2024-12-08 03:06:42 +00:00

128 lines
3.8 KiB
JSON

{
"id": "CVE-2020-27688",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-11-05T15:15:35.843",
"lastModified": "2024-11-21T05:21:39.170",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RVToolsPasswordEncryption.exe in RVTools 4.0.6 allows users to encrypt passwords to be used in the configuration files. This encryption used a static IV and key, and thus using the Decrypt() method from VISKD.cs from the RVTools.exe executable allows for decrypting the encrypted passwords. The accounts used in the configuration files have access to vSphere instances."
},
{
"lang": "es",
"value": "El ejecutable RVToolsPasswordEncryption.exe en RVTools versi\u00f3n 4.0.6, permite a usuarios cifrar las contrase\u00f1as para ser usadas en los archivos de configuraci\u00f3n. Esta cifrado us\u00f3 un IV est\u00e1tico y una clave, y por lo tanto, usando el m\u00e9todo Decrypt() del archivo VISKD.cs del ejecutable RVTools.exe permite descifrar las contrase\u00f1as cifradas. Las cuentas usadas en los archivos de configuraci\u00f3n presentan acceso a instancias de vSphere"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:robware:rvtools:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "149B56EB-A5A7-44B0-92B3-F2E535F2E4BF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/matthiasmaes/CVE-2020-27688",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.robware.net/rvtools/",
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
]
},
{
"url": "https://github.com/matthiasmaes/CVE-2020-27688",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.robware.net/rvtools/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
]
}
]
}