Lucene search

K
cveTwcertCVE-2020-3927
HistoryFeb 03, 2020 - 11:15 a.m.

CVE-2020-3927

2020-02-0311:15:12
CWE-552
twcert
web.nvd.nist.gov
30
2
cve
2020
3927
arbitrary file access
servisign
security plugin
nvd
vulnerability
api
parameter

CVSS2

8.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:C/A:P

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

30.9%

An arbitrary-file-access vulnerability exists in ServiSign security plugin, as long as the attackers learn the specific API function, they may access arbitrary files on target system via crafted API parameter.

Affected configurations

Nvd
Node
changingtecservisignRange1.0.19.0617
AND
microsoftwindowsMatch-
VendorProductVersionCPE
changingtecservisign*cpe:2.3:a:changingtec:servisign:*:*:*:*:*:*:*:*
microsoftwindows-cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "ServiSign Windows versions",
    "vendor": "CHANGING",
    "versions": [
      {
        "lessThanOrEqual": "1.0.19.0617",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

CVSS2

8.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:C/A:P

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

30.9%

Related for CVE-2020-3927