TROYANOSYVIRUS
Voltar para CVEs

CVE-2020-6959

CRITICAL
9.8

Descricao

The following versions of MAXPRO VMS and NVR, MAXPRO VMS:HNMSWVMS prior to Version VMS560 Build 595 T2-Patch, HNMSWVMSLT prior to Version VMS560 Build 595 T2-Patch, MAXPRO NVR: MAXPRO NVR XE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR SE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR PE prior to Version NVR 5.6 Build 595 T2-Patch, and MPNVRSWXX prior to Version NVR 5.6 Build 595 T2-Patch are vulnerable to an unsafe deserialization of untrusted data. An attacker may be able to remotely modify deserialized data without authentication using a specially crafted web request, resulting in remote code execution.

Detalhes CVE

Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado1/22/2020
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0

Produtos afetados

honeywell:hnmswvmshoneywell:hnmswvms_firmwarehoneywell:hnmswvmslthoneywell:hnmswvmslt_firmwarehoneywell:maxpro_nvr_pehoneywell:maxpro_nvr_pe_firmwarehoneywell:maxpro_nvr_sehoneywell:maxpro_nvr_se_firmwarehoneywell:maxpro_nvr_xehoneywell:maxpro_nvr_xe_firmwarehoneywell:mpnvrswxxhoneywell:mpnvrswxx_firmware

Fraquezas (CWE)

CWE-502CWE-502

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.