cve-2020-5525
Vulnerability from cvelistv5
Published
2020-02-21 09:15
Modified
2024-08-04 08:30
Severity ?
EPSS score ?
Summary
Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via management screen.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jpn.nec.com/security-info/secinfo/nv20-003.html | Not Applicable, Third Party Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN49410695/index.html | Not Applicable, Third Party Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
NEC Corporation | Aterm series |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:30:24.540Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN49410695/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Aterm series", "vendor": "NEC Corporation", "versions": [ { "status": "affected", "version": "Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via management screen." } ], "problemTypes": [ { "descriptions": [ { "description": "OS Command Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-21T09:15:19", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN49410695/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2020-5525", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Aterm series", "version": { "version_data": [ { "version_value": "Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier" } ] } } ] }, "vendor_name": "NEC Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via management screen." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OS Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/en/jp/JVN49410695/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN49410695/index.html" }, { "name": "https://jpn.nec.com/security-info/secinfo/nv20-003.html", "refsource": "MISC", "url": "https://jpn.nec.com/security-info/secinfo/nv20-003.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2020-5525", "datePublished": "2020-02-21T09:15:19", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:30:24.540Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-5525\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2020-02-21T10:15:11.780\",\"lastModified\":\"2020-02-21T17:39:19.543\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via management screen.\"},{\"lang\":\"es\",\"value\":\"Las series Aterm (Aterm WF1200C versiones de firmware Ver1.2.1 y anteriores, Aterm WG1200CR versiones de firmware Ver1.2.1 y anteriores, Aterm WG2600HS versiones de firmware Ver1.3.2 y anteriores), permite a un atacante autenticado en el mismo segmento de red ejecutar comandos arbitrarios de Sistema Operativo con privilegios root por medio de la pantalla de administraci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.0,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.1,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:S/C:C/I:C/A:C\",\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.7},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":5.1,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.3.2\",\"matchCriteriaId\":\"9ED4D36D-BABE-459A-8B33-DFD0AF0DB73F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"623C9C7B-C947-49A8-9C1D-20B23FDA73ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wf1200c_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2.1\",\"matchCriteriaId\":\"820303B5-B17B-4804-B1F9-ED4D62052C06\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wf1200c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBB82685-60AA-420A-BCBC-D9654EE256E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2.1\",\"matchCriteriaId\":\"497C9C48-AAD8-4004-A193-9AFC9E8CF676\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"936D9DD3-11E5-4862-B157-85B13EA06C38\"}]}]}],\"references\":[{\"url\":\"https://jpn.nec.com/security-info/secinfo/nv20-003.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"https://jvn.jp/en/jp/JVN49410695/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.