CWE-353
Missing Support for Integrity Check
The product uses a transmission protocol that does not include a mechanism for verifying the integrity of the data during transmission, such as a checksum.
CVE-2019-10943 (GCVE-0-2019-10943)
Vulnerability from cvelistv5
- CWE-353 - Missing Support for Integrity Check
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:40:15.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-232418.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SIMATIC Drive Controller family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V20.8" } ] }, { "product": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V20.8" } ] }, { "product": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4.0" } ] }, { "product": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V4.4.0" } ] }, { "product": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.1" } ] }, { "product": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.8.1" } ] }, { "product": "SIMATIC S7-1500 Software Controller", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V20.8" } ] }, { "product": "SIMATIC S7-1500 Software Controller", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V20.8" } ] }, { "product": "SIMATIC S7-PLCSIM Advanced", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "product": "SIMATIC S7-PLCSIM Advanced", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC Drive Controller family (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions \u003c V20.8), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions \u003e= V20.8), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions \u003c V4.4.0), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions \u003e= V4.4.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions \u003c V2.8.1), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions \u003e= V2.8.1), SIMATIC S7-1500 Software Controller (All versions \u003c V20.8), SIMATIC S7-1500 Software Controller (All versions \u003e= V20.8), SIMATIC S7-PLCSIM Advanced (All versions \u003c V3.0), SIMATIC S7-PLCSIM Advanced (All versions \u003e= V3.0). An attacker with network access to port 102/tcp could potentially modify the user program on the PLC in a way that the running code is different from the source code which is stored on the device. An attacker must have network access to affected devices and must be able to perform changes to the user program. The vulnerability could impact the perceived integrity of the user program stored on the CPU. An engineer that tries to obtain the code of the user program running on the device, can receive different source code that is not actually running on the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-353", "description": "CWE-353: Missing Support for Integrity Check", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-10T11:16:23", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-232418.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-10943", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SIMATIC Drive Controller family", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)", "version": { "version_data": [ { "version_value": "All versions \u003c V20.8" } ] } }, { "product_name": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)", "version": { "version_data": [ { "version_value": "All versions \u003e= V20.8" } ] } }, { "product_name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.4.0" } ] } }, { "product_name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)", "version": { "version_data": [ { "version_value": "All versions \u003e= V4.4.0" } ] } }, { "product_name": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)", "version": { "version_data": [ { "version_value": "All versions \u003c V2.8.1" } ] } }, { "product_name": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.8.1" } ] } }, { "product_name": "SIMATIC S7-1500 Software Controller", "version": { "version_data": [ { "version_value": "All versions \u003c V20.8" } ] } }, { "product_name": "SIMATIC S7-1500 Software Controller", "version": { "version_data": [ { "version_value": "All versions \u003e= V20.8" } ] } }, { "product_name": "SIMATIC S7-PLCSIM Advanced", "version": { "version_data": [ { "version_value": "All versions \u003c V3.0" } ] } }, { "product_name": "SIMATIC S7-PLCSIM Advanced", "version": { "version_data": [ { "version_value": "All versions \u003e= V3.0" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SIMATIC Drive Controller family (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions \u003c V20.8), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions \u003e= V20.8), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions \u003c V4.4.0), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions \u003e= V4.4.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions \u003c V2.8.1), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions \u003e= V2.8.1), SIMATIC S7-1500 Software Controller (All versions \u003c V20.8), SIMATIC S7-1500 Software Controller (All versions \u003e= V20.8), SIMATIC S7-PLCSIM Advanced (All versions \u003c V3.0), SIMATIC S7-PLCSIM Advanced (All versions \u003e= V3.0). An attacker with network access to port 102/tcp could potentially modify the user program on the PLC in a way that the running code is different from the source code which is stored on the device. An attacker must have network access to affected devices and must be able to perform changes to the user program. The vulnerability could impact the perceived integrity of the user program stored on the CPU. An engineer that tries to obtain the code of the user program running on the device, can receive different source code that is not actually running on the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-353: Missing Support for Integrity Check" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-232418.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-232418.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-10943", "datePublished": "2019-08-13T18:55:57", "dateReserved": "2019-04-08T00:00:00", "dateUpdated": "2024-08-04T22:40:15.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11480 (GCVE-0-2019-11480)
