2024-12-08 03:06:42 +00:00

142 lines
4.3 KiB
JSON

{
"id": "CVE-2020-5179",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-02T14:16:37.097",
"lastModified": "2024-11-21T05:33:37.977",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Comtech Stampede FX-1010 7.4.3 devices allow remote authenticated administrators to execute arbitrary OS commands by navigating to the Diagnostics Ping page and entering shell metacharacters in the Target IP address field. (In some cases, authentication can be achieved with the comtech password for the comtech account.)"
},
{
"lang": "es",
"value": "Los dispositivos Comtech Stampede FX-1010 versi\u00f3n 7.4.3, permiten a administradores autenticados remotos ejecutar comandos arbitrarios del Sistema Operativo navegando en la p\u00e1gina Diagnostics Ping e ingresando metacaracteres de shell en el campo Target IP address. (En algunos casos, la autenticaci\u00f3n puede ser alcanzada con la contrase\u00f1a comtech para la cuenta comtech)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:comtechtel:stampede_fx-1010_firmware:7.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E40F6E42-2191-4686-9631-81E8D134809F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:comtechtel:stampede_fx-1010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41DFD1AA-89A6-4C33-A686-8A95EE45EDF9"
}
]
}
]
}
],
"references": [
{
"url": "https://overload.cl/blog/comtech-authenticated-rce-on-comtech-fx-series/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://sku11army.blogspot.com/2020/01/comtech-authenticated-rce-on-comtech-fx.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://overload.cl/blog/comtech-authenticated-rce-on-comtech-fx-series/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://sku11army.blogspot.com/2020/01/comtech-authenticated-rce-on-comtech-fx.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}