2024-07-14 02:06:08 +00:00

186 lines
5.7 KiB
JSON

{
"id": "CVE-2020-25747",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-09-25T04:23:05.027",
"lastModified": "2021-07-21T11:39:23.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Telnet service of Rubetek RV-3406, RV-3409, and RV-3411 cameras (firmware versions v342, v339) can allow a remote attacker to gain access to RTSP and ONFIV services without authentication. Thus, the attacker can watch live streams from the camera, rotate the camera, change some settings (brightness, clarity, time), restart the camera, or reset it to factory settings."
},
{
"lang": "es",
"value": "El servicio Telnet de las c\u00e1maras RV-3406, RV-3409 y RV-3411 de Rubetek (versiones de firmware v342, v339), puede permitir a un atacante remoto conseguir acceso a los servicios RTSP y ONFIV sin autenticaci\u00f3n. Por lo tanto, el atacante puede ver transmisiones en vivo desde la c\u00e1mara, girar la c\u00e1mara, cambiar algunas configuraciones (brillo, claridad, tiempo), reiniciar la c\u00e1mara o restablecerla a la configuraci\u00f3n de f\u00e1brica"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 8.5,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:rubetek:rv-3406:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0C29138-1CBA-4677-B494-AA5278632606"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:rubetek:rv-3406_firmware:339:*:*:*:*:*:*:*",
"matchCriteriaId": "57AF1900-5D42-45B9-9906-B1EBC933A064"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:rubetek:rv-3406_firmware:342:*:*:*:*:*:*:*",
"matchCriteriaId": "72F51EDA-EA7A-4E58-A071-A0D6F3AEC379"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:rubetek:rv-3409:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93B04FD1-8EEF-4DDC-83A9-9F5390378D28"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:rubetek:rv-3409_firmware:339:*:*:*:*:*:*:*",
"matchCriteriaId": "B2BD4E56-46E1-4985-A46F-C9B4A374A17F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:rubetek:rv-3409_firmware:342:*:*:*:*:*:*:*",
"matchCriteriaId": "EE539B49-BF73-4411-855D-69E02E6AD917"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:rubetek:rv-3411:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D54B518-140F-4933-A1C8-45A0A7B3F167"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:rubetek:rv-3411_firmware:339:*:*:*:*:*:*:*",
"matchCriteriaId": "183C8C01-1F30-40F5-BD9F-6D217EB1CD42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:rubetek:rv-3411_firmware:342:*:*:*:*:*:*:*",
"matchCriteriaId": "C9ECA3AF-D4F0-4F8B-854C-0C63BB090E44"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jet-pentest/CVE-2020-25747",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}