Vulnerability from cvelistv5
- CWE-353 - Missing Support for Integrity Check
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:55:40.287Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11480" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.launchpad.net/bugs/1836041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pc-kernel", "vendor": "Canonical", "versions": [ { "lessThanOrEqual": "2019-07-16", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Sachi King" } ], "datePublic": "2019-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The pc-kernel snap build process hardcoded the --allow-insecure-repositories and --allow-unauthenticated apt options when creating the build chroot environment. This could allow an attacker who is able to perform a MITM attack between the build environment and the Ubuntu archive to install a malicious package within the build chroot. This issue affects pc-kernel versions prior to and including 2019-07-16" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-353", "description": "CWE-353: Missing Support for Integrity Check", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-14T02:10:13", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11480" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.launchpad.net/bugs/1836041" } ], "source": { "defect": [ "https://bugs.launchpad.net/bugs/1836041" ], "discovery": "EXTERNAL" }, "title": "Ubuntu kernel snap build process could use unauthenticated sources", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "DATE_PUBLIC": "2019-07-19T00:00:00.000Z", "ID": "CVE-2019-11480", "STATE": "PUBLIC", "TITLE": "Ubuntu kernel snap build process could use unauthenticated sources" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pc-kernel", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2019-07-16" } ] } } ] }, "vendor_name": "Canonical" } ] } }, "credit": [ { "lang": "eng", "value": "Sachi King" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The pc-kernel snap build process hardcoded the --allow-insecure-repositories and --allow-unauthenticated apt options when creating the build chroot environment. This could allow an attacker who is able to perform a MITM attack between the build environment and the Ubuntu archive to install a malicious package within the build chroot. This issue affects pc-kernel versions prior to and including 2019-07-16" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-353: Missing Support for Integrity Check" } ] } ] }, "references": { "reference_data": [ { "name": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11480", "refsource": "MISC", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11480" }, { "name": "https://bugs.launchpad.net/bugs/1836041", "refsource": "MISC", "url": "https://bugs.launchpad.net/bugs/1836041" } ] }, "source": { "defect": [ "https://bugs.launchpad.net/bugs/1836041" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2019-11480", "datePublished": "2020-04-14T02:10:13.554325Z", "dateReserved": "2019-04-23T00:00:00", "dateUpdated": "2024-09-16T20:46:41.386Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-12804 (GCVE-0-2019-12804)
Vulnerability from cvelistv5
- CWE-353 - Missing Support for Integrity Check
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:32:55.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "i-oneNet", "vendor": "Hunesion", "versions": [ { "status": "affected", "version": "3.0.7~3.0.53" }, { "status": "affected", "version": "4.0.4~4.0.16" } ] } ], "descriptions": [ { "lang": "en", "value": "In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, due to the lack of update file integrity checking in the upgrade process, an attacker can craft malicious file and use it as an update." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-353", "description": "CWE-353 Missing Support for Integrity Check", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-10T19:38:09", "orgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "shortName": "krcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073" } ], "source": { "discovery": "UNKNOWN" }, "title": "Hunesion i-oneNet Missing Support for Integrity Check vulnerability", "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vuln@krcert.or.kr", "ID": "CVE-2019-12804", "STATE": "PUBLIC", "TITLE": "Hunesion i-oneNet Missing Support for Integrity Check vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "i-oneNet", "version": { "version_data": [ { "version_name": "3.0", "version_value": "3.0.7~3.0.53" }, { "version_name": "4.0", "version_value": "4.0.4~4.0.16" } ] } } ] }, "vendor_name": "Hunesion" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, due to the lack of update file integrity checking in the upgrade process, an attacker can craft malicious file and use it as an update." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-353 Missing Support for Integrity Check" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073", "refsource": "CONFIRM", "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "assignerShortName": "krcert", "cveId": "CVE-2019-12804", "datePublished": "2019-07-10T19:38:09", "dateReserved": "2019-06-13T00:00:00", "dateUpdated": "2024-08-04T23:32:55.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-19160 (GCVE-0-2019-19160)
