René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

159 lines
5.5 KiB
JSON

{
"id": "CVE-2020-5649",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2020-11-06T03:15:17.697",
"lastModified": "2021-07-21T11:39:23.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Resource management error vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version \"05.65.00.BD\" and earlier, GT1450-QMBDE CoreOS version \"05.65.00.BD\" and earlier, GT1450-QLBDE CoreOS version \"05.65.00.BD\" and earlier, GT1455HS-QTBDE CoreOS version \"05.65.00.BD\" and earlier, and GT1450HS-QMBDE CoreOS version \"05.65.00.BD\" and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet."
},
{
"lang": "es",
"value": "Vulnerabilidad de error en la administraci\u00f3n de recursos en la funci\u00f3n TCP/IP incluida en el firmware del modelo GT14 de la serie GOT 1000 (GT1455-QTBDE CoreOS versi\u00f3n '05 .65.00.BD' y anteriores, GT1450-QMBDE CoreOS versi\u00f3n '05 .65.00.BD' y anteriores , GT1450-QLBDE CoreOS versi\u00f3n '05 .65.00.BD' y anteriores, GT1455HS-QTBDE CoreOS versi\u00f3n '05 .65.00.BD' y anteriores, y GT1450HS-QMBDE CoreOS versi\u00f3n '05 .65.00.BD' y anteriores), permite a un atacante no autenticado remoto detener las funciones de red de los productos por medio de un paquete especialmente dise\u00f1ado"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitsubishielectric:coreos:*:*:*:*:*:*:*:*",
"versionEndIncluding": "05.65.00.bd",
"matchCriteriaId": "44FA010C-360A-4DE4-8F59-C67EA0569B2A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishielectric:gt1450-qlbde:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F587B0E6-D2B1-47CC-80FE-8004698E4F71"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishielectric:gt1450-qmbde:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF218A1A-4B6D-4510-80A7-CC22B8D027A4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishielectric:gt1450hs-qmbde:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE9E2C66-4742-4D50-A2AC-AE097BEF7CBE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishielectric:gt1455-qtbde:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2726AE6-8870-4FB3-B15C-88AAB26FBB9F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishielectric:gt1455hs-qtbde:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B4C3649-B5DF-4D62-A1EC-4A9DD2CA128A"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/vu/JVNVU99562395/index.html",
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02",
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf",
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf",
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
}
]
}