René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

109 lines
3.7 KiB
JSON

{
"id": "CVE-2020-11496",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-10-19T19:15:14.360",
"lastModified": "2021-07-21T11:39:23.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Sprecher SPRECON-E firmware prior to 8.64b might allow local attackers with access to engineering data to insert arbitrary code. This firmware lacks the validation of the input values on the device side, which is provided by the engineering software during parameterization. Attackers with access to local configuration files can therefore insert malicious commands that are executed after compiling them to valid parameter files (\u201cPDLs\u201d), transferring them to the device, and restarting the device."
},
{
"lang": "es",
"value": "El firmware Sprecher SPRECON-E versiones anteriores a 8.64b, podr\u00eda permitir a atacantes locales con acceso a datos de ingenier\u00eda insertar c\u00f3digo arbitrario. Este firmware carece de una comprobaci\u00f3n de valores de entrada en el lado del dispositivo, que es proporcionada por el software de ingenier\u00eda durante la parametrizaci\u00f3n. Unos atacantes con acceso a los archivos de configuraci\u00f3n local pueden insertar comandos maliciosos que se ejecutaban despu\u00e9s de compilarlos en archivos de par\u00e1metros validos (\"PDLs\"), transferirlos luego al dispositivo y reiniciar el dispositivo"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.64b",
"matchCriteriaId": "997E4517-A980-48B1-9556-043C1D5D8A70"
}
]
}
]
}
],
"references": [
{
"url": "https://www.sprecher-automation.com/en/it-security/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}