Vulnerability from cvelistv5
- CWE-353 - Missing Support for Integrity Check
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Cabsoftware | Reportexpress ProPlus |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:09:39.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cabsoftware.com:8080/HomePage2015A/html/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35474" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Reportexpress ProPlus", "vendor": "Cabsoftware", "versions": [ { "lessThanOrEqual": "3.0.0.62", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Eunsol Lee" } ], "descriptions": [ { "lang": "en", "value": "Reportexpress ProPlus contains a vulnerability that could allow an arbitrary code execution by inserted VBscript into the configure file(rxp)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-353", "description": "CWE-353 Missing Support for Integrity Check", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-29T13:32:06", "orgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "shortName": "krcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.cabsoftware.com:8080/HomePage2015A/html/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35474" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vuln@krcert.or.kr", "ID": "CVE-2019-19160", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Reportexpress ProPlus", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "3.0.0.62" } ] } } ] }, "vendor_name": "Cabsoftware" } ] } }, "credit": [ { "lang": "eng", "value": "Eunsol Lee" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Reportexpress ProPlus contains a vulnerability that could allow an arbitrary code execution by inserted VBscript into the configure file(rxp)." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-353 Missing Support for Integrity Check" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.cabsoftware.com:8080/HomePage2015A/html/", "refsource": "MISC", "url": "http://www.cabsoftware.com:8080/HomePage2015A/html/" }, { "name": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35474", "refsource": "MISC", "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35474" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "assignerShortName": "krcert", "cveId": "CVE-2019-19160", "datePublished": "2020-06-29T13:32:06", "dateReserved": "2019-11-21T00:00:00", "dateUpdated": "2024-08-05T02:09:39.386Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10124 (GCVE-0-2020-10124)
Vulnerability from cvelistv5
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
NCR | SelfServ ATM |
Version: APTRA XFS 05.01.00 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:50:57.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cert.org/vuls/id/815655" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ncr.com/content/dam/ncrcom/content-type/documents/NCR_Security_Alert-2018-13_APTRA_XFS_" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SelfServ ATM", "vendor": "NCR", "versions": [ { "status": "affected", "version": "APTRA XFS 05.01.00" } ] } ], "datePublic": "2020-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "NCR SelfServ ATMs running APTRA XFS 05.01.00 do not encrypt, authenticate, or verify the integrity of messages between the BNA and the host computer, which could allow an attacker with physical access to the internal components of the ATM to execute arbitrary code, including code that enables the attacker to commit deposit forgery." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-353", "description": "CWE-353 Missing Support for Integrity Check", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-311", "description": "CWE-311 Missing Encryption of Sensitive Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-21T20:30:39", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cert.org/vuls/id/815655" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ncr.com/content/dam/ncrcom/content-type/documents/NCR_Security_Alert-2018-13_APTRA_XFS_" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "DATE_PUBLIC": "2020-08-20T16:34:00.000Z", "ID": "CVE-2020-10124", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SelfServ ATM", "version": { "version_data": [ { "version_affected": "=", "version_name": "APTRA XFS", "version_value": "05.01.00" } ] } } ] }, "vendor_name": "NCR" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NCR SelfServ ATMs running APTRA XFS 05.01.00 do not encrypt, authenticate, or verify the integrity of messages between the BNA and the host computer, which could allow an attacker with physical access to the internal components of the ATM to execute arbitrary code, including code that enables the attacker to commit deposit forgery." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-353 Missing Support for Integrity Check" } ] }, { "description": [ { "lang": "eng", "value": "CWE-306 Missing Authentication for Critical Function" } ] }, { "description": [ { "lang": "eng", "value": "CWE-311 Missing Encryption of Sensitive Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.cert.org/vuls/id/815655", "refsource": "MISC", "url": "https://kb.cert.org/vuls/id/815655" }, { "name": "https://www.ncr.com/content/dam/ncrcom/content-type/documents/NCR_Security_Alert-2018-13_APTRA_XFS_", "refsource": "MISC", "url": "https://www.ncr.com/content/dam/ncrcom/content-type/documents/NCR_Security_Alert-2018-13_APTRA_XFS_" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2020-10124", "datePublished": "2020-08-21T20:30:39.977547Z", "dateReserved": "2020-03-05T00:00:00", "dateUpdated": "2024-09-17T01:01:52.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10266 (GCVE-0-2020-10266)
