mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
189 lines
5.4 KiB
JSON
189 lines
5.4 KiB
JSON
{
|
|
"id": "CVE-2020-5524",
|
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
|
"published": "2020-02-21T10:15:11.670",
|
|
"lastModified": "2020-02-21T18:41:05.330",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands with root privileges via UPnP function."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Las series Aterm (Aterm WF1200C versiones de firmware Ver1.2.1 y anteriores, Aterm WG1200CR versiones de firmware Ver1.2.1 y anteriores, Aterm WG2600HS versiones de firmware Ver1.3.2 y anteriores), permite a un atacante en el mismo segmento de red ejecutar comandos arbitrarios de Sistema Operativo con privilegios root por medio de la funci\u00f3n UPnP."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "ADJACENT_NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 8.3
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 6.5,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-78"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.3.2",
|
|
"matchCriteriaId": "9ED4D36D-BABE-459A-8B33-DFD0AF0DB73F"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "623C9C7B-C947-49A8-9C1D-20B23FDA73ED"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:nec:aterm_wf1200c_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.2.1",
|
|
"matchCriteriaId": "820303B5-B17B-4804-B1F9-ED4D62052C06"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:nec:aterm_wf1200c:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CBB82685-60AA-420A-BCBC-D9654EE256E3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.2.1",
|
|
"matchCriteriaId": "497C9C48-AAD8-4004-A193-9AFC9E8CF676"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "936D9DD3-11E5-4862-B157-85B13EA06C38"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html",
|
|
"source": "vultures@jpcert.or.jp",
|
|
"tags": [
|
|
"Not Applicable",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://jvn.jp/en/jp/JVN25766797/",
|
|
"source": "nvd@nist.gov",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://jvn.jp/en/jp/JVN49410695/index.html",
|
|
"source": "vultures@jpcert.or.jp",
|
|
"tags": [
|
|
"Not Applicable",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |