
} ,
{
"lang" : "es" ,
"value" : "Intumit inc. SmartRobot's web framwork tiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo. Un atacante remoto no autorizado puede aprovechar esta vulnerabilidad para ejecutar comandos arbitrarios en el servidor remoto."
2024-01-15 05:00:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-01-23 21:00:28 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
} ,
2024-01-15 05:00:28 +00:00
{
"source" : "twcert@cert.org.tw" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
2024-01-23 21:00:28 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-74"
2024-01-15 05:00:28 +00:00
}
]
}
] ,
2024-01-23 21:00:28 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-05-19 02:03:31 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:intumit:smartrobot:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0260F953-BD5B-49C0-B7BA-AFBE246FA702"
2024-01-23 21:00:28 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-05-19 02:03:31 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:intumit:smartrobot_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "6.0.0-202012tw" ,
"matchCriteriaId" : "961218A9-47B8-4622-BCB5-C5DF22615C8D"
2024-01-23 21:00:28 +00:00
}
]
}
]
}
] ,
2024-01-15 05:00:28 +00:00
"references" : [
{
"url" : "https://www.twcert.org.tw/tw/cp-132-7662-41d50-1.html" ,
2024-01-23 21:00:28 +00:00
"source" : "twcert@cert.org.tw" ,
"tags" : [
"Third Party Advisory"
]
2024-01-15 05:00:28 +00:00
}
]
}