Vulnerability from cvelistv5
- CWE-353 - (Missing Support for Integrity Check)
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Universal Robots | URx |
Version: CB3 SW Versions 3.3 up to 3.12.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:58:40.121Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/aliasrobotics/RVD/issues/1487" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "URx", "vendor": "Universal Robots", "versions": [ { "status": "affected", "version": "CB3 SW Versions 3.3 up to 3.12.1" } ] } ], "credits": [ { "lang": "en", "value": "V\u00edctor Mayoral Vilches \u003cvictor@aliasrobotics.com\u003e, Mike Karamousadakis, Lander Usategui San Juan" } ], "datePublic": "2020-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "UR+ (Universal Robots+) is a platform of hardware and software component sellers, for Universal Robots robots. When installing any of these components in the robots (e.g. in the UR10), no integrity checks are performed. Moreover, the SDK for making such components can be easily obtained from Universal Robots. An attacker could exploit this flaw by crafting a custom component with the SDK, performing Person-In-The-Middle attacks (PITM) and shipping the maliciously-crafted component on demand." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-353", "description": "CWE-353 (Missing Support for Integrity Check)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-06T12:08:40", "orgId": "dc524f69-879d-41dc-ab8f-724e78658a1a", "shortName": "Alias" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/aliasrobotics/RVD/issues/1487" } ], "source": { "defect": [ "RVD#1487" ], "discovery": "EXTERNAL" }, "title": "RVD#1487: No integrity checks on UR+ platform artifacts when installed in the robot", "x_generator": { "engine": "Robot Vulnerability Database (RVD)" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@aliasrobotics.com", "DATE_PUBLIC": "2020-04-04T16:53:42 +00:00", "ID": "CVE-2020-10266", "STATE": "PUBLIC", "TITLE": "RVD#1487: No integrity checks on UR+ platform artifacts when installed in the robot" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "URx", "version": { "version_data": [ { "version_value": "CB3 SW Versions 3.3 up to 3.12.1" } ] } } ] }, "vendor_name": "Universal Robots" } ] } }, "credit": [ { "lang": "eng", "value": "V\u00edctor Mayoral Vilches \u003cvictor@aliasrobotics.com\u003e, Mike Karamousadakis, Lander Usategui San Juan" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "UR+ (Universal Robots+) is a platform of hardware and software component sellers, for Universal Robots robots. When installing any of these components in the robots (e.g. in the UR10), no integrity checks are performed. Moreover, the SDK for making such components can be easily obtained from Universal Robots. An attacker could exploit this flaw by crafting a custom component with the SDK, performing Person-In-The-Middle attacks (PITM) and shipping the maliciously-crafted component on demand." } ] }, "generator": { "engine": "Robot Vulnerability Database (RVD)" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "high", "confidentialityImpact": "LOW", "integrityImpact": "REQUIRED", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-353 (Missing Support for Integrity Check)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/aliasrobotics/RVD/issues/1487", "refsource": "CONFIRM", "url": "https://github.com/aliasrobotics/RVD/issues/1487" } ] }, "source": { "defect": [ "RVD#1487" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "dc524f69-879d-41dc-ab8f-724e78658a1a", "assignerShortName": "Alias", "cveId": "CVE-2020-10266", "datePublished": "2020-04-06T12:08:40.708577Z", "dateReserved": "2020-03-10T00:00:00", "dateUpdated": "2024-09-16T23:15:36.851Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-7807 (GCVE-0-2020-7807)
Vulnerability from cvelistv5
- CWE-353 - Missing Support for Integrity Check
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
LG Electronics | (LGPCSuite_Setup), (IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup) |
Version: IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup.exe 1.0.0.3 Version: LGPCSuite_Setup.exe 1.0.0.9 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:41:01.946Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lgsecurity.lge.com/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35587" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows(x86, x64)" ], "product": "(LGPCSuite_Setup), (IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup)", "vendor": "LG Electronics", "versions": [ { "status": "affected", "version": "IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup.exe 1.0.0.3" }, { "status": "affected", "version": "LGPCSuite_Setup.exe 1.0.0.9" } ] } ], "credits": [ { "lang": "en", "value": "Eran Shimony" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability that can hijack a DLL file that is loaded during products(LGPCSuite_Setup, IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup) installation into a DLL file that the hacker wants. Missing Support for Integrity Check vulnerability in ____COMPONENT____ of LG Electronics (LGPCSuite_Setup), (IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup) allows ____ATTACKER/ATTACK____ to cause ____IMPACT____. This issue affects: LG Electronics; LGPCSuite_Setup : 1.0.0.3 on Windows(x86, x64); IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup : 1.0.0.9 on Windows(x86, x64)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-353", "description": "CWE-353 Missing Support for Integrity