René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

116 lines
4.4 KiB
JSON

{
"id": "CVE-2020-12023",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2020-06-11T20:15:10.960",
"lastModified": "2020-06-23T19:06:55.723",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Philips IntelliBridge Enterprise (IBE), Versions B.12 and prior, IntelliBridge Enterprise system integration with SureSigns (VS4), EarlyVue (VS30) and IntelliVue Guardian (IGS). Unencrypted user credentials received in the IntelliBridge Enterprise (IBE) are logged within the transaction logs, which are secured behind the login based administrative web portal. The unencrypted user credentials sent from the affected products listed above, for the purpose of handshake or authentication with the Enterprise Systems, are logged as the payload in IntelliBridge Enterprise (IBE) within the transaction logs. An attacker with administrative privileges could exploit this vulnerability to read plain text credentials from log files."
},
{
"lang": "es",
"value": "Philips IntelliBridge Enterprise (IBE), versiones B.12 y anteriores, integra el sistema IntelliBridge Enterprise con SureSigns (VS4), EarlyVue (VS30) e IntelliVue Guardian (IGS). Las credenciales de usuario sin cifrar recibidas en el IntelliBridge Enterprise (IBE) se registran dentro de los registros de transacciones, que se protegen detr\u00e1s del portal web administrativo basado en el inicio de sesi\u00f3n. Las credenciales de usuario sin cifrar enviadas desde los productos afectados enumerados anteriormente, con el prop\u00f3sito de un protocolo de enlace o una autenticaci\u00f3n con los Sistemas Empresariales, son registrados como la carga \u00fatil en IntelliBridge Enterprise (IBE) dentro de los registros de transacci\u00f3n. Un atacante con privilegios administrativos podr\u00eda explotar esta vulnerabilidad para leer las credenciales de texto plano de los archivos de registro"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.7
},
"baseSeverity": "LOW",
"exploitabilityScore": 5.1,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:philips:intellibridge_enterprise:*:*:*:*:*:*:*:*",
"versionEndIncluding": "b.12",
"matchCriteriaId": "4F303101-9D1E-482A-8E6C-FC5860C69D49"
}
]
}
]
}
],
"references": [
{
"url": "https://www.us-cert.gov/ics/advisories/icsma-20-163-01",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}