2024-12-08 03:06:42 +00:00

188 lines
6.5 KiB
JSON

{
"id": "CVE-2019-11536",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-22T18:29:00.537",
"lastModified": "2024-11-21T04:21:17.520",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kalki Kalkitech SYNC3000 Substation DCU GPC v2.22.6, 2.23.0, 2.24.0, 3.0.0, 3.1.0, 3.1.16, 3.2.3, 3.2.6, 3.5.0, 3.6.0, and 3.6.1, when WebHMI is not installed, allows an attacker to inject client-side commands or scripts to be executed on the device with privileged access, aka CYB/2019/19561. The attack requires network connectivity to the device and exploits the webserver interface, typically through a browser."
},
{
"lang": "es",
"value": "Kalki Kalkitech Subestaci\u00f3n SYNC3000 DCU GPC versiones 2.22.6, 2.23.0, 2.24.0, 3.0.0, 3.1.0, 3.1.16, 3.2.3, 3.2.6, 3.5.0, 3.6.0 y 3.6.1, cuando la WebHMI no est\u00e1 instalada, permite que un atacante inyecte comandos del lado del cliente para que sean ejecutados en el dispositivo con acceso privilegiado, tambi\u00e9n conocido como CYB / 2019/19561. El ataque requiere de conectividad de red hacia el dispositivo y explota la interfaz webserver, generalmente por medio de un navegador."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kalkitech:sync3000_firmware:2.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB00F5A-F9D5-41E8-877E-92CDA8308560"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kalkitech:sync3000_firmware:2.23.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5FF6A57-74BE-47B5-87C3-6D9446D4BA4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kalkitech:sync3000_firmware:2.24.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F2B79022-7CF7-4676-979D-AB5E1C284A1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kalkitech:sync3000_firmware:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B61F7362-90D4-4A9E-9816-DDEA136A81C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kalkitech:sync3000_firmware:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EC382AB4-76BF-4EB7-8926-A30C1EB628C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kalkitech:sync3000_firmware:3.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6FC17B-061B-41BF-8681-D598486A1DE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kalkitech:sync3000_firmware:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2FF26B0C-70F8-45D6-BF58-482CD5506663"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kalkitech:sync3000_firmware:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B91FB77E-6830-4BD5-A082-3762AD4259DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kalkitech:sync3000_firmware:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C104E84-AFDD-4CF6-9407-E75419BFF78B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kalkitech:sync3000_firmware:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "67A4FC87-0D08-46E9-B9A2-CA42B4FA0D6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kalkitech:sync3000_firmware:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0617B24A-9FA0-46DE-8887-2113D387EC87"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:kalkitech:sync3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D871456C-B80B-4D6B-93E0-4BD87F80141E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.kalkitech.com/cybersecurity/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.kalkitech.com/wp-content/uploads/CYB_19561_Advisory.pdf",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.kalkitech.com/cybersecurity/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.kalkitech.com/wp-content/uploads/CYB_19561_Advisory.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}