Vulnerabilites related to Hunesion - i-oneNet
Vulnerability from fkie_nvd
Published
2019-07-10 20:15
Modified
2024-11-21 04:23
Severity ?
Summary
In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, due to the lack of update file integrity checking in the upgrade process, an attacker can craft malicious file and use it as an update.
References
▶ | URL | Tags | |
---|---|---|---|
vuln@krcert.or.kr | https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073 | Broken Link, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073 | Broken Link, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hunesion:i-onenet:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7342CC1-2360-4463-9CFE-41CD69D711D8", "versionEndIncluding": "3.0.53", "versionStartIncluding": "3.0.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:hunesion:i-onenet:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5A2F68-24D6-4E66-81DB-AC0E320079ED", "versionEndIncluding": "4.0.16", "versionStartIncluding": "4.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, due to the lack of update file integrity checking in the upgrade process, an attacker can craft malicious file and use it as an update." }, { "lang": "es", "value": "En Hunesion i-oneNet versiones 3.0.7 hasta 3.0.53 y 4.0.4 hasta 4.0.16, debido a la falta de comprobaci\u00f3n de la integridad del archivo de actualizaci\u00f3n en el proceso de actualizaci\u00f3n, un atacante puede dise\u00f1ar un archivo malicioso y usarlo como una actualizaci\u00f3n." } ], "id": "CVE-2019-12804", "lastModified": "2024-11-21T04:23:36.810", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "vuln@krcert.or.kr", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-10T20:15:12.420", "references": [ { "source": "vuln@krcert.or.kr", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073" } ], "sourceIdentifier": "vuln@krcert.or.kr", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-353" } ], "source": "vuln@krcert.or.kr", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-10 20:15
Modified
2024-11-21 04:23
Severity ?
Summary
In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, the specific upload web module doesn't verify the file extension and type, and an attacker can upload a webshell. After the webshell upload, an attacker can use the webshell to perform remote code exection such as running a system command.
References
▶ | URL | Tags | |
---|---|---|---|
vuln@krcert.or.kr | https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073 | Broken Link, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073 | Broken Link, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hunesion:i-onenet:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7342CC1-2360-4463-9CFE-41CD69D711D8", "versionEndIncluding": "3.0.53", "versionStartIncluding": "3.0.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:hunesion:i-onenet:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5A2F68-24D6-4E66-81DB-AC0E320079ED", "versionEndIncluding": "4.0.16", "versionStartIncluding": "4.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, the specific upload web module doesn\u0027t verify the file extension and type, and an attacker can upload a webshell. After the webshell upload, an attacker can use the webshell to perform remote code exection such as running a system command." }, { "lang": "es", "value": "En Hunesion i-oneNet versiones 3.0.7 hasta 3.0.53 y 4.0.4 hasta 4.0.16, el m\u00f3dulo web de carga espec\u00edfica no comprueba la extensi\u00f3n y el tipo de archivo, y un atacante puede cargar un webshell. Despu\u00e9s de la carga del webshell, un atacante puede usar el webshell para realizar una ejecuci\u00f3n de c\u00f3digo remota, tal y como ejecutar un comando de sistema." } ], "id": "CVE-2019-12803", "lastModified": "2024-11-21T04:23:36.690", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "vuln@krcert.or.kr", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-10T20:15:12.340", "references": [ { "source": "vuln@krcert.or.kr", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073" } ], "sourceIdentifier": "vuln@krcert.or.kr", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "vuln@krcert.or.kr", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-27 18:15
Modified
2024-11-21 03:17
Severity ?
Summary
Incorrect Access Control in Hunesion i-oneNet 3.0.6042.1200 allows the local user to access other user's information which is unauthorized via brute force.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://hunesion.com | Vendor Advisory | |
cve@mitre.org | http://i-onenet.com | Broken Link, URL Repurposed | |
cve@mitre.org | https://github.com/summtime/CVE/tree/master/CVE-2017-16900 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://hunesion.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://i-onenet.com | Broken Link, URL Repurposed | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/summtime/CVE/tree/master/CVE-2017-16900 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hunesion:i-onenet:3.0.6042.1200:*:*:*:*:*:*:*", "matchCriteriaId": "00EF8345-6956-4E5D-B336-924AB4EDD64E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Access Control in Hunesion i-oneNet 3.0.6042.1200 allows the local user to access other user\u0027s information which is unauthorized via brute force." }, { "lang": "es", "value": "Un Control de Acceso Incorrecto en Hunesion i-oneNet versi\u00f3n 3.0.6042.1200, permite al usuario local acceder a la informaci\u00f3n de otro usuario que no est\u00e1 autorizado por medio de fuerza bruta." } ], "id": "CVE-2017-16900", "lastModified": "2024-11-21T03:17:12.437", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-27T18:15:11.263", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://hunesion.com" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "URL Repurposed" ], "url": "http://i-onenet.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/summtime/CVE/tree/master/CVE-2017-16900" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://hunesion.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "URL Repurposed" ], "url": "http://i-onenet.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/summtime/CVE/tree/master/CVE-2017-16900" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-307" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2019-12803 (GCVE-0-2019-12803)
Vulnerability from cvelistv5
Published
2019-07-10 19:34
Modified
2024-08-04 23:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Summary
