VAR-202005-1059
Vulnerability from variot - Updated: 2023-12-18 12:27Inadequate encryption may allow the passwords for Emerson OpenEnterprise versions through 3.3.4 user accounts to be obtained. OpenEnterprise Is Emerson Provided by SCADA It is software. OpenEnterprise The following multiple vulnerabilities exist in. * Inappropriate ownership management (CWE-282) - CVE-2020-10632 * Insufficient cryptographic strength (CWE-326) - CVE-2020-10636 * Lack of authentication for important features (CWE-306) - CVE-2020-10640The expected impact depends on each vulnerability, but it may be affected as follows. * Inadequate access permission settings for folders in the system, important configuration files being tampered with by a local third party, resulting in system failure or unexpected behavior - CVE-2020-10632 * By a local third party OpenEnterprise Get the password for your user account - CVE-2020-10636 * Arbitrary commands can be executed with system privileges or arbitrary code can be executed via a specific communication path by a remote third party. - CVE-2020-10640. Emerson Electric OpenEnterprise is a set of data acquisition and monitoring system (SCADA) mainly used for remote oil and gas applications by Emerson Electric. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202005-1059",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "electric openenterprise",
"scope": "lte",
"trust": 1.0,
"vendor": "emerson",
"version": "\u003c=3.3.4"
},
{
"model": "openenterprise scada server",
"scope": "lte",
"trust": 1.0,
"vendor": "emerson",
"version": "3.3.4"
},
{
"model": "openenterprise",
"scope": "eq",
"trust": 0.8,
"vendor": "emerson",
"version": "3.3.4 \u306e\u5168\u3066"
}
],
"sources": [
{
"db": "IVD",
"id": "58031b0e-70fe-4e95-a4cc-8ddb87aaefa9"
},
{
"db": "IVD",
"id": "f46ecf09-7f03-43d5-ade5-b649be1b7ede"
},
{
"db": "CNVD",
"id": "CNVD-2020-32662"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-004589"
},
{
"db": "NVD",
"id": "CVE-2020-10636"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:emerson:openenterprise_scada_server:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.3.4",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-10636"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Roman Lozko of Kaspersky",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202005-948"
}
],
"trust": 0.6
},
"cve": "CVE-2020-10636",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2020-32662",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "58031b0e-70fe-4e95-a4cc-8ddb87aaefa9",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "f46ecf09-7f03-43d5-ade5-b649be1b7ede",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ics-cert@hq.dhs.gov",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.0,
"impactScore": 4.0,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "IPA score",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-004589",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "IPA score",
"availabilityImpact": "None",
"baseScore": 6.5,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-004589",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "Low",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "IPA score",
"availabilityImpact": "High",
"baseScore": 10,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-004589",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2020-10636",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "ics-cert@hq.dhs.gov",
"id": "CVE-2020-10636",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2020-004589",
"trust": 0.8,
"value": "High"
},
{
"author": "IPA",
"id": "JVNDB-2020-004589",
"trust": 0.8,
"value": "Medium"
},
{
"author": "IPA",
"id": "JVNDB-2020-004589",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2020-32662",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202005-948",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "58031b0e-70fe-4e95-a4cc-8ddb87aaefa9",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "f46ecf09-7f03-43d5-ade5-b649be1b7ede",
"trust": 0.2,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "58031b0e-70fe-4e95-a4cc-8ddb87aaefa9"
},
{
"db": "IVD",
"id": "f46ecf09-7f03-43d5-ade5-b649be1b7ede"
},
{
"db": "CNVD",
"id": "CNVD-2020-32662"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-004589"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-004589"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-004589"
},
{
"db": "NVD",
"id": "CVE-2020-10636"
},
{
"db": "NVD",
"id": "CVE-2020-10636"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-948"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Inadequate encryption may allow the passwords for Emerson OpenEnterprise versions through 3.3.4 user accounts to be obtained. OpenEnterprise Is Emerson Provided by SCADA It is software. OpenEnterprise The following multiple vulnerabilities exist in. * Inappropriate ownership management (CWE-282) - CVE-2020-10632 * Insufficient cryptographic strength (CWE-326) - CVE-2020-10636 * Lack of authentication for important features (CWE-306) - CVE-2020-10640The expected impact depends on each vulnerability, but it may be affected as follows. * Inadequate access permission settings for folders in the system, important configuration files being tampered with by a local third party, resulting in system failure or unexpected behavior - CVE-2020-10632 * By a local third party OpenEnterprise Get the password for your user account - CVE-2020-10636 * Arbitrary commands can be executed with system privileges or arbitrary code can be executed via a specific communication path by a remote third party. - CVE-2020-10640. Emerson Electric OpenEnterprise is a set of data acquisition and monitoring system (SCADA) mainly used for remote oil and gas applications by Emerson Electric. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-10636"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-004589"
