{ "id": "CVE-2020-7862", "sourceIdentifier": "vuln@krcert.or.kr", "published": "2021-06-24T11:15:07.740", "lastModified": "2022-09-20T19:04:23.080", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability in agent program of HelpU remote control solution could allow an authenticated remote attacker to execute arbitrary commands This vulnerability is due to insufficient input santization when communicating customer process." }, { "lang": "es", "value": "Una vulnerabilidad soluci\u00f3n de control remoto en el programa agente de HelpU, podr\u00eda permitir a un atacante remoto autenticado ejecutar comandos arbitrarios. Esta vulnerabilidad es debido a un saneamiento insuficiente de la entrada cuando se comunica el proceso del cliente" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 }, { "source": "vuln@krcert.or.kr", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH" }, "exploitabilityScore": 1.0, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.5 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] }, { "source": "vuln@krcert.or.kr", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-120" }, { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:helpu:helpuftclient:3.0.0.0:*:*:*:*:windows:*:*", "matchCriteriaId": "D65D63E5-9478-4CB5-ABEC-58A6AB4D8241" }, { "vulnerable": true, "criteria": "cpe:2.3:a:helpu:helpuftserver:3.0.0.0:*:*:*:*:windows:*:*", "matchCriteriaId": "51FCBC1B-E6C0-481A-AA65-4F6A14C5E5ED" }, { "vulnerable": true, "criteria": "cpe:2.3:a:helpu:helpuserver:1.0.0.2:*:*:*:*:windows:*:*", "matchCriteriaId": "2F92BEDB-C1B4-4FD4-8540-A5090EF64F52" }, { "vulnerable": true, "criteria": "cpe:2.3:a:helpu:helpuviewer:2018.5.21.0:*:*:*:*:windows:*:*", "matchCriteriaId": "6DA81C9C-27A9-4BA9-AECD-8BFDCA46C13D" } ] } ] } ], "references": [ { "url": "https://helpu.co.kr/customer/download.html", "source": "vuln@krcert.or.kr", "tags": [ "Vendor Advisory" ] }, { "url": "https://krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36094", "source": "vuln@krcert.or.kr", "tags": [ "Third Party Advisory" ] } ] }