In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, the specific upload web module doesn't verify the file extension and type, and an attacker can upload a webshell. After the webshell upload, an attacker can use the webshell to perform remote code exection such as running a system command.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:32:55.314Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "i-oneNet", "vendor": "Hunesion", "versions": [ { "status": "affected", "version": "3.0.7~3.0.53" }, { "status": "affected", "version": "4.0.4~4.0.16" } ] } ], "descriptions": [ { "lang": "en", "value": "In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, the specific upload web module doesn\u0027t verify the file extension and type, and an attacker can upload a webshell. After the webshell upload, an attacker can use the webshell to perform remote code exection such as running a system command." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-10T19:34:27", "orgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "shortName": "krcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073" } ], "source": { "discovery": "UNKNOWN" }, "title": "Hunesion i-oneNet unrestricted file upload vulnerability", "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vuln@krcert.or.kr", "ID": "CVE-2019-12803", "STATE": "PUBLIC", "TITLE": "Hunesion i-oneNet unrestricted file upload vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "i-oneNet", "version": { "version_data": [ { "version_name": "3.0", "version_value": "3.0.7~3.0.53" }, { "version_name": "4.0", "version_value": "4.0.4~4.0.16" } ] } } ] }, "vendor_name": "Hunesion" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, the specific upload web module doesn\u0027t verify the file extension and type, and an attacker can upload a webshell. After the webshell upload, an attacker can use the webshell to perform remote code exection such as running a system command." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-434 Unrestricted Upload of File with Dangerous Type" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073", "refsource": "CONFIRM", "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "assignerShortName": "krcert", "cveId": "CVE-2019-12803", "datePublished": "2019-07-10T19:34:27", "dateReserved": "2019-06-13T00:00:00", "dateUpdated": "2024-08-04T23:32:55.314Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-16900 (GCVE-0-2017-16900)
Vulnerability from cvelistv5
Published
2020-02-27 17:39
Modified
2024-08-05 20:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Incorrect Access Control in Hunesion i-oneNet 3.0.6042.1200 allows the local user to access other user's information which is unauthorized via brute force.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:35:21.241Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://hunesion.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://i-onenet.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/summtime/CVE/tree/master/CVE-2017-16900" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Incorrect Access Control in Hunesion i-oneNet 3.0.6042.1200 allows the local user to access other user\u0027s information which is unauthorized via brute force." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-27T17:39:44", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://hunesion.com" }, { "tags": [ "x_refsource_MISC" ], "url": "http://i-onenet.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/summtime/CVE/tree/master/CVE-2017-16900" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16900", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect Access Control in Hunesion i-oneNet 3.0.6042.1200 allows the local user to access other user\u0027s information which is unauthorized via brute force." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://hunesion.com", "refsource": "MISC", "url": "http://hunesion.com" }, { "name": "http://i-onenet.com", "refsource": "MISC", "url": "http://i-onenet.com" }, { "name": "https://github.com/summtime/CVE/tree/master/CVE-2017-16900", "refsource": "MISC", "url": "https://github.com/summtime/CVE/tree/master/CVE-2017-16900" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16900", "datePublished": "2020-02-27T17:39:44", "dateReserved": "2017-11-20T00:00:00", "dateUpdated": "2024-08-05T20:35:21.241Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-12804 (GCVE-0-2019-12804)
Vulnerability from cvelistv5
Published
2019-07-10 19:38
Modified
2024-08-04 23:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-353 - Missing Support for Integrity Check
Summary
In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, due to the lack of update file integrity checking in the upgrade process, an attacker can craft malicious file and use it as an update.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:32:55.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "i-oneNet", "vendor": "Hunesion", "versions": [ { "status": "affected", "version": "3.0.7~3.0.53" }, { "status": "affected", "version": "4.0.4~4.0.16" } ] } ], "descriptions": [ { "lang": "en", "value": "In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, due to the lack of update file integrity checking in the upgrade process, an attacker can craft malicious file and use it as an update." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-353", "description": "CWE-353 Missing Support for Integrity Check", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-10T19:38:09", "orgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "shortName": "krcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073" } ], "source": { "discovery": "UNKNOWN" }, "title": "Hunesion i-oneNet Missing Support for Integrity Check vulnerability", "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vuln@krcert.or.kr", "ID": "CVE-2019-12804", "STATE": "PUBLIC", "TITLE": "Hunesion i-oneNet Missing Support for Integrity Check vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "i-oneNet", "version": { "version_data": [ { "version_name": "3.0", "version_value": "3.0.7~3.0.53" }, { "version_name": "4.0", "version_value": "4.0.4~4.0.16" } ] } } ] }, "vendor_name": "Hunesion" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, due to the lack of update file integrity checking in the upgrade process, an attacker can craft malicious file and use it as an update." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-353 Missing Support for Integrity Check" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073", "refsource": "CONFIRM", "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "assignerShortName": "krcert", "cveId": "CVE-2019-12804", "datePublished": "2019-07-10T19:38:09", "dateReserved": "2019-06-13T00:00:00", "dateUpdated": "2024-08-04T23:32:55.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }