← Back to CVEs
CVE-2020-16134
HIGH8.0
Description
An issue was discovered on Swisscom Internet Box 2, Internet Box Standard, Internet Box Plus prior to 10.04.38, Internet Box 3 prior to 11.01.20, and Internet Box light prior to 08.06.06. Given the (user-configurable) credentials for the local Web interface or physical access to a device's plus or reset button, an attacker can create a user with elevated privileges on the Sysbus-API. This can then be used to modify local or remote SSH access, thus allowing a login session as the superuser.
CVE Details
CVSS v3.1 Score8.0
SeverityHIGH
CVSS VectorCVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorADJACENT_NETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published8/4/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
swisscom:internet-box_2swisscom:internet-box_2_firmwareswisscom:internet-box_3swisscom:internet-box_3_firmwareswisscom:internet-box_lightswisscom:internet-box_light_firmwareswisscom:internet-box_plusswisscom:internet-box_plus_firmwareswisscom:internet-box_standardswisscom:internet-box_standard_firmware
References
https://www.swisscom.ch(cve@mitre.org)
https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2020-16134.txt(cve@mitre.org)
https://www.swisscom.ch(af854a3a-2127-422b-91ae-364da2661108)
https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2020-16134.txt(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.