var-202006-0391
Vulnerability from variot

The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue. The Universal Plug and Play (UPnP) protocol in effect prior to April 17, 2020 can be abused to send traffic to arbitrary destinations using the SUBSCRIBE functionality. The UPnP protocol, as specified by the Open Connectivity Foundation (OCF), is designed to provide automatic discovery and interaction with devices on a network. The UPnP protocol is designed to be used in a trusted local area network (LAN) and the protocol does not implement any form of authentication or verification. Many common Internet-connected devices support UPnP, as noted in previous research from Daniel Garcia (VU#357851) and Rapid7. Garcia presented at DEFCON 2019 and published a scanning and portmapping tool. The UPnP Device Protection service was not widely adopted. A vulnerability in the UPnP SUBSCRIBE capability permits an attacker to send large amounts of data to arbitrary destinations accessible over the Internet, which could lead to a Distributed Denial of Service (DDoS), data exfiltration, and other unexpected network behavior. The OCF has updated the UPnP specification to address this issue. This vulnerability has been assigned CVE-2020-12695 and is also known as Call Stranger. Although offering UPnP services on the Internet is generally considered to be a misconfiguration, a number of devices are still available over the Internet according to a recent Shodan scan. A remote, unauthenticated attacker may be able to abuse the UPnP SUBSCRIBE capability to send traffic to arbitrary destinations, leading to amplified DDoS attacks and data exfiltration. In general, making UPnP available over the the Internet can pose further security vulnerabilities than the one described in this vulnerability note. Open Connectivity Foundation UPnP There is a vulnerability in the specification regarding improper default permissions.Information is obtained and service operation is interrupted (DoS) It may be put into a state. A security vulnerability exists in UPnP versions prior to 2020-04-17. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: gssdp and gupnp security update Advisory ID: RHSA-2021:1789-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:1789 Issue date: 2021-05-18 CVE Names: CVE-2020-12695 ==================================================================== 1. Summary:

An update for gssdp and gupnp is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat CodeReady Linux Builder (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

  1. Description:

GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible.

GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP.

The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928)

Security Fix(es):

  • hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1846006 - CVE-2020-12695 hostapd: UPnP SUBSCRIBE misbehavior in WPS AP

  1. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source: gssdp-1.0.5-1.el8.src.rpm gupnp-1.0.6-1.el8.src.rpm

aarch64: gssdp-1.0.5-1.el8.aarch64.rpm gssdp-debuginfo-1.0.5-1.el8.aarch64.rpm gssdp-debugsource-1.0.5-1.el8.aarch64.rpm gssdp-utils-debuginfo-1.0.5-1.el8.aarch64.rpm gupnp-1.0.6-1.el8.aarch64.rpm gupnp-debuginfo-1.0.6-1.el8.aarch64.rpm gupnp-debugsource-1.0.6-1.el8.aarch64.rpm

ppc64le: gssdp-1.0.5-1.el8.ppc64le.rpm gssdp-debuginfo-1.0.5-1.el8.ppc64le.rpm gssdp-debugsource-1.0.5-1.el8.ppc64le.rpm gssdp-utils-debuginfo-1.0.5-1.el8.ppc64le.rpm gupnp-1.0.6-1.el8.ppc64le.rpm gupnp-debuginfo-1.0.6-1.el8.ppc64le.rpm gupnp-debugsource-1.0.6-1.el8.ppc64le.rpm

s390x: gssdp-1.0.5-1.el8.s390x.rpm gssdp-debuginfo-1.0.5-1.el8.s390x.rpm gssdp-debugsource-1.0.5-1.el8.s390x.rpm gssdp-utils-debuginfo-1.0.5-1.el8.s390x.rpm gupnp-1.0.6-1.el8.s390x.rpm gupnp-debuginfo-1.0.6-1.el8.s390x.rpm gupnp-debugsource-1.0.6-1.el8.s390x.rpm

x86_64: gssdp-1.0.5-1.el8.i686.rpm gssdp-1.0.5-1.el8.x86_64.rpm gssdp-debuginfo-1.0.5-1.el8.i686.rpm gssdp-debuginfo-1.0.5-1.el8.x86_64.rpm gssdp-debugsource-1.0.5-1.el8.i686.rpm gssdp-debugsource-1.0.5-1.el8.x86_64.rpm gssdp-utils-debuginfo-1.0.5-1.el8.i686.rpm gssdp-utils-debuginfo-1.0.5-1.el8.x86_64.rpm gupnp-1.0.6-1.el8.i686.rpm gupnp-1.0.6-1.el8.x86_64.rpm gupnp-debuginfo-1.0.6-1.el8.i686.rpm gupnp-debuginfo-1.0.6-1.el8.x86_64.rpm gupnp-debugsource-1.0.6-1.el8.i686.rpm gupnp-debugsource-1.0.6-1.el8.x86_64.rpm

Red Hat CodeReady Linux Builder (v. 8):

aarch64: gssdp-debuginfo-1.0.5-1.el8.aarch64.rpm gssdp-debugsource-1.0.5-1.el8.aarch64.rpm gssdp-devel-1.0.5-1.el8.aarch64.rpm gssdp-utils-debuginfo-1.0.5-1.el8.aarch64.rpm gupnp-debuginfo-1.0.6-1.el8.aarch64.rpm gupnp-debugsource-1.0.6-1.el8.aarch64.rpm gupnp-devel-1.0.6-1.el8.aarch64.rpm

noarch: gssdp-docs-1.0.5-1.el8.noarch.rpm

ppc64le: gssdp-debuginfo-1.0.5-1.el8.ppc64le.rpm gssdp-debugsource-1.0.5-1.el8.ppc64le.rpm gssdp-devel-1.0.5-1.el8.ppc64le.rpm gssdp-utils-debuginfo-1.0.5-1.el8.ppc64le.rpm gupnp-debuginfo-1.0.6-1.el8.ppc64le.rpm gupnp-debugsource-1.0.6-1.el8.ppc64le.rpm gupnp-devel-1.0.6-1.el8.ppc64le.rpm