Check", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-14T11:55:29", "orgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "shortName": "krcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lgsecurity.lge.com/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35587" } ], "source": { "discovery": "UNKNOWN" }, "title": "DLL Hijacking Vulnerabilities During Installation of LG Electronics Software", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vuln@krcert.or.kr", "ID": "CVE-2020-7807", "STATE": "PUBLIC", "TITLE": "DLL Hijacking Vulnerabilities During Installation of LG Electronics Software" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "(LGPCSuite_Setup), (IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup)", "version": { "version_data": [ { "platform": "Windows(x86, x64)", "version_affected": "=", "version_name": "IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup.exe", "version_value": "1.0.0.3" }, { "platform": "Windows(x86, x64)", "version_affected": "=", "version_name": "LGPCSuite_Setup.exe", "version_value": "1.0.0.9" } ] } } ] }, "vendor_name": "LG Electronics" } ] } }, "credit": [ { "lang": "eng", "value": "Eran Shimony" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability that can hijack a DLL file that is loaded during products(LGPCSuite_Setup, IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup) installation into a DLL file that the hacker wants. Missing Support for Integrity Check vulnerability in ____COMPONENT____ of LG Electronics (LGPCSuite_Setup), (IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup) allows ____ATTACKER/ATTACK____ to cause ____IMPACT____. This issue affects: LG Electronics; LGPCSuite_Setup : 1.0.0.3 on Windows(x86, x64); IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup : 1.0.0.9 on Windows(x86, x64)." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-353 Missing Support for Integrity Check" } ] } ] }, "references": { "reference_data": [ { "name": "https://lgsecurity.lge.com/", "refsource": "MISC", "url": "https://lgsecurity.lge.com/" }, { "name": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35587", "refsource": "MISC", "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35587" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "assignerShortName": "krcert", "cveId": "CVE-2020-7807", "datePublished": "2020-09-14T11:55:29", "dateReserved": "2020-01-22T00:00:00", "dateUpdated": "2024-08-04T09:41:01.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-7808 (GCVE-0-2020-7808)
Vulnerability from cvelistv5
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
RAONWIZ Inc | K Upload |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:41:01.887Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35424" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "windows 7/8/10" ], "product": "K Upload", "vendor": "RAONWIZ Inc", "versions": [ { "lessThanOrEqual": "2018.0.2.51", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Soonchan Hwang" } ], "datePublic": "2020-05-19T00:00:00", "descriptions": [ { "lang": "en", "value": "In RAONWIZ K Upload v2018.0.2.51 and prior, automatic update processing without integrity check on update module(web.js) allows an attacker to modify arguments which causes downloading a random DLL and injection on it." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-353", "description": "CWE-353 Missing Support for Integrity Check", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-88", "description": "CWE-88 Argument Injection or Modification", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-21T18:29:07", "orgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "shortName": "krcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35424" } ], "source": { "discovery": "UNKNOWN" }, "title": "RAONWIZ Inc K Upload, arguments modiffication via missing support for integrity check vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vuln@krcert.or.kr", "DATE_PUBLIC": "2020-05-19T07:15:00.000Z", "ID": "CVE-2020-7808", "STATE": "PUBLIC", "TITLE": "RAONWIZ Inc K Upload, arguments modiffication via missing support for integrity check vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "K Upload", "version": { "version_data": [ { "platform": "windows 7/8/10", "version_affected": "\u003c=", "version_value": "2018.0.2.51" } ] } } ] }, "vendor_name": "RAONWIZ Inc" } ] } }, "credit": [ { "lang": "eng", "value": "Soonchan Hwang" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In RAONWIZ K Upload v2018.0.2.51 and prior, automatic update processing without integrity check on update module(web.js) allows an attacker to modify arguments which causes downloading a random DLL and injection on it." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-353 Missing Support for Integrity Check" } ] }, { "description": [ { "lang": "eng", "value": "CWE-88 Argument Injection or Modification" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35424", "refsource": "CONFIRM", "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35424" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "assignerShortName": "krcert", "cveId": "CVE-2020-7808", "datePublished": "2020-05-21T18:29:07.032513Z", "dateReserved": "2020-01-22T00:00:00", "dateUpdated": "2024-09-17T03:23:55.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-7810 (GCVE-0-2020-7810)
Vulnerability from cvelistv5
- CWE-353 - Missing Support for Integrity Check
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Handysoft, Inc. | hslogin2.dll |
