René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

117 lines
4.0 KiB
JSON

{
"id": "CVE-2020-35756",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-03T21:15:07.243",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is a luci_service GETPASS Configuration Password Information Leak. The luci_service daemon running on port 7777 does not require authentication to return the device configuration password in cleartext when using the GETPASS command. As such, any unauthenticated person with access to port 7777 on the device will be able to leak the user's personal device configuration password by issuing the GETPASS command."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en los dispositivos Libre Wireless LS9 versi\u00f3n LS1.5/p7040. Se presenta un filtrado de informaci\u00f3n de contrase\u00f1a de configuraci\u00f3n de luci_service GETPASS. El demonio luci_service que se ejecuta en el puerto 7777 no requiere autenticaci\u00f3n para devolver la contrase\u00f1a de configuraci\u00f3n del dispositivo en texto sin cifrar cuando se usa el comando GETPASS. Como tal, cualquier persona no autenticada con acceso al puerto 7777 en el dispositivo podr\u00e1 filtrar la contrase\u00f1a de configuraci\u00f3n del dispositivo personal del usuario al emitir el comando GETPASS."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:librewireless:ls9_firmware:7040:*:*:*:*:*:*:*",
"matchCriteriaId": "FD8392D3-FEA4-4BFA-A35C-2E17F9081F31"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:librewireless:ls9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70E3ECA6-A10C-4234-B879-08AB7342CBAA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.iot-inspector.com/blog/advisory-multiple-issues-libre-wireless-ls9/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}