All the vulnerabilites related to Schneider Electric - EcoStruxure IT Gateway
cve-2024-2230
Vulnerability from cvelistv5
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2024-06-12T17:30:26.400Z", "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "shortName": "schneider" }, "rejectedReasons": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "assignerShortName": "schneider", "cveId": "CVE-2024-2230", "datePublished": "2024-06-12T17:03:22.099Z", "dateRejected": "2024-06-12T17:30:26.400Z", "dateReserved": "2024-03-06T19:22:00.316Z", "dateUpdated": "2024-06-12T17:30:26.400Z", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-0865
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
Schneider Electric | EcoStruxure IT Gateway |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ecostruxure_it_gateway", "vendor": "schneider-electric", "versions": [ { "lessThan": "1.20.x", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-0865", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-12T19:59:08.710375Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-12T20:04:39.540Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T18:18:18.824Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-03\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2024-044-03.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "EcoStruxure IT Gateway", "vendor": "Schneider Electric", "versions": [ { "status": "affected", "version": "1.20.x and prior" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "CWE-798: Use of hard-coded credentials vulnerability exists that could cause local privilege\nescalation when logged in as a non-administrative user." } ], "value": "CWE-798: Use of hard-coded credentials vulnerability exists that could cause local privilege\nescalation when logged in as a non-administrative user." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798 Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-12T17:23:00.908Z", "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "shortName": "schneider" }, "references": [ { "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-03\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2024-044-03.pdf" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "assignerShortName": "schneider", "cveId": "CVE-2024-0865", "datePublished": "2024-06-12T17:23:00.908Z", "dateReserved": "2024-01-24T17:18:07.117Z", "dateUpdated": "2024-08-01T18:18:18.824Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-10575
Vulnerability from cvelistv5
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
▼ | Vendor | Product |
---|---|---|
Schneider Electric | EcoStruxure IT Gateway |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ecostruxure_it_gateway", "vendor": "schneider-electric", "versions": [ { "status": "affected", "version": "1.21.0.6" }, { "status": "affected", "version": "1.22.0.3" }, { "status": "affected", "version": "1.22.1.5" }, { "status": "affected", "version": "1.23.0.4" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-10575", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T15:14:10.869591Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T15:14:17.114Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "EcoStruxure IT Gateway", "vendor": "Schneider Electric", "versions": [ { "status": "affected", "version": "Version 1.21.0.6" }, { "status": "affected", "version": "Version 1.22.0.3" }, { "status": "affected", "version": "Version 1.22.1.5" }, { "status": "affected", "version": "Version 1.23.0.4" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "CWE-862: Missing Authorization vulnerability exists that could cause unauthorized access when enabled on\nthe network and potentially impacting connected devices." } ], "value": "CWE-862: Missing Authorization vulnerability exists that could cause unauthorized access when enabled on\nthe network and potentially impacting connected devices." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 10, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "LOW", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-13T04:35:44.556Z", "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "shortName": "schneider" }, "references": [ { "url": "https://download.schneider-electric.com/doc/SEVD-2024-317-04/SEVD-2024-317-04.pdf" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "assignerShortName": "schneider", "cveId": "CVE-2024-10575", "datePublished": "2024-11-13T04:35:44.556Z", "dateReserved": "2024-10-31T08:33:14.823Z", "dateUpdated": "2024-11-13T15:14:17.114Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202005-0051
Vulnerability from variot
In Fazecast jSerialComm, Version 2.2.2 and prior, an uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code. Fazecast Provides jSerialComm To DLL There is a read vulnerability. jSerialComm Is Fazecast Provides platform-independent serial communication provided by Java The library. This vulnerability allows local attackers to escalate privileges on affected installations of Schneider Electric EcoStruxure IT Gateway. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of files within the Temp directory. The issue results from an incorrect assignment of privilege to a critical resource. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Schneider Electric EcoStruxure IT Gateway is a set of cloud-based data center management as a service (DMaaS) products of French Schneider Electric company. A code issue vulnerability exists in Fazecast jSerialComm 2.2.2 and earlier versions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202005-0051", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ecostruxure it gateway", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "1.6.2.14" }, { "model": "ecostruxure it gateway", "scope": "gte", "trust": 1.0, "vendor": "schneider electric", "version": "1.5.0.66" }, { "model": "ecostruxure it gateway", "scope": "gte", "trust": 1.0, "vendor": "schneider electric", "version": "1.6.0.39" }, { "model": "jserialcomm", "scope": "lte", "trust": 1.0, "vendor": "fazecast", "version": "2.2.2" }, { "model": "ecostruxure it gateway", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "1.5.2.28" }, { "model": "ecostruxure it gateway", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "1.7.0.64" }, { "model": "jserialcomm", "scope": "eq", "trust": 0.9, "vendor": "fazecast", "version": "2.2.2" }, { "model": "ecostruxure it gateway", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "1.5.x \u7cfb" }, { "model": "ecostruxure it gateway", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "1.6.x \u7cfb" }, { "model": "ecostruxure it gateway", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "1.7.x \u7cfb" }, { "model": "ecostruxure it gateway", "scope": null, "trust": 0.7, "vendor": "schneider electric", "version": null }, { "model": "ecostruxure it gateway", "scope": "eq", "trust": 0.1, "vendor": "se", "version": "1.7.0.64" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-588" }, { "db": "VULMON", "id": "CVE-2020-10626" }, { "db": "JVNDB", "id": "JVNDB-2020-004145" }, { "db": "NVD", "id": "CVE-2020-10626" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:fazecast:jserialcomm:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.2.