Lucene search

K
cvelistVulDBCVELIST:CVE-2020-36529
HistoryJun 03, 2022 - 7:10 p.m.

CVE-2020-36529 SevOne Network Management System Traceroute traceroute.php command injection

2022-06-0319:10:38
CWE-77
VulDB
www.cve.org
3
cve-2020-36529
sevone network management system
traceroute handler
command injection
remote attack
privilege escalation

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.001

Percentile

32.0%

A vulnerability classified as critical has been found in SevOne Network Management System up to 5.7.2.22. This affects the file traceroute.php of the Traceroute Handler. The manipulation leads to privilege escalation with a command injection. It is possible to initiate the attack remotely.

CNA Affected

[
  {
    "product": "Network Management System",
    "vendor": "SevOne",
    "versions": [
      {
        "status": "affected",
        "version": "5.7.2.0"
      },
      {
        "status": "affected",
        "version": "5.7.2.1"
      },
      {
        "status": "affected",
        "version": "5.7.2.2"
      },
      {
        "status": "affected",
        "version": "5.7.2.3"
      },
      {
        "status": "affected",
        "version": "5.7.2.4"
      },
      {
        "status": "affected",
        "version": "5.7.2.5"
      },
      {
        "status": "affected",
        "version": "5.7.2.6"
      },
      {
        "status": "affected",
        "version": "5.7.2.7"
      },
      {
        "status": "affected",
        "version": "5.7.2.8"
      },
      {
        "status": "affected",
        "version": "5.7.2.9"
      },
      {
        "status": "affected",
        "version": "5.7.2.10"
      },
      {
        "status": "affected",
        "version": "5.7.2.11"
      },
      {
        "status": "affected",
        "version": "5.7.2.12"
      },
      {
        "status": "affected",
        "version": "5.7.2.13"
      },
      {
        "status": "affected",
        "version": "5.7.2.14"
      },
      {
        "status": "affected",
        "version": "5.7.2.15"
      },
      {
        "status": "affected",
        "version": "5.7.2.16"
      },
      {
        "status": "affected",
        "version": "5.7.2.17"
      },
      {
        "status": "affected",
        "version": "5.7.2.18"
      },
      {
        "status": "affected",
        "version": "5.7.2.19"
      },
      {
        "status": "affected",
        "version": "5.7.2.20"
      },
      {
        "status": "affected",
        "version": "5.7.2.21"
      },
      {
        "status": "affected",
        "version": "5.7.2.22"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.001

Percentile

32.0%

Related for CVELIST:CVE-2020-36529