s390x: gssdp-debuginfo-1.0.5-1.el8.s390x.rpm gssdp-debugsource-1.0.5-1.el8.s390x.rpm gssdp-devel-1.0.5-1.el8.s390x.rpm gssdp-utils-debuginfo-1.0.5-1.el8.s390x.rpm gupnp-debuginfo-1.0.6-1.el8.s390x.rpm gupnp-debugsource-1.0.6-1.el8.s390x.rpm gupnp-devel-1.0.6-1.el8.s390x.rpm

x86_64: gssdp-debuginfo-1.0.5-1.el8.i686.rpm gssdp-debuginfo-1.0.5-1.el8.x86_64.rpm gssdp-debugsource-1.0.5-1.el8.i686.rpm gssdp-debugsource-1.0.5-1.el8.x86_64.rpm gssdp-devel-1.0.5-1.el8.i686.rpm gssdp-devel-1.0.5-1.el8.x86_64.rpm gssdp-utils-debuginfo-1.0.5-1.el8.i686.rpm gssdp-utils-debuginfo-1.0.5-1.el8.x86_64.rpm gupnp-debuginfo-1.0.6-1.el8.i686.rpm gupnp-debuginfo-1.0.6-1.el8.x86_64.rpm gupnp-debugsource-1.0.6-1.el8.i686.rpm gupnp-debugsource-1.0.6-1.el8.x86_64.rpm gupnp-devel-1.0.6-1.el8.i686.rpm gupnp-devel-1.0.6-1.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2020-12695 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBYKPxUtzjgjWX9erEAQhZhw//Ypgq/0qu2SS/hw8alPmqQ6CG5C/xOqF6 uJL5HVQ+KPu8Go+UifB3xP3Izm9GYh9aNpcR3bPTx3NsfJdQyzPNSo8O2bC3mUBl Lw6Bh++uhaNx3ADaKfceEG5teXbkwAadSft0W7j9jiY70qjVWfvqKjzBS3UyOL/P ++SdPU96uOX9nAkeT3wqirWjXDjUMJLao6AvRtXOXJ2MNwJp436S/KemSkMq2Mg7 izSYf7Biojg5SMNM4rsFBSnIqmehomfsVFetttHImCfTYteTfddti42gMelZyG8k MK4CJw1DeR1e30teWaHnoVa9xAPJMKx56RG3/Wr+6Y5nK0rFZoZuMiJn2b7KodcH fYbfxkwrQQ/R9bYZn03YgCz4zl/hetsoITKFHcsPNB9qtdRdtQhYzeOG+AyiawWh YtF3vlomMlaxuOZV9zTJUIWZX/ev6wWx8VsXuHKMBwtBxO7l3M0Hd+BOxRPVE/mu m+DBcBQp7fvaw55tCAQtHS3CKvgGYijDvOFHBOkQw5Zh9ttdfLlKo4H4NU0W4dLN HJWuKGelB2vGc0eoqZ7yCi2xuWBYxjDIoYGzlwPJSnrrguqeLfOKVykja8AYpIET V/XCUk/geIiEbSRwAR8EPXDpTLLicGrR6pbekpMfALm/GGc5I4RyA9AbVNJ9fF+a 7bb2GlcOcWo=2GSN -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . (CVE-2020-12695)

It was discovered that ReadyMedia (MiniDLNA) allowed remote code execution. ========================================================================= Ubuntu Security Notice USN-4734-2 February 16, 2021

wpa vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in wpa_supplicant and hostapd.

Software Description: - wpa: client support for WPA and WPA2

Details:

USN-4734-1 fixed several vulnerabilities in wpa_supplicant. This update provides the corresponding update for Ubuntu 14.04 ESM.

It was discovered that wpa_supplicant did not properly handle P2P (Wi-Fi Direct) group information in some situations, leading to a heap overflow. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-0326)

It was discovered that hostapd did not properly handle UPnP subscribe messages in some circumstances. An attacker could use this to cause a denial of service. (CVE-2020-12695)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM: hostapd 1:2.1-0ubuntu1.7+esm3 wpasupplicant 2.1-0ubuntu1.7+esm3

After a standard system update you need to reboot your computer to make all the necessary changes.

For the stable distribution (buster), these problems have been fixed in version 2:2.7+git20190128+0c1e29f-6+deb10u3.

We recommend that you upgrade your wpa packages.

For the detailed security status of wpa please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wpa

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmCBxcZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0QRbw//chJxW9vhszfe/MrHkuEBC/y0jzkQ0GxJG/DT+EXvHnq8KyVht92B81sU Ia860UeNygOY1vAe8izNVpxPEi1PpI7Y6VfvqcWC5dMFNEmOk8yMzJXPDYtwrO3b q7Fq6MJys6HTooIInCVjdwVTmvVfocEiOl2Oy+smBE8ylkUPIShJj+UsnBR3qMCB 9IoxgeFsHl4HpRzsC1uiTMmNPUqqychqzyn26aA+Vp5nfPkvpsSc6aA68BBUm529 5udANpQneYrsQ+EKMm2wQmw9xNWbrqzRUCmi/XGxJ5YEibOjMLZeBMWq35MRQKDS BaaEPbjPMbBP7p6yp795pdt/XgNL1cJPejEBBQWPs3PrRuW/inhjJbSvenPl5AIB wOV8OzoxDw0m5DdYr2IuYRNu3zt743e/v5oDhDOiSteBl7zjs4cUohfOryaH/htN 7Ok3BbhfVc7xfW/XhXNq2axXPGDdSOI3Y6ZXPgiTlX3eIm8Culg7Rm52JprbAc0a aP0pkGjHO3MAIsvRU/H7WGJbhCdS0i/XTAbuJming5zzCpigGaQG9wOawYH4lNJV BNEX/DjjcsZ4oETxWn0sG/LVIl3m2TCry2cayZsy8806nTqlhFS2py5tx6gn5NBi e5JGaYRgwa6TUxj4UjWnbdIKMpElbtXbMIOHSvG2Gnx/21siyg0= =CU/j -----END PGP SIGNATURE----- . In addition minidlna was susceptible to the "CallStranger" UPnP vulnerability

