TROYANOSYVIRUS
Retour aux CVEs

CVE-2020-6959

CRITICAL
9.8

Description

The following versions of MAXPRO VMS and NVR, MAXPRO VMS:HNMSWVMS prior to Version VMS560 Build 595 T2-Patch, HNMSWVMSLT prior to Version VMS560 Build 595 T2-Patch, MAXPRO NVR: MAXPRO NVR XE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR SE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR PE prior to Version NVR 5.6 Build 595 T2-Patch, and MPNVRSWXX prior to Version NVR 5.6 Build 595 T2-Patch are vulnerable to an unsafe deserialization of untrusted data. An attacker may be able to remotely modify deserialized data without authentication using a specially crafted web request, resulting in remote code execution.

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie1/22/2020
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0

Produits affectes

honeywell:hnmswvmshoneywell:hnmswvms_firmwarehoneywell:hnmswvmslthoneywell:hnmswvmslt_firmwarehoneywell:maxpro_nvr_pehoneywell:maxpro_nvr_pe_firmwarehoneywell:maxpro_nvr_sehoneywell:maxpro_nvr_se_firmwarehoneywell:maxpro_nvr_xehoneywell:maxpro_nvr_xe_firmwarehoneywell:mpnvrswxxhoneywell:mpnvrswxx_firmware

Faiblesses (CWE)

CWE-502CWE-502

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.