2024-12-08 03:06:42 +00:00

117 lines
3.7 KiB
JSON

{
"id": "CVE-2020-6865",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2020-04-30T22:15:12.150",
"lastModified": "2024-11-21T05:36:19.237",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ZTE SDN controller platform is impacted by an information leakage vulnerability. Due to the program's failure to optimize the response of failure to the request, the caller can directly view the internal error code location of the component. Attackers could exploit this vulnerability to obtain sensitive information. This affects: OSCP versions V16.19.10 and V16.19.20."
},
{
"lang": "es",
"value": "La plataforma del controlador SDN de ZTE est\u00e1 afectada por una vulnerabilidad de filtrado de informaci\u00f3n. Debido al fallo del programa para optimizar la respuesta de fallo a la petici\u00f3n, \u00e9l que llama puede visualizar directamente la ubicaci\u00f3n del c\u00f3digo de error interno del componente. Los atacantes podr\u00edan explotar esta vulnerabilidad para obtener informaci\u00f3n confidencial. Esto afecta: OSCP versiones V16.19.10 y V16.19.20."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zte:oscp:16.19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B8F41D17-2683-4078-B24C-2784E1FB8B0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zte:oscp:16.19.20:*:*:*:*:*:*:*",
"matchCriteriaId": "ED1EF589-1B74-41E8-927E-219DC924C73B"
}
]
}
]
}
],
"references": [
{
"url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1012782",
"source": "psirt@zte.com.cn",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1012782",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}