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202006-0391",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "envy photo 7100 z3m52a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "windows 10",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "deskjet ink advantage 4538 f0v66b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 7640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy pro 6452 5se47a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "5020 z4a69a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 6055 5se16a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 6232 k7g26b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 110 cq809c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 120 cz022c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4500 a9t80a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4525 k9t09b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5541 k7g89a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 6222 y0k13d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4516 k9h52a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy pro 6420 5se45b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5646 f8b05a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4505 a9t86a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "officejet 4652 k9v84b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "officejet 4652 f1j02a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 6540 b9s59a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "deskjet ink advantage 3545 a9t81a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "32"
      },
      {
        "model": "xp-702",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "envy 4507 e6g70b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 7100 k7g93a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4508 e6g72b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4520 e6g67b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 111 cq810a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 6234 k7s21b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 7800 k7r96a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 7645 e4w44a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "deskjet ink advantage 4675 f1h97c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "officejet 4652 f1j05b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "xp-960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "dvg-n5412sp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "5034 z4a74a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 6200 k7g26b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "officejet 4656 k9v81b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5540 f2e72a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4503 e6g71b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "deskjet ink advantage 4518",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 100 cn517a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5000 m2u91a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5543 n9u88a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 7644 e4w46a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 6200 y0k15a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "adsl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": null
      },
      {
        "model": "envy 6052 5se18a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 7100 z3m37a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "deskjet ink advantage 3548 a9t81b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5000 z4a74a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4522 f0v67a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "deskjet ink advantage 4535 f0v64b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 100 cn519a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4520 f0v63b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 7155 z3m52a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 6200 k7g18a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 114 cq811b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5664 f8b08a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hg532e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "envy 4523 j6u60b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "amg1202-t10b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zyxel",
        "version": null
      },
      {
        "model": "envy 5020 m2u91b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 110 cq809b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 7800 k7s00a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5542 k7c88a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "officejet 4657 v6d29b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hg255s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "envy 4500 a9t80b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4521 k9t10b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "deskjet ink advantage 4515",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "deskjet ink advantage 4675 f1h97b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 7164 k7g99a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5540 g0v52a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4512 k9h49a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "xp-320",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "envy 6020 5se17a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "xp-2101",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "envy 100 cn517b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "xp-241",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "deskjet ink advantage 3456 a9t84c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4500 d3p93a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "5030 z4a70a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 100 cn517c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5540 g0v53a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "wap351",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "envy 5534",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "5660 f8b04a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "xp-620",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "deskjet ink advantage 3545 a9t81c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4520 f0v69a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4501 c8d05a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5535",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 6222 y0k14d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4511 k9h50a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ep-101",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "deskjet ink advantage 4675 f1h97a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5642 b9s64a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "zxv10 w300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zte",
        "version": null
      },
      {
        "model": "envy 5540 g0v47a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4500 a9t89a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4509 d3p94b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5539",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 7800 y0g52b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "deskjet ink advantage 3545 a9t83b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "officejet 4650 e6g87a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 7120 z3m41d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "deskjet ink advantage 4676 f1h98a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4524 f0v72b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 120 cz022a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 110 cq809d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "wr8165n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "envy 110 cq812c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "deskjet ink advantage 5575 g0v48b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "officejet 4655 k9v79a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "officejet 4654 f1j06b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 120 cz022b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "wap150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "envy 5640 b9s56a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4504 a9t88b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "xp-330",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "envy pro 6420 6wd16a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4520 f0v63a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4526 k9t05b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "officejet 4650 f1h96a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4502 a9t87b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "officejet 4650 f1h96b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy pro 6455 5se45a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 7822 y0g43d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "xp-4105",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "selphy cp1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canon",
        "version": null
      },
      {