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.2.28", "versionStartIncluding": "1.5.0.66", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.6.2.14", "versionStartIncluding": "1.6.0.39", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:1.7.0.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-10626" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ryan Wincey (@rwincey) of Securifera", "sources": [ { "db": "ZDI", "id": "ZDI-20-588" } ], "trust": 0.7 }, "cve": "CVE-2020-10626", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-163123", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CVE-2020-10626", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC score", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-004145", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-10626", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-10626", "trust": 1.0, "value": "HIGH" }, { "author": "JPCERT/CC", "id": "JVNDB-2020-004145", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2020-10626", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202005-154", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-163123", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-10626", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-588" }, { "db": "VULHUB", "id": "VHN-163123" }, { "db": "VULMON", "id": "CVE-2020-10626" }, { "db": "JVNDB", "id": "JVNDB-2020-004145" }, { "db": "NVD", "id": "CVE-2020-10626" }, { "db": "CNNVD", "id": "CNNVD-202005-154" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Fazecast jSerialComm, Version 2.2.2 and prior, an uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code. Fazecast Provides jSerialComm To DLL There is a read vulnerability. jSerialComm Is Fazecast Provides platform-independent serial communication provided by Java The library. This vulnerability allows local attackers to escalate privileges on affected installations of Schneider Electric EcoStruxure IT Gateway. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of files within the Temp directory. The issue results from an incorrect assignment of privilege to a critical resource. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Schneider Electric EcoStruxure IT Gateway is a set of cloud-based data center management as a service (DMaaS) products of French Schneider Electric company. A code issue vulnerability exists in Fazecast jSerialComm 2.2.2 and earlier versions", "sources": [ { "db": "NVD", "id": "CVE-2020-10626" }, { "db": "JVNDB", "id": "JVNDB-2020-004145" }, { "db": "ZDI", "id": "ZDI-20-588" }, { "db": "VULHUB", "id": "VHN-163123" }, { "db": "VULMON", "id": "CVE-2020-10626" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-10626", "trust": 3.3 }, { "db": "ZDI", "id": "ZDI-20-588", "trust": 1.3 }, { "db": "JVN", "id": "JVNVU98082388", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-004145", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10377", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202005-154", "trust": 0.7 }, { "db": "NSFOCUS", "id": "48504", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1621", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-163123", "trust": 0.1 }, { "db": "PULSESECURE", "id": "SA201260", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-10626", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-588" }, { "db": "VULHUB", "id": "VHN-163123" }, { "db": "VULMON", "id": "CVE-2020-10626" }, { "db": "JVNDB", "id": "JVNDB-2020-004145" }, { "db": "NVD", "id": "CVE-2020-10626" }, { "db": "CNNVD", "id": "CNNVD-202005-154" } ] }, "id": "VAR-202005-0051", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-163123" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:27:30.624000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "jSerialComm", "trust": 1.6, "url": "https://github.com/fazecast/jserialcomm/releases" }, { "title": "Schneider Electric has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa2012601" }, { "title": "Fazecast jSerialComm Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=122410" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-588" }, { "db": "JVNDB", "id": "JVNDB-2020-004145" }, { "db": "CNNVD", "id": "CNNVD-202005-154" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-427", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-163123" }, { "db": "JVNDB", "id": "JVNDB-2020-004145" }, { "db": "NVD", "id": "CVE-2020-10626" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "https://www.us-cert.gov/ics/advisories/icsa2012601" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10626" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu98082388" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/48504" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10626" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-588/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1621/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/427.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181436" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-588" }, { "db": "VULHUB", "id": "VHN-163123" }, { "db": "VULMON", "id": "CVE-2020-10626" }, { "db": "JVNDB", "id": "JVNDB-2020-004145" }, { "db": "NVD", "id": "CVE-2020-10626" }, { "db": "CNNVD", "id": "CNNVD-202005-154" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-20-588" }, { "db": "VULHUB", "id": "VHN-163123" }, { "db": "VULMON", "id": "CVE-2020-10626" }, { "db": "JVNDB", "id": "JVNDB-2020-004145" }, { "db": "NVD", "id": "CVE-2020-10626" }, { "db": "CNNVD", "id": "CNNVD-202005-154" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-06T00:00:00", "db": "ZDI", "id": "ZDI-20-588" }, { "date": "2020-05-14T00:00:00", "db": "VULHUB", "id": "VHN-163123" }, { "date": "2020-05-14T00:00:00", "db": "VULMON", "id": "CVE-2020-10626" }, { "date": "2020-05-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-004145" }, { "date": "2020-05-14T16:15:12.530000", "db": "NVD", "id": "CVE-2020-10626" }, { "date": "2020-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-154" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-06T00:00:00", "db": "ZDI", "id": "ZDI-20-588" }, { "date": "2022-01-31T00:00:00", "db": "VULHUB", "id": "VHN-163123" }, { "date": "2020-05-19T00:00:00", "db": "VULMON", "id": "CVE-2020-10626" }, { "date": "2020-05-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-004145" }, { "date": "2022-01-31T19:33:27.307000", "db": "NVD", "id": "CVE-2020-10626" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-154" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-154" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Fazecast Made jSerialComm To DLL Read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-004145" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-154" } ], "trust": 0.6 } }