René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

117 lines
3.8 KiB
JSON

{
"id": "CVE-2020-35758",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-03T21:15:07.300",
"lastModified": "2022-06-28T14:11:45.273",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is a Authentication Bypass in the Web Interface. This interface does not properly restrict access to internal functionality. Despite presenting a password login page on first access, authentication is not required to access privileged functionality. As such, it's possible to directly access APIs that should not be exposed to an unauthenticated user."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en los dispositivos Libre Wireless LS9 versi\u00f3n LS1.5/p7040. Se presenta una Omisi\u00f3n de Autenticaci\u00f3n en la Interfaz Web. Esta interfaz no restringe apropiadamente el acceso a la funcionalidad interna. A pesar de presentar una p\u00e1gina de inicio de sesi\u00f3n con contrase\u00f1a en el primer acceso, una autenticaci\u00f3n no es requerida para acceder a la funcionalidad privilegiada. Como tal, es posible acceder directamente a las API que no deber\u00edan estar expuestas a un usuario no autenticado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:librewireless:ls9_firmware:7040:*:*:*:*:*:*:*",
"matchCriteriaId": "FD8392D3-FEA4-4BFA-A35C-2E17F9081F31"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:librewireless:ls9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70E3ECA6-A10C-4234-B879-08AB7342CBAA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.iot-inspector.com/blog/advisory-multiple-issues-libre-wireless-ls9/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}