        "model": "xp-100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "envy 5643 b9s63a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "deskjet ink advantage 4535 f0v64a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "officejet 4655 f1j00a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 110 cq809a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "10.0"
      },
      {
        "model": "archer c50",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "tp link",
        "version": null
      },
      {
        "model": "envy photo 6220 k7g20d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "xp-8600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "wnhde111",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netgear",
        "version": null
      },
      {
        "model": "officejet 4654 f1j07b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "xp-2105",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "envy 5531",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 6200 k7s21b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4524 k9t01a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "31"
      },
      {
        "model": "envy 5544 k7c93a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hostapd",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "w1 fi",
        "version": "2.0.0"
      },
      {
        "model": "officejet 4655 k9v82b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "xp-340",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "envy 4524 f0v71b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 7100 3xd89a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4528 k9t08b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5530",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "xp-440",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "envy photo 6200 y0k13d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 6230 k7g25b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 114 cq812a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "deskjet ink advantage 4536 f0v65a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4502 a9t85a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5548 k7g87a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ew-m970a3t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "envy 5000 m2u94b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 6020 6wd35a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "officejet 4658 v6d30b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 100 cn519b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "rt-n11",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "asus",
        "version": null
      },
      {
        "model": "deskjet ink advantage 3546 a9t82a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4513 k9h51a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 6020 7cz37a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 6220 k7g21b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5000 m2u91a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "vmg8324-b10a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zyxel",
        "version": null
      },
      {
        "model": "unifi controller",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "ui",
        "version": null
      },
      {
        "model": "xp-4100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "deskjet ink advantage 5575 g0v48c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5546 k7c90a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5644 b9s65a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "20.04"
      },
      {
        "model": "envy 6020 5se16b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 7800 k7s10d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5547 j6u64a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 7800 y0g42d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4520 e6g67a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5540 g0v51a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "zonedirector 1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "ruckussecurity",
        "version": null
      },
      {
        "model": "envy 5000 z4a54a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "b1165nfw",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dell",
        "version": null
      },
      {
        "model": "deskjet ink advantage 4678 f1h99b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5000 m2u85b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy pro 6420 6wd14a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "xbox one",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "10.0.19041.2494"
      },
      {
        "model": "envy 5532",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4504 c8d04a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5544 k7c89a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "xp-970",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "envy photo 7830 y0g50b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5640 b9s58a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "wap131",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "xp-8500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "5030 m2u92b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "deskjet ink advantage 4535 f0v64c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4509 d3p94a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5536",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5665 f8b06a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5000 m2u85a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 100 cn518a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 5540 k7c85a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "xp-630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "envy 5545 g0v50a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 7100 k7g99a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 114 cq811a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "m571t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "epson",
        "version": null
      },
      {
        "model": "envy pro 6420 5se46a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 7822 y0g42d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy photo 6252 k7g22a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "envy 4527 j6u61b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "rt-n11",
        "scope": null,
        "trust": 0.8,
        "vendor": "asustek computer",
        "version": null
      },
      {
        "model": "adsl",
        "scope": null,
        "trust": 0.8,
        "vendor": "broadcom",
        "version": null
      },
      {
        "model": "dvg-n5412sp",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "unifi controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "ubiquiti",
        "version": null
      },
      {
        "model": "hostapd",
        "scope": null,
        "trust": 0.8,
        "vendor": "w1 fi",
        "version": null
      },
      {
        "model": "selphy cp1200",
        "scope": null,
        "trust": 0.8,
        "vendor": "canon",
        "version": null
      },
      {
        "model": "wap131",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "wap150",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "wap351",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "b1165nfw",
        "scope": null,
        "trust": 0.8,
        "vendor": "dell",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006708"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12695"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:ui:unifi_controller:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2.0.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:asus:rt-n11:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:broadcom:adsl:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:canon:selphy_cp1200:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:cisco:wap150:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:wap351:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:wap131:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:dlink:dvg-n5412sp:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:dell:b1165nfw:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:epson:ew-m970a3t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:ep-101:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-8500:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-702:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-340:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-620:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-320:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-960:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-2101:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-330:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-2105:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-100:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-630:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-8600:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-4105:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-241:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-4100:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-970:