Description
spxmanage on certain SpinetiX devices allows requests that access unintended resources because of SSRF and Path Traversal. This affects HMP350, HMP300, and DiVA through 4.5.2-1.0.36229; HMP400 and HMP400W through 4.5.2-1.0.2-1eb2ffbd; and DSOS through 4.5.2-1.0.2-1eb2ffbd.
Affected Software
{"id": "CVE-2020-15809", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2020-15809", "description": "spxmanage on certain SpinetiX devices allows requests that access unintended resources because of SSRF and Path Traversal. This affects HMP350, HMP300, and DiVA through 4.5.2-1.0.36229; HMP400 and HMP400W through 4.5.2-1.0.2-1eb2ffbd; and DSOS through 4.5.2-1.0.2-1eb2ffbd.", "published": "2021-03-24T17:15:00", "modified": "2021-03-26T21:17:00", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0}, "severity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15809", "reporter": "cve@mitre.org", "references": ["https://support.spinetix.com/wiki/SpinetiX-SA-20:01", "https://support.spinetix.com/wiki/DSOS_release_notes"], "cvelist": ["CVE-2020-15809"], "immutableFields": [], "lastseen": "2023-02-09T15:07:16", "viewCount": 10, "enchantments": {"dependencies": {}, "score": {"value": 4.9, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "epss": [{"cve": "CVE-2020-15809", "epss": "0.000610000", "percentile": "0.235350000", "modified": "2023-03-17"}], "vulnersScore": 4.9}, "_state": {"dependencies": 1675958436, "score": 1675957768, "affected_software_major_version": 1677297687, "epss": 1679070268}, "_internal": {"score_hash": "7445efb23d33838dcbeb587133af9a92"}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/o:spinetix:dsos:4.5.2-1.0.2-1eb2ffbd", "cpe:/o:spinetix:hmp350_firmware:4.5.2-1.0.36229", "cpe:/o:spinetix:diva_firmware:4.5.2-1.0.36229", "cpe:/o:spinetix:hmp400_firmware:4.5.2-1.0.2-1eb2ffbd", "cpe:/o:spinetix:hmp300_firmware:4.5.2-1.0.36229", "cpe:/o:spinetix:hmp400w_firmware:4.5.2-1.0.2-1eb2ffbd"], "cpe23": ["cpe:2.3:o:spinetix:hmp300_firmware:4.5.2-1.0.36229:*:*:*:*:*:*:*", "cpe:2.3:o:spinetix:hmp400w_firmware:4.5.2-1.0.2-1eb2ffbd:*:*:*:*:*:*:*", "cpe:2.3:o:spinetix:dsos:4.5.2-1.0.2-1eb2ffbd:*:*:*:*:*:*:*", "cpe:2.3:o:spinetix:diva_firmware:4.5.2-1.0.36229:*:*:*:*:*:*:*", "cpe:2.3:o:spinetix:hmp350_firmware:4.5.2-1.0.36229:*:*:*:*:*:*:*", "cpe:2.3:o:spinetix:hmp400_firmware:4.5.2-1.0.2-1eb2ffbd:*:*:*:*:*:*:*"], "cwe": ["CWE-918", "CWE-22"], "affectedSoftware": [{"cpeName": "spinetix:dsos", "version": "4.5.2-1.0.2-1eb2ffbd", "operator": "le", "name": "spinetix dsos"}, {"cpeName": "spinetix:hmp350_firmware", "version": "4.5.2-1.0.36229", "operator": "le", "name": "spinetix hmp350 firmware"}, {"cpeName": "spinetix:hmp300_firmware", "version": "4.5.2-1.0.36229", "operator": "le", "name": "spinetix hmp300 firmware"}, {"cpeName": "spinetix:diva_firmware", "version": "4.5.2-1.0.36229", "operator": "le", "name": "spinetix diva firmware"}, {"cpeName": "spinetix:hmp400_firmware", "version": "4.5.2-1.0.2-1eb2ffbd", "operator": "le", "name": "spinetix hmp400 firmware"}, {"cpeName": "spinetix:hmp400w_firmware", "version": "4.5.2-1.0.2-1eb2ffbd", "operator": "le", "name": "spinetix hmp400w firmware"}], "affectedConfiguration": [{"name": "spinetix hmp350", "cpeName": "spinetix:hmp350", "version": "-", "operator": "eq"}, