René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

156 lines
5.6 KiB
JSON

{
"id": "CVE-2020-3336",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2020-06-18T03:15:13.667",
"lastModified": "2020-06-24T18:42:23.127",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the software upgrade process of Cisco TelePresence Collaboration Endpoint Software and Cisco RoomOS Software could allow an authenticated, remote attacker to modify the filesystem to cause a denial of service (DoS) or gain privileged access to the root filesystem. The vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending requests with malformed parameters to the system using the console, Secure Shell (SSH), or web API. A successful exploit could allow the attacker to modify the device configuration or cause a DoS."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el proceso de actualizaci\u00f3n de software de Cisco TelePresence Collaboration Endpoint Software y Cisco RoomOS Software, podr\u00eda permitir a un atacante remoto autenticado modificar el sistema de archivos para causar una denegaci\u00f3n de servicio (DoS) u conseguir acceso privilegiado al sistema de archivos root. La vulnerabilidad es debido a una comprobaci\u00f3n de entrada insuficiente. Un atacante con privilegios administrativos podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de peticiones con par\u00e1metros malformados al sistema utilizando la consola, Secure Shell (SSH) o API web. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante modificar la configuraci\u00f3n del dispositivo o causar una DoS"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:roomos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05DD3D37-0932-4F36-88E4-D89F1FED4673"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.9.4",
"matchCriteriaId": "08A208DE-7452-4C1C-AE20-074850F875D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.10.0",
"versionEndIncluding": "9.10.2",
"matchCriteriaId": "5C09694B-5448-44A2-BDEC-50E49755E1B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.12.0",
"versionEndIncluding": "9.12.3",
"matchCriteriaId": "54F5F988-25AE-4647-B5FC-61DDC1544C35"
}
]
}
]
}
],
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-cmd-inj-7ZpWhvZb",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}