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:xp-440:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:epson:m571t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5000_m2u85a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5000_m2u85b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5000_m2u91a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5000_m2u94b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5000_z4a54a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5000_z4a74a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_6200_k7g18a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_6200_k7g26b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_6200_k7s21b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_6200_y0k13d_:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_6200_y0k15a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7100_3xd89a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7100_k7g93a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7100_k7g99a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7100_z3m37a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7100_z3m52a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7800_k7r96a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7800_k7s00a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7800_k7s10d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7800_y0g42d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7800_y0g52b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5020_m2u91b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_114_cq811a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_114_cq811b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_114_cq812a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_111_cq810a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_110_cq809c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_110_cq809a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_110_cq809b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_110_cq809d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_110_cq812c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_100_cn517a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_100_cn517b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_100_cn517c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_100_cn518a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_100_cn519a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_100_cn519b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5000_m2u91a:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_pro_6420_5se45b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_pro_6420_5se46a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_pro_6420_6wd14a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_pro_6420_6wd16a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_pro_6452_5se47a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_pro_6455_5se45a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:5020_z4a69a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:5030_m2u92b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:5030_z4a70a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:5034_z4a74a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:5660_f8b04a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5665_f8b06a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5664_f8b08a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_7640:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_7644_e4w46a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_7645_e4w44a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5640_b9s56a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5640_b9s58a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_6540_b9s59a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5642_b9s64a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5643_b9s63a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5644_b9s65a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5646_f8b05a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5540_f2e72a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5540_g0v47a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5540_g0v52a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5540_g0v51a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5540_g0v53a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5540_k7c85a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5541_k7g89a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5542_k7c88a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5543_n9u88a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5544_k7c89a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5544_k7c93a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5545_g0v50a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5546_k7c90a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5547_j6u64a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5548_k7g87a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_4536_f0v65a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_4538_f0v66b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_4676_f1h98a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_4678_f1h99b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4511_k9h50a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4512_k9h49a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4513_k9h51a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4516_k9h52a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4520_e6g67a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4520_e6g67b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4520_f0v63a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4520_f0v63b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4520_f0v69a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4521_k9t10b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4522_f0v67a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4523_j6u60b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4524_f0v71b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4524_f0v72b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4524_k9t01a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4525_k9t09b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4526_k9t05b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4527_j6u61b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4528_k9t08b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:officejet_4650_e6g87a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:officejet_4650_f1h96a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:officejet_4650_f1h96b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:officejet_4652_f1j02a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:officejet_4652_k9v84b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:officejet_4652_f1j05b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:officejet_4654_f1j07b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:officejet_4654_f1j06b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:officejet_4655_f1j00a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:officejet_4655_k9v79a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:officejet_4655_k9v82b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:officejet_4656_k9v81b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:officejet_4657_v6d29b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:officejet_4658_v6d30b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5530:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5536:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5531:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5539:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5532:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_4515:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5534:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_4518:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_5535:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t83b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_3546_a9t82a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_3456_a9t84c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:deskjet_ink_advantage_3548_a9t81b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4509_d3p94a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4509_d3p94b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4501_c8d05a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4502_a9t85a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4502_a9t87b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4503_e6g71b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4504_a9t88b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4504_c8d04a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4505_a9t86a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4507_e6g70b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4508_e6g72b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4500_a9t80a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4500_a9t80b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4500_a9t89a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_4500_d3p93a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_120_cz022a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_120_cz022b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_120_cz022c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_6220_k7g20d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_6220_k7g21b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_6230_k7g25b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_6232_k7g26b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_6234_k7s21b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_6252_k7g22a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_6222_y0k13d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_6222_y0k14d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7830_y0g50b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7822_y0g42d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7822_y0g43d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7120_z3m41d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7155_z3m52a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_photo_7164_k7g99a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_6020_5se16b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_6020_5se17a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_6020_6wd35a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_6020_7cz37a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_6052_5se18a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:envy_6055_5se16a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:huawei:hg532e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:hg255s:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:nec:wr8165n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:netgear:wnhde111:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:ruckussecurity:zonedirector_1200:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:tp-link:archer_c50:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:zyxel:amg1202-t10b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:microsoft:xbox_one:10.0.19041.2494:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-12695"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "This vulnerability was reported by Yunus \u00c7adirci from EY Turkey. This document was written by Vijay Sarvepalli. ",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#339275"
      }
    ],
    "trust": 0.8
  },
  "cve": "CVE-2020-12695",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "impactScore": 7.8,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-006708",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-165399",
            "impactScore": 7.8,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULMON",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2020-12695",
            "impactScore": 7.8,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.2,
            "impactScore": 4.7,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-006708",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-12695",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2020-006708",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202006-597",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-165399",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-12695",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-165399"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-12695"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006708"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-597"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12695"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue. The Universal Plug and Play (UPnP) protocol in effect prior to April 17, 2020 can be abused to send traffic to arbitrary destinations using the SUBSCRIBE functionality. The UPnP protocol, as specified by the Open Connectivity Foundation (OCF), is designed to provide  automatic  discovery and interaction with devices on a network. The UPnP protocol is designed to be used in a trusted local area network (LAN) and the protocol does not implement any form of authentication or verification. Many common Internet-connected devices support UPnP, as noted in previous research from Daniel Garcia (VU#357851) and Rapid7. Garcia presented at DEFCON 2019 and published a scanning and portmapping tool. The UPnP Device Protection service was not widely adopted. A vulnerability in the UPnP SUBSCRIBE capability permits an attacker to send large amounts of data to arbitrary destinations accessible over the Internet, which could lead to a Distributed Denial of Service (DDoS), data exfiltration, and other unexpected network behavior. The OCF has updated the UPnP specification to address this issue. This vulnerability has been assigned  CVE-2020-12695 and is also known as Call Stranger. Although offering UPnP services on the Internet is generally considered to be a misconfiguration, a number of devices are still available over the Internet according to a  recent Shodan scan. A remote, unauthenticated attacker may be able to abuse the UPnP SUBSCRIBE capability to send traffic to arbitrary destinations, leading to amplified DDoS attacks and data exfiltration. In general, making UPnP available over the the Internet can pose further security vulnerabilities than the one described in this vulnerability note. Open Connectivity Foundation UPnP There is a vulnerability in the specification regarding improper default permissions.Information is obtained and service operation is interrupted (DoS) It may be put into a state. A security vulnerability exists in UPnP versions prior to 2020-04-17. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Moderate: gssdp and gupnp security update\nAdvisory ID:       RHSA-2021:1789-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2021:1789\nIssue date:        2021-05-18\nCVE Names:         CVE-2020-12695\n====================================================================\n1. Summary:\n\nAn update for gssdp and gupnp is now available for Red Hat Enterprise Linux\n8. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat CodeReady Linux Builder (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64\n\n3. Description:\n\nGUPnP is an object-oriented open source framework for creating UPnP devices\nand control points, written in C using GObject and libsoup. The GUPnP API\nis intended to be easy to use, efficient and flexible. \n\nGSSDP implements resource discovery and announcement over SSDP and is part\nof gUPnP. \n\nThe following packages have been upgraded to a later upstream version:\ngssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928)\n\nSecurity Fix(es):\n\n* hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 8.4 Release Notes linked from the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1846006 - CVE-2020-12695 hostapd: UPnP SUBSCRIBE misbehavior in WPS AP\n\n6. Package List:\n\nRed Hat Enterprise Linux AppStream (v. 8):\n\nSource:\ngssdp-1.0.5-1.el8.src.rpm\ngupnp-1.0.6-1.el8.src.rpm\n\naarch64:\ngssdp-1.0.5-1.el8.aarch64.rpm\ngssdp-debuginfo-1.0.5-1.el8.aarch64.rpm\ngssdp-debugsource-1.0.5-1.el8.aarch64.rpm\ngssdp-utils-debuginfo-1.0.5-1.el8.aarch64.rpm\ngupnp-1.0.6-1.el8.aarch64.rpm\ngupnp-debuginfo-1.0.6-1.el8.aarch64.rpm\ngupnp-debugsource-1.0.6-1.el8.aarch64.rpm\n\nppc64le:\ngssdp-1.0.5-1.el8.ppc64le.rpm\ngssdp-debuginfo-1.0.5-1.el8.ppc64le.rpm\ngssdp-debugsource-1.0.5-1.el8.ppc64le.rpm\ngssdp-utils-debuginfo-1.0.5-1.el8.ppc64le.rpm\ngupnp-1.0.6-1.el8.ppc64le.rpm\ngupnp-debuginfo-1.0.6-1.el8.ppc64le.rpm\ngupnp-debugsource-1.0.6-1.el8.ppc64le.rpm\n\ns390x:\ngssdp-1.0.5-1.el8.s390x.rpm\ngssdp-debuginfo-1.0.5-1.el8.s390x.rpm\ngssdp-debugsource-1.0.5-1.el8.s390x.rpm\ngssdp-utils-debuginfo-1.0.5-1.el8.s390x.rpm\ngupnp-1.0.6-1.el8.s390x.rpm\ngupnp-debuginfo-1.0.6-1.el8.s390x.rpm\ngupnp-debugsource-1.0.6-1.el8.s390x.rpm\n\nx86_64:\ngssdp-1.0.5-1.el8.i686.rpm\ngssdp-1.0.5-1.el8.x86_64.rpm\ngssdp-debuginfo-1.0.5-1.el8.i686.rpm\ngssdp-debuginfo-1.0.5-1.el8.x86_64.rpm\ngssdp-debugsource-1.0.5-1.el8.i686.rpm\ngssdp-debugsource-1.0.5-1.el8.x86_64.rpm\ngssdp-utils-debuginfo-1.0.5-1.el8.i686.rpm\ngssdp-utils-debuginfo-1.0.5-1.el8.x86_64.rpm\ngupnp-1.0.6-1.el8.i686.rpm\ngupnp-1.0.6-1.el8.x86_64.rpm\ngupnp-debuginfo-1.0.6-1.el8.i686.rpm\ngupnp-debuginfo-1.0.6-1.el8.x86_64.rpm\ngupnp-debugsource-1.0.6-1.el8.i686.rpm\ngupnp-debugsource-1.0.6-1.el8.x86_64.rpm\n\nRed Hat CodeReady Linux Builder (v. 8):\n\naarch64:\ngssdp-debuginfo-1.0.5-1.el8.aarch64.rpm\ngssdp-debugsource-1.0.5-1.el8.aarch64.rpm\ngssdp-devel-1.0.5-1.el8.aarch64.rpm\ngssdp-utils-debuginfo-1.0.5-1.el8.aarch64.rpm\ngupnp-debuginfo-1.0.6-1.el8.aarch64.rpm\ngupnp-debugsource-1.0.6-1.el8.aarch64.rpm\ngupnp-devel-1.0.6-1.el8.aarch64.rpm\n\nnoarch:\ngssdp-docs-1.0.5-1.el8.noarch.rpm\n\nppc64le:\ngssdp-debuginfo-1.0.5-1.el8.ppc64le.rpm\ngssdp-debugsource-1.0.5-1.el8.ppc64le.rpm\ngssdp-devel-1.0.5-1.el8.ppc64le.rpm\ngssdp-utils-debuginfo-1.0.5-1.el8.ppc64le.rpm\ngupnp-debuginfo-1.0.6-1.el8.ppc64le.rpm\ngupnp-debugsource-1.0.6-1.el8.ppc64le.rpm\ngupnp-devel-1.0.6-1.el8.ppc64le.rpm\n\ns390x:\ngssdp-debuginfo-1.0.5-1.el8.s390x.rpm\ngssdp-debugsource-1.0.5-1.el8.s390x.rpm\ngssdp-devel-1.0.5-1.el8.s390x.rpm\ngssdp-utils-debuginfo-1.0.5-1.el8.s390x.rpm\ngupnp-debuginfo-1.0.6-1.el8.s390x.rpm\ngupnp-debugsource-1.0.6-1.el8.s390x.rpm\ngupnp-devel-1.0.6-1.el8.s390x.rpm\n\nx86_64:\ngssdp-debuginfo-1.0.5-1.el8.i686.rpm\ngssdp-debuginfo-1.0.5-1.el8.x86_64.rpm\ngssdp-debugsource-1.0.5-1.el8.i686.rpm\ngssdp-debugsource-1.0.5-1.el8.x86_64.rpm\ngssdp-devel-1.0.5-1.el8.i686.rpm\ngssdp-devel-1.0.5-1.el8.x86_64.rpm\ngssdp-utils-debuginfo-1.0.5-1.el8.i686.rpm\ngssdp-utils-debuginfo-1.0.5-1.el8.x86_64.rpm\ngupnp-debuginfo-1.0.6-1.el8.i686.rpm\ngupnp-debuginfo-1.0.6-1.el8.x86_64.rpm\ngupnp-debugsource-1.0.6-1.el8.i686.rpm\ngupnp-debugsource-1.0.6-1.el8.x86_64.rpm\ngupnp-devel-1.0.6-1.el8.i686.rpm\ngupnp-devel-1.0.6-1.el8.