Lucene search

K
cve[email protected]CVE-2020-12266
HistoryApr 27, 2020 - 3:15 p.m.

CVE-2020-12266

2020-04-2715:15:12
CWE-306
web.nvd.nist.gov
26
cve-2020-12266
information disclosure
authentication bypass
wavlink
jetstream

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

8.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.0%

An issue was discovered where there are multiple externally accessible pages that do not require any sort of authentication, and store system information for internal usage. The devices automatically query these pages to update dashboards and other statistics, but the pages can be accessed externally without any authentication. All the pages follow the naming convention live_(string).shtml. Among the information disclosed is: interface status logs, IP address of the device, MAC address of the device, model and current firmware version, location, all running processes, all interfaces and their statuses, all current DHCP leases and the associated hostnames, all other wireless networks in range of the router, memory statistics, and components of the configuration of the device such as enabled features. Affected devices: Affected devices are: Wavlink WN530HG4, Wavlink WN575A3, Wavlink WN579G3,Wavlink WN531G3, Wavlink WN533A8, Wavlink WN531A6, Wavlink WN551K1, Wavlink WN535G3, Wavlink WN530H4, Wavlink WN57X93, WN572HG3, Wavlink WN578A2, Wavlink WN579G3, Wavlink WN579X3, and Jetstream AC3000/ERAC3000

Affected configurations

NVD
Node
wavlinkwl-wn579g3_firmwareMatchm79x3.v5030.180719
AND
wavlinkwl-wn579g3Match-
Node
wavlinkwl-wn575a3_firmwareMatchrpt75a3.v4300.180801
AND
wavlinkwl-wn575a3Match-
Node
wavlinkwl-wn530hg4_firmwareMatchm30hg4.v5030.191116
AND
wavlinkwl-wn530hg4Match-
Node
wavlinkwn531g3_firmwareMatch-
AND
wavlinkwn531g3Match-
Node
wavlinkwn533a8_firmwareMatch-
AND
wavlinkwn533a8Match-
Node
wavlinkwn531a6_firmwareMatch-
AND
wavlinkwn531a6Match-
Node
wavlinkwn551k1_firmwareMatch-
AND
wavlinkwn551k1Match-
Node
wavlinkwn535g3_firmwareMatch-
AND
wavlinkwn535g3Match-
Node
wavlinkwn530h4_firmwareMatch-
AND
wavlinkwn530h4Match-
Node
wavlinkwn57x93_firmwareMatch-
AND
wavlinkwn57x93Match-
Node
wavlinkwn578a2_firmwareMatch-
AND
wavlinkwn578a2Match-
Node
wavlinkwn579g3_firmwareMatch-
AND
wavlinkwn579g3Match-
Node
wavlinkwn579x3_firmwareMatch-
AND
wavlinkwn579x3Match-
Node
wavlinkjetstream_ac3000_firmwareMatch-
AND
wavlinkjetstream_ac3000Match-
Node
wavlinkjetstream_erac3000_firmwareMatch-
AND
wavlinkjetstream_erac3000Match-

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

8.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.0%

Related for CVE-2020-12266