René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

77 lines
2.1 KiB
JSON

{
"id": "CVE-2020-14140",
"sourceIdentifier": "security@xiaomi.com",
"published": "2023-03-29T20:15:07.087",
"lastModified": "2023-04-06T17:48:53.503",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "When Xiaomi router firmware is updated in 2020, there is an unauthenticated API that can reveal WIFI password vulnerability. This vulnerability is caused by the lack of access control policies on some API interfaces. Attackers can exploit this vulnerability to enter the background and execute background command injection."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mi:xiaomi_router_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2020",
"versionEndExcluding": "2023.2",
"matchCriteriaId": "D7EFC1FC-A575-45EC-8BDD-9F84017ABB84"
}
]
}
]
}
],
"references": [
{
"url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=506",
"source": "security@xiaomi.com",
"tags": [
"Vendor Advisory"
]
}
]
}