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-12695\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n7bb2GlcOcWo=2GSN\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. (CVE-2020-12695)\n\nIt was discovered that ReadyMedia (MiniDLNA) allowed remote code execution. =========================================================================\nUbuntu Security Notice USN-4734-2\nFebruary 16, 2021\n\nwpa vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in wpa_supplicant and hostapd. \n\nSoftware Description:\n- wpa: client support for WPA and WPA2\n\nDetails:\n\nUSN-4734-1 fixed several vulnerabilities in wpa_supplicant. This\nupdate provides the corresponding update for Ubuntu 14.04 ESM. \n\nIt was discovered that wpa_supplicant did not properly handle P2P\n(Wi-Fi Direct) group information in some situations, leading to a\nheap overflow. A physically proximate attacker could use this to cause a\ndenial of service or possibly execute arbitrary code. (CVE-2021-0326)\n\nIt was discovered that hostapd did not properly handle UPnP subscribe\nmessages in some circumstances. An attacker could use this to cause a\ndenial of service. (CVE-2020-12695)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 ESM:\n  hostapd                         1:2.1-0ubuntu1.7+esm3\n  wpasupplicant                   2.1-0ubuntu1.7+esm3\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nFor the stable distribution (buster), these problems have been fixed in\nversion 2:2.7+git20190128+0c1e29f-6+deb10u3. \n\nWe recommend that you upgrade your wpa packages. \n\nFor the detailed security status of wpa please refer to its security\ntracker page at:\nhttps://security-tracker.debian.org/tracker/wpa\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\ne5JGaYRgwa6TUxj4UjWnbdIKMpElbtXbMIOHSvG2Gnx/21siyg0=\n=CU/j\n-----END PGP SIGNATURE-----\n. In addition minidlna was susceptible to the\n\"CallStranger\" UPnP vulnerability",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-12695"
      },
      {
        "db": "CERT/CC",
        "id": "VU#339275"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006708"
      },
      {
        "db": "VULHUB",
        "id": "VHN-165399"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-12695"
      },
      {
        "db": "PACKETSTORM",
        "id": "162672"
      },
      {
        "db": "PACKETSTORM",
        "id": "159172"
      },
      {
        "db": "PACKETSTORM",
        "id": "161288"
      },
      {
        "db": "PACKETSTORM",
        "id": "161444"
      },
      {
        "db": "PACKETSTORM",
        "id": "161397"
      },
      {
        "db": "PACKETSTORM",
        "id": "169049"
      },
      {
        "db": "PACKETSTORM",
        "id": "168951"
      }
    ],
    "trust": 3.15
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-12695",
        "trust": 4.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#339275",
        "trust": 3.3
      },
      {
        "db": "PACKETSTORM",
        "id": "158051",
        "trust": 1.7
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2020/06/08/2",
        "trust": 1.7
      },
      {
        "db": "PACKETSTORM",
        "id": "161288",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "162672",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "159172",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006708",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-597",
        "trust": 0.7
      },
      {
        "db": "CS-HELP",
        "id": "SB2021122905",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021052202",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1382",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0575",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4315",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1728",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0417",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4372",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.2705",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4315.2",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.2733",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.3160",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "161444",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "161397",
        "trust": 0.2
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-37941",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-165399",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-12695",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "169049",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "168951",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#339275"
      },
      {
        "db": "VULHUB",
        "id": "VHN-165399"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-12695"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006708"
      },
      {
        "db": "PACKETSTORM",
        "id": "162672"
      },
      {
        "db": "PACKETSTORM",
        "id": "159172"
      },
      {
        "db": "PACKETSTORM",
        "id": "161288"
      },
      {
        "db": "PACKETSTORM",
        "id": "161444"
      },
      {
        "db": "PACKETSTORM",
        "id": "161397"
      },
      {
        "db": "PACKETSTORM",
        "id": "169049"
      },
      {
        "db": "PACKETSTORM",
        "id": "168951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-597"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12695"
      }
    ]
  },
  "id": "VAR-202006-0391",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-165399"
      }
    ],
    "trust": 0.6333333333333333
  },
  "last_update_date": "2024-07-23T21:20:57.987000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "RT-N11",
        "trust": 0.8,
        "url": "https://www.asus.com/us/networking/rtn11/"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.broadcom.com/"
      },
      {
        "title": "Canon SELPHY CP1200",
        "trust": 0.8,
        "url": "https://en.canon-me.com/support/consumer_products/products/printers/compact_photo/cd__cp_series/selphy_cp1200.html?type=drivers\u0026language=\u0026os=windows%208.1%20(64-bit)"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.cisco.com/c/en/us/index.html"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://us.dlink.com/en/consumer"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.dell.com/en-us"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://community.ui.com/"
      },
      {
        "title": "hostapd",
        "trust": 0.8,
        "url": "https://jvndb.jvn.jp/ja/contents/2019/jvndb-2019-013311.html"
      },
      {
        "title": "Debian CVElist Bug Report Logs: wpa: CVE-2020-12695",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=cdef40da4b3b6b2f4fcf08e447d20494"
      },
      {
        "title": "Debian Security Advisories: DSA-4806-1 minidlna -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=5e0b1e00748aee507290bde9650370c7"
      },
      {
        "title": "Arch Linux Advisories: [ASA-202012-16] hostapd: proxy injection",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=asa-202012-16"
      },
      {
        "title": "Debian Security Advisories: DSA-4898-1 wpa -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=2832d7aeef980951ddf42089219be7b3"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2020-12695 log"
      },
      {
        "title": "awesome-from-stars",
        "trust": 0.1,
        "url": "https://github.com/krzemienski/awesome-from-stars "
      },
      {
        "title": "callstranger-detector",
        "trust": 0.1,
        "url": "https://github.com/corelight/callstranger-detector "
      },
      {
        "title": "CallStranger",
        "trust": 0.1,
        "url": "https://github.com/yunuscadirci/callstranger "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/xcod3bughunt3r/callstranger "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/yunuscadirci/dialstranger "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/aoeii/asuswrt-for-tenda-ac9-router "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2020-12695"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006708"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-276",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-165399"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006708"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12695"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "https://www.kb.cert.org/vuls/id/339275"
      },
      {
        "trust": 2.5,
        "url": "https://github.com/yunuscadirci/callstranger"
      },
      {
        "trust": 2.5,
