2024-07-14 02:06:08 +00:00

190 lines
6.1 KiB
JSON

{
"id": "CVE-2018-20219",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-03-21T16:00:35.313",
"lastModified": "2019-03-25T19:53:51.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. After successful authentication, the device sends an authentication cookie to the end user such that they can access the devices web administration panel. This token is hard-coded to a string in the source code (/usr/share/www/check.lp file). By setting this cookie in a browser, an attacker is able to maintain access to every ENC-400 device without knowing the password, which results in authentication bypass. Even if a user changes the password on the device, this token is static and unchanged."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en dispositivos Teracue ENC-400 con firmware en versiones 2.56 y anteriores. Tras una autenticaci\u00f3n exitosa, el dispositivo env\u00eda una cookie de autenticaci\u00f3n al usuario final para que pueda acceder al panel de administraci\u00f3n web del dispositivo. Este token est\u00e1 embebido en una cadena en el c\u00f3digo fuente (archivo /usr/share/www/check.lp). Al configurar esta cookie en un navegador, un atacante puede mantener el acceso a todos los dispositivos ENC-400 sin conocer la contrase\u00f1a, lo que resulta en una omisi\u00f3n de autenticaci\u00f3n. Incluso aunque un usuario cambie la contrase\u00f1a en el dispositivo, este token se mantiene est\u00e1tico e invariable."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:teracue:enc-400_hdmi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13123CDF-3D5D-43F9-A4D4-E108423CCAD8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:teracue:enc-400_hdmi_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.56",
"matchCriteriaId": "3EE35BEF-ECAF-4664-8FE5-AB72A00EF06D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:teracue:enc-400_hdmi2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D86B2C0A-60B3-4964-9220-E69107BD3DEC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:teracue:enc-400_hdmi2_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.56",
"matchCriteriaId": "615943FC-CE51-4DE5-AA4F-7FAF35DA97D0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:teracue:enc-400_hdsdi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F338471B-BA13-4ECC-B401-3B0D19D6F00F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:teracue:enc-400_hdsdi_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.56",
"matchCriteriaId": "39E93D58-6D19-44A9-A5B6-07CBF5C5F7AD"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/151802/Teracue-ENC-400-Command-Injection-Missing-Authentication.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2019/Feb/48",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://zxsecurity.co.nz/research.html",
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
}
]
}