Version: unspecified < Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:41:01.875Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.handysoft.co.kr/en/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35551" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "x86, x64" ], "product": "hslogin2.dll", "vendor": "Handysoft, Inc.", "versions": [ { "lessThanOrEqual": "6.7.8.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "7.3.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Eunsol Lee for reporting this vulnerability." } ], "datePublic": "2020-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "hslogin2.dll ActiveX Control in Groupware contains a vulnerability that could allow remote files to be downloaded and executed by setting the arguments to the activex method. This is due to a lack of integrity verification of the policy files referenced in the update process, and a remote attacker could induce a user to crafted web page, causing damage such as malicious code infection." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-353", "description": "CWE-353 Missing Support for Integrity Check", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-07T15:21:05", "orgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "shortName": "krcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.handysoft.co.kr/en/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35551" } ], "solutions": [ { "lang": "en", "value": "Update software over hslogin2.dll ActiveX Control 6.7.8.9002 / 7.3.4.1 version or higher." } ], "source": { "discovery": "UNKNOWN" }, "title": "HandySoft ActiveX File Download and Execution Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vuln@krcert.or.kr", "DATE_PUBLIC": "2020-08-07T07:28:00.000Z", "ID": "CVE-2020-7810", "STATE": "PUBLIC", "TITLE": "HandySoft ActiveX File Download and Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "hslogin2.dll", "version": { "version_data": [ { "platform": "x86, x64", "version_affected": "\u003c=", "version_value": "6.7.8.4" }, { "platform": "x86, x64", "version_affected": "\u003c=", "version_value": "7.3.4" } ] } } ] }, "vendor_name": "Handysoft, Inc." } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Eunsol Lee for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "hslogin2.dll ActiveX Control in Groupware contains a vulnerability that could allow remote files to be downloaded and executed by setting the arguments to the activex method. This is due to a lack of integrity verification of the policy files referenced in the update process, and a remote attacker could induce a user to crafted web page, causing damage such as malicious code infection." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-353 Missing Support for Integrity Check" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.handysoft.co.kr/en/", "refsource": "MISC", "url": "http://www.handysoft.co.kr/en/" }, { "name": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35551", "refsource": "MISC", "url": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35551" } ] }, "solution": [ { "lang": "en", "value": "Update software over hslogin2.dll ActiveX Control 6.7.8.9002 / 7.3.4.1 version or higher." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "assignerShortName": "krcert", "cveId": "CVE-2020-7810", "datePublished": "2020-08-07T15:21:05.602805Z", "dateReserved": "2020-01-22T00:00:00", "dateUpdated": "2024-09-16T23:15:41.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-7878 (GCVE-0-2020-7878)
Vulnerability from cvelistv5
- CWE-353 - Missing Support for Integrity Check
► | URL | Tags |
---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
4NB | VideoOffice |
Version: X2.9 < X2.10 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:41:01.884Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36349" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "VideoOffice", "vendor": "4NB", "versions": [ { "lessThan": "X2.10", "status": "affected", "version": "X2.9", "versionType": "custom" } ] } ], "datePublic": "2021-11-16T00:00:00", "descriptions": [ { "lang": "en", "value": "An arbitrary file download and execution vulnerability was found in the VideoOffice X2.9 and earlier versions (CVE-2020-7878). This issue is due to missing support for integrity check." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-353", "description": "CWE-353 Missing Support for Integrity Check", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-28T19:09:21", "orgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "shortName": "krcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36349" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vuln@krcert.or.kr", "DATE_PUBLIC": "2021-11-16T07:31:00.000Z", "ID": "CVE-2020-7878", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VideoOffice", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "X2.9", "version_value": "X2.10" } ] } } ] }, "vendor_name": "4NB" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An arbitrary file download and execution vulnerability was found in the VideoOffice X2.9 and earlier versions (CVE-2020-7878). This issue is due to missing support for integrity check." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorstring": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-353 Missing Support for Integrity Check" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36349", "refsource": "MISC", "url": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36349" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "assignerShortName": "krcert", "cveId": "CVE-2020-7878", "datePublished": "2021-12-28T19:09:21.634352Z", "dateReserved": "2020-01-22T00:00:00", "dateUpdated": "2024-09-16T22:41:33.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phase: Architecture and Design
Description:
- Add an appropriately sized checksum to the protocol, ensuring that data received may be simply validated before it is parsed and used.