        "url": "https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of"
      },
      {
        "trust": 2.3,
        "url": "http://packetstormsecurity.com/files/158051/callstranger-upnp-vulnerability-checker.html"
      },
      {
        "trust": 1.7,
        "url": "https://www.debian.org/security/2020/dsa-4806"
      },
      {
        "trust": 1.7,
        "url": "https://www.debian.org/security/2021/dsa-4898"
      },
      {
        "trust": 1.7,
        "url": "https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/"
      },
      {
        "trust": 1.7,
        "url": "https://github.com/corelight/callstranger-detector"
      },
      {
        "trust": 1.7,
        "url": "https://www.callstranger.com"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.openwall.com/lists/oss-security/2020/06/08/2"
      },
      {
        "trust": 1.7,
        "url": "https://usn.ubuntu.com/4494-1/"
      },
      {
        "trust": 1.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12695"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/l3shl4lofghj3dixsuiqelgvbdj7v7lb/"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/mzdwhkgn3lmgsueoaavamod3iuipjvoj/"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/rqeyvy4d7lash6ai4wk3ik2qbfhhf3q2/"
      },
      {
        "trust": 0.8,
        "url": "https://callstranger.com"
      },
      {
        "trust": 0.8,
        "url": "https://openconnectivity.org/developer/specifications/upnp-resources/upnp/"
      },
      {
        "trust": 0.8,
        "url": "https://kb.cert.org/vuls/search/?q=upnp"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12695"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/ta/jvnta95827565/"
      },
      {
        "trust": 0.7,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/rqeyvy4d7lash6ai4wk3ik2qbfhhf3q2/"
      },
      {
        "trust": 0.7,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/mzdwhkgn3lmgsueoaavamod3iuipjvoj/"
      },
      {
        "trust": 0.7,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/l3shl4lofghj3dixsuiqelgvbdj7v7lb/"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021052202"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4372/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1728"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162672/red-hat-security-advisory-2021-1789-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021122905"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0417"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.3160/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.2733/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1382"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/159172/ubuntu-security-notice-usn-4494-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4315.2/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0575"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.2705/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4315/"
      },
      {
        "trust": 0.6,
        "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200701-01-upnp-cn"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/161288/ubuntu-security-notice-usn-4722-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/upnp-information-disclosure-via-subscribe-delivery-url-32701"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-0326"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28926"
      },
      {
        "trust": 0.2,
        "url": "https://usn.ubuntu.com/4734-1"
      },
      {
        "trust": 0.2,
        "url": "https://www.debian.org/security/faq"
      },
      {
        "trust": 0.2,
        "url": "https://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-12695"
      },
      {
        "trust": 0.1,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:1789"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.1,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/gupnp/1.2.3-0ubuntu0.20.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/4494-1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/minidlna/1.2.1+dfsg-1ubuntu0.18.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/minidlna/1.2.1+dfsg-1ubuntu0.20.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/minidlna/1.1.5+dfsg-2ubuntu0.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/minidlna/1.2.1+dfsg-2ubuntu0.1"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/4722-1"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/4734-2"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu6.7"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/wpa/2:2.9-1ubuntu8.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/wpa/2:2.6-15ubuntu2.7"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/wpa/2:2.9-1ubuntu4.2"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27803"
      },
      {
        "trust": 0.1,
        "url": "https://security-tracker.debian.org/tracker/wpa"
      },
      {
        "trust": 0.1,
        "url": "https://security-tracker.debian.org/tracker/minidlna"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#339275"
      },
      {
        "db": "VULHUB",
        "id": "VHN-165399"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006708"
      },
      {
        "db": "PACKETSTORM",
        "id": "162672"
      },
      {
        "db": "PACKETSTORM",
        "id": "159172"
      },
      {
        "db": "PACKETSTORM",
        "id": "161288"
      },
      {
        "db": "PACKETSTORM",
        "id": "161444"
      },
      {
        "db": "PACKETSTORM",
        "id": "161397"
      },
      {
        "db": "PACKETSTORM",
        "id": "169049"
      },
      {
        "db": "PACKETSTORM",
        "id": "168951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-597"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12695"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#339275"
      },
      {
        "db": "VULHUB",
        "id": "VHN-165399"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-12695"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-006708"
      },
      {
        "db": "PACKETSTORM",
        "id": "162672"
      },
      {
        "db": "PACKETSTORM",
        "id": "159172"
      },
      {
        "db": "PACKETSTORM",
        "id": "161288"
      },
      {
        "db": "PACKETSTORM",
        "id": "161444"
      },
      {
        "db": "PACKETSTORM",
        "id": "161397"
      },
      {
        "db": "PACKETSTORM",
        "id": "169049"
      },
      {
        "db": "PACKETSTORM",
        "id": "168951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-597"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12695"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-06-08T00:00:00",
        "db": "CERT/CC",
        "id": "VU#339275"
      },
      {
        "date": "2020-06-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-165399"
      },
      {
        "date": "2020-06-08T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-12695"
      },
      {
        "date": "2020-07-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-006708"
      },
      {
        "date": "2021-05-19T14:10:26",
        "db": "PACKETSTORM",
        "id": "162672"
      },
      {
        "date": "2020-09-15T17:05:32",
        "db": "PACKETSTORM",
        "id": "159172"
      },
      {
        "date": "2021-02-04T21:34:49",
        "db": "PACKETSTORM",
        "id": "161288"
      },
      {
        "date": "2021-02-16T23:41:17",
        "db": "PACKETSTORM",
        "id": "161444"
      },
      {
        "date": "2021-02-12T17:29:06",
        "db": "PACKETSTORM",
        "id": "161397"
      },
      {
        "date": "2021-04-28T19:12:00",
        "db": "PACKETSTORM",
        "id": "169049"
      },
      {
        "date": "2020-12-28T20:12:00",
        "db": "PACKETSTORM",
        "id": "168951"
      },
      {
        "date": "2020-06-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202006-597"
      },
      {
        "date": "2020-06-08T17:15:09.973000",
        "db": "NVD",
        "id": "CVE-2020-12695"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-07-08T00:00:00",
        "db": "CERT/CC",
        "id": "VU#339275"
      },
      {
        "date": "2021-04-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-165399"
      },
      {
        "date": "2023-11-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-12695"
      },
      {
        "date": "2020-07-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-006708"
      },
      {
        "date": "2023-04-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202006-597"
      },
      {
        "date": "2024-04-08T22:50:14.587000",
        "db": "NVD",
        "id": "CVE-2020-12695"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "159172"
      },
      {
        "db": "PACKETSTORM",
        "id": "161288"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-597"
      }
    ],
    "trust": 0.8
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Universal Plug and Play (UPnP) SUBSCRIBE can be abused to send traffic to arbitrary destinations",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#339275"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202006-597"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.