2024-12-08 03:06:42 +00:00

125 lines
3.8 KiB
JSON

{
"id": "CVE-2020-9238",
"sourceIdentifier": "psirt@huawei.com",
"published": "2020-10-12T14:15:14.543",
"lastModified": "2024-11-21T05:40:13.000",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Taurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have a buffer overflow vulnerability. A function in a module does not verify inputs sufficiently. Attackers can exploit this vulnerability by sending specific request. This could compromise normal service of the affected device."
},
{
"lang": "es",
"value": "Dispositivos Taurus-AN00B versiones anteriores a 10.1.0.156(C00E155R7P2), presentan una vulnerabilidad de desbordamiento del b\u00fafer. Una funci\u00f3n en un m\u00f3dulo no verifica las entradas suficientemente. Los atacantes pueden explotar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n espec\u00edfica. Esto podr\u00eda comprometer el servicio normal del dispositivo afectado"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 3.3,
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.5,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:taurus-an00b_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.1.0.156",
"matchCriteriaId": "FF4FE269-34CC-4AA8-BB57-8D4C288978E5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:taurus-an00b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C0D6A4F-1F1E-4D1B-AE4E-23CD6FBCF28E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-bufferoverflow-en",
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-bufferoverflow-en",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}