René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

112 lines
3.6 KiB
JSON

{
"id": "CVE-2020-23036",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-10-22T20:15:09.817",
"lastModified": "2022-11-05T02:05:20.917",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "MEDIA NAVI Inc SMACom v1.2 was discovered to contain an insecure session validation vulnerability in the session handling of the `password` authentication parameter of the wifi photo transfer module. This vulnerability allows attackers with network access privileges or on public wifi networks to read the authentication credentials and follow-up requests containing the user password via a man in the middle attack."
},
{
"lang": "es",
"value": "Se ha detectado que MEDIA NAVI Inc SMACom versi\u00f3n v1.2, contiene una vulnerabilidad de comprobaci\u00f3n de sesi\u00f3n no segura en el manejo de la sesi\u00f3n del par\u00e1metro de autenticaci\u00f3n \"password\" del m\u00f3dulo de transferencia de fotos por wifi. Esta vulnerabilidad permite a atacantes con privilegios de acceso a la red o en redes wifi p\u00fablicas leer las credenciales de autenticaci\u00f3n y las peticiones de seguimiento que contienen la contrase\u00f1a del usuario por medio de un ataque de tipo man in the middle"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:medianavi:smacom:1.2:*:*:*:*:iphone_os:*:*",
"matchCriteriaId": "D95313FA-C8E4-420A-BC56-363FD01D919C"
}
]
}
]
}
],
"references": [
{
"url": "https://cwe.mitre.org/data/definitions/522.html",
"source": "cve@mitre.org",
"tags": [
"Technical Description"
]
},
{
"url": "https://www.vulnerability-lab.com/get_content.php?id=2211",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}