2024-07-14 02:06:08 +00:00

190 lines
5.5 KiB
JSON

{
"id": "CVE-2018-20220",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-03-21T16:00:35.407",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. While the web interface requires authentication before it can be interacted with, a large portion of the HTTP endpoints are missing authentication. An attacker is able to view these pages before being authenticated, and some of these pages may disclose sensitive information."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en dispositivos Teracue ENC-400 con firmware en versiones 2.56 y anteriores. Aunque la interfaz web requiere autenticaci\u00f3n antes de que se pueda interactuar con ella, gran parte de los endpoints HTTP carecen de autenticaci\u00f3n. Un atacante es capaz de visualizar estas p\u00e1ginas antes de autenticarse; algunas de \u00e9stas podr\u00edan revelar informaci\u00f3n sensible."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:teracue:enc-400_hdmi_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.56",
"matchCriteriaId": "3EE35BEF-ECAF-4664-8FE5-AB72A00EF06D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:teracue:enc-400_hdmi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13123CDF-3D5D-43F9-A4D4-E108423CCAD8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:teracue:enc-400_hdmi2_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.56",
"matchCriteriaId": "615943FC-CE51-4DE5-AA4F-7FAF35DA97D0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:teracue:enc-400_hdmi2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D86B2C0A-60B3-4964-9220-E69107BD3DEC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:teracue:enc-400_hdsdi_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.56",
"matchCriteriaId": "39E93D58-6D19-44A9-A5B6-07CBF5C5F7AD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:teracue:enc-400_hdsdi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F338471B-BA13-4ECC-B401-3B0D19D6F00F"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/151802/Teracue-ENC-400-Command-Injection-Missing-Authentication.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2019/Feb/48",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://zxsecurity.co.nz/research.html",
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
}
]
}