René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

173 lines
6.3 KiB
JSON

{
"id": "CVE-2020-3537",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2020-09-04T03:15:10.730",
"lastModified": "2021-10-19T19:54:14.367",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco Jabber for Windows software could allow an authenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of message contents. An attacker could exploit this vulnerability by sending specially crafted messages that contain Universal Naming Convention (UNC) links to a targeted user and convincing the user to follow the provided link. A successful exploit could allow the attacker to cause the application to access a remote system, possibly allowing the attacker to gain access to sensitive information that the attacker could use in additional attacks."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el software Cisco Jabber para Windows podr\u00eda permitir a un atacante remoto autenticado conseguir acceso a informaci\u00f3n confidencial. La vulnerabilidad es debido a una comprobaci\u00f3n inapropiada de los contenidos de mensaje. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de mensajes especialmente dise\u00f1ados que contengan enlaces Universal Naming Convention (UNC) hacia un usuario apuntado y convenciendo al usuario de seguir el v\u00ednculo proporcionado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que la aplicaci\u00f3n acceda a un sistema remoto, permitiendo posiblemente al atacante conseguir acceso a informaci\u00f3n confidencial que el atacante podr\u00eda usar en ataques adicionales"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:jabber:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "12.1",
"versionEndExcluding": "12.1.3",
"matchCriteriaId": "10F7716B-4743-4437-80CA-2D79EA8C5655"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:jabber:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "12.5",
"versionEndExcluding": "12.5.2",
"matchCriteriaId": "502C7D8C-8216-42A9-9751-2398BCBC474E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:jabber:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "12.6",
"versionEndExcluding": "12.6.3",
"matchCriteriaId": "9C3A1FEE-4A0E-450E-A324-E1007C49140C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:jabber:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "12.7",
"versionEndExcluding": "12.7.2",
"matchCriteriaId": "9CB2B0D5-F8B9-4749-9CA9-747C01E4CFFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:jabber:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "12.8",
"versionEndExcluding": "12.8.3",
"matchCriteriaId": "FCF47CAC-7687-42D8-AE99-906FB0EA1561"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:jabber:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "12.9",
"versionEndExcluding": "12.9.1",
"matchCriteriaId": "14F9350F-57C1-4B2C-9270-EAAB5EE87E67"
}
]
}
]
}
],
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-G3NSjPn7",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}