},
{
"db": "CNVD",
"id": "CNVD-2020-32662"
},
{
"db": "IVD",
"id": "58031b0e-70fe-4e95-a4cc-8ddb87aaefa9"
},
{
"db": "IVD",
"id": "f46ecf09-7f03-43d5-ade5-b649be1b7ede"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-10636",
"trust": 3.4
},
{
"db": "ICS CERT",
"id": "ICSA-20-140-02",
"trust": 3.0
},
{
"db": "CNVD",
"id": "CNVD-2020-32662",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-202005-948",
"trust": 1.0
},
{
"db": "JVN",
"id": "JVNVU92838573",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-004589",
"trust": 0.8
},
{
"db": "NSFOCUS",
"id": "46742",
"trust": 0.6
},
{
"db": "IVD",
"id": "58031B0E-70FE-4E95-A4CC-8DDB87AAEFA9",
"trust": 0.2
},
{
"db": "IVD",
"id": "F46ECF09-7F03-43D5-ADE5-B649BE1B7EDE",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "58031b0e-70fe-4e95-a4cc-8ddb87aaefa9"
},
{
"db": "IVD",
"id": "f46ecf09-7f03-43d5-ade5-b649be1b7ede"
},
{
"db": "CNVD",
"id": "CNVD-2020-32662"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-004589"
},
{
"db": "NVD",
"id": "CVE-2020-10636"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-948"
}
]
},
"id": "VAR-202005-1059",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "58031b0e-70fe-4e95-a4cc-8ddb87aaefa9"
},
{
"db": "IVD",
"id": "f46ecf09-7f03-43d5-ade5-b649be1b7ede"
},
{
"db": "CNVD",
"id": "CNVD-2020-32662"
}
],
"trust": 1.8000000166666665
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "58031b0e-70fe-4e95-a4cc-8ddb87aaefa9"
},
{
"db": "IVD",
"id": "f46ecf09-7f03-43d5-ade5-b649be1b7ede"
},
{
"db": "CNVD",
"id": "CNVD-2020-32662"
}
]
},
"last_update_date": "2023-12-18T12:27:28.814000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Emerson SupportNet",
"trust": 0.8,
"url": "https://www3.emersonprocess.com/remote/support/v3/main.html"
},
{
"title": "Patch for Emerson Electric OpenEnterprise encryption problem vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/221347"
},
{
"title": "Emerson Electric OpenEnterprise Fixes for encryption problem vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=119021"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-32662"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-004589"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-948"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-326",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-10636"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-140-02"
},
{
"trust": 1.6,
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-140-02"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10640"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10632"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10636"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu92838573"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/46742"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2020-10636/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-32662"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-004589"
},
{
"db": "NVD",
"id": "CVE-2020-10636"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-948"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "58031b0e-70fe-4e95-a4cc-8ddb87aaefa9"
},
{
"db": "IVD",
"id": "f46ecf09-7f03-43d5-ade5-b649be1b7ede"
},
{
"db": "CNVD",
"id": "CNVD-2020-32662"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-004589"
},
{
"db": "NVD",
"id": "CVE-2020-10636"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-948"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-19T00:00:00",
"db": "IVD",
"id": "58031b0e-70fe-4e95-a4cc-8ddb87aaefa9"
},
{
"date": "2020-05-19T00:00:00",
"db": "IVD",
"id": "f46ecf09-7f03-43d5-ade5-b649be1b7ede"
},
{
"date": "2020-06-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-32662"
},
{
"date": "2020-05-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-004589"
},
{
"date": "2022-02-24T19:15:08.653000",
"db": "NVD",
"id": "CVE-2020-10636"
},
{
"date": "2020-05-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-948"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-06-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-32662"
},
{
"date": "2020-05-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-004589"
},
{
"date": "2022-03-07T20:04:32.380000",
"db": "NVD",
"id": "CVE-2020-10636"
},
{
"date": "2022-03-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-948"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202005-948"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Emerson Electric OpenEnterprise encryption problem vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-32662"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-948"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202005-948"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.