Mitigation
Phase: Implementation
Description:
- Ensure that the checksums present in the protocol design are properly implemented and added to each message before it is sent.
CAPEC-13: Subverting Environment Variable Values
The adversary directly or indirectly modifies environment variables used by or controlling the target software. The adversary's goal is to cause the target software to deviate from its expected operation in a manner that benefits the adversary.
CAPEC-14: Client-side Injection-induced Buffer Overflow
This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service. This hostile service is created to deliver the correct content to the client software. For example, if the client-side application is a browser, the service will host a webpage that the browser loads.
CAPEC-389: Content Spoofing Via Application API Manipulation
An attacker manipulates either egress or ingress data from a client within an application framework in order to change the content of messages. Performing this attack allows the attacker to manipulate content in such a way as to produce messages or content that look authentic but may contain deceptive links, spam-like content, or links to the attackers' code. In general, content-spoofing within an application API can be employed to stage many different types of attacks varied based on the attackers' intent. The techniques require use of specialized software that allow the attacker to use adversary-in-the-middle (CAPEC-94) communications between the web browser and the remote system.
CAPEC-39: Manipulating Opaque Client-based Data Tokens
In circumstances where an application holds important data client-side in tokens (cookies, URLs, data files, and so forth) that data can be manipulated. If client or server-side application components reinterpret that data as authentication tokens or data (such as store item pricing or wallet information) then even opaquely manipulating that data may bear fruit for an Attacker. In this pattern an attacker undermines the assumption that client side tokens have been adequately protected from tampering through use of encryption or obfuscation.
CAPEC-665: Exploitation of Thunderbolt Protection Flaws
An adversary leverages a firmware weakness within the Thunderbolt protocol, on a computing device to manipulate Thunderbolt controller firmware in order to exploit vulnerabilities in the implementation of authorization and verification schemes within Thunderbolt protection mechanisms. Upon gaining physical access to a target device, the adversary conducts high-level firmware manipulation of the victim Thunderbolt controller SPI (Serial Peripheral Interface) flash, through the use of a SPI Programing device and an external Thunderbolt device, typically as the target device is booting up. If successful, this allows the adversary to modify memory, subvert authentication mechanisms, spoof identities and content, and extract data and memory from the target device. Currently 7 major vulnerabilities exist within Thunderbolt protocol with 9 attack vectors as noted in the Execution Flow.
CAPEC-74: Manipulating State
['The adversary modifies state information maintained by the target software or causes a state transition in hardware. If successful, the target will use this tainted state and execute in an unintended manner.', 'State management is an important function within a software application. User state maintained by the application can include usernames, payment information, browsing history as well as application-specific contents such as items in a shopping cart. Manipulating user state can be employed by an adversary to elevate privilege, conduct fraudulent transactions or otherwise modify the flow of the application to derive certain benefits.', 'If there is a hardware logic error in a finite state machine, the adversary can use this to put the system in an undefined state which could cause a denial of service or exposure of secure data.']
CAPEC-75: Manipulating Writeable Configuration Files
Generally these are manually edited files that are not in the preview of the system administrators, any ability on the attackers' behalf to modify these files, for example in a CVS repository, gives unauthorized access directly to the application, the same as authorized users.