TROYANOSYVIRUS
Volver a CVEs

CVE-2020-6959

CRITICAL
9.8

Descripcion

The following versions of MAXPRO VMS and NVR, MAXPRO VMS:HNMSWVMS prior to Version VMS560 Build 595 T2-Patch, HNMSWVMSLT prior to Version VMS560 Build 595 T2-Patch, MAXPRO NVR: MAXPRO NVR XE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR SE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR PE prior to Version NVR 5.6 Build 595 T2-Patch, and MPNVRSWXX prior to Version NVR 5.6 Build 595 T2-Patch are vulnerable to an unsafe deserialization of untrusted data. An attacker may be able to remotely modify deserialized data without authentication using a specially crafted web request, resulting in remote code execution.

Detalles CVE

Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado1/22/2020
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0

Productos afectados

honeywell:hnmswvmshoneywell:hnmswvms_firmwarehoneywell:hnmswvmslthoneywell:hnmswvmslt_firmwarehoneywell:maxpro_nvr_pehoneywell:maxpro_nvr_pe_firmwarehoneywell:maxpro_nvr_sehoneywell:maxpro_nvr_se_firmwarehoneywell:maxpro_nvr_xehoneywell:maxpro_nvr_xe_firmwarehoneywell:mpnvrswxxhoneywell:mpnvrswxx_firmware

Debilidades (CWE)

CWE-502CWE-502

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.