2024-12-08 03:06:42 +00:00

126 lines
3.7 KiB
JSON

{
"id": "CVE-2020-7594",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-21T22:15:16.103",
"lastModified": "2024-11-21T05:37:26.317",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MultiTech Conduit MTCDT-LVW2-24XX 1.4.17-ocea-13592 devices allow remote authenticated administrators to execute arbitrary OS commands by navigating to the Debug Options page and entering shell metacharacters in the interface JSON field of the ping function."
},
{
"lang": "es",
"value": "Los dispositivos MultiTech Conduit MTCDT-LVW2-24XX versi\u00f3n 1.4.17-ocea-13592, permiten a los administradores autenticados remotos ejecutar comandos arbitrarios del Sistema Operativo al navegar en la p\u00e1gina Debug Options e ingresando metacaracteres de shell en el campo JSON de la interfaz de la funci\u00f3n ping."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:multitech:conduit_mtcdt-lvw2-246a_firmware:1.4.17-ocea-13592:*:*:*:*:*:*:*",
"matchCriteriaId": "964CE7EF-9636-4702-8242-3F49D9529B9C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:multitech:conduit_mtcdt-lvw2-246a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98208892-EAE7-4C79-8AA5-4A2753FB33EC"
}
]
}
]
}
],
"references": [
{
"url": "https://sku11army.blogspot.com/2020/01/multitech-authenticated-remote-code.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://sku11army.blogspot.com/2020/01/multitech-authenticated-remote-code.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}