123 lines
4.0 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2020-29000",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-26T18:15:51.617",
"lastModified": "2021-02-03T14:36:42.937",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on Geeni GNC-CW013 doorbell 1.8.1 devices. A vulnerability exists in the RTSP service that allows a remote attacker to take full control of the device with a high-privileged account. By sending a crafted message, an attacker is able to remotely deliver a telnet session. Any attacker that has the ability to control DNS can exploit this vulnerability to remotely login to the device and gain access to the camera system."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en los dispositivos Geeni GNC-CW013 doorbell versi\u00f3n 1.8.1. Se presenta una vulnerabilidad en el servicio RTSP que permite a un atacante remoto tomar el control total del dispositivo con una cuenta muy privilegiada. Al enviar un mensaje dise\u00f1ado, un atacante es capaz de enviar una sesi\u00f3n de telnet remotamente. Cualquier atacante que tenga la capacidad de controlar el DNS puede explotar esta vulnerabilidad para iniciar sesi\u00f3n remotamente en el dispositivo y conseguir acceso al sistema de la c\u00e1mara"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mygeeni:gnc-cw013_firmware:1.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "07E9F4C5-DB76-4416-A493-8F3771925ABA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mygeeni:gnc-cw013:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55ED786D-F53A-4A7C-A3FC-98B0E956C8E0"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/tj-oconnor/d081f5f116a4865f888be81e2466d831",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.mygeeni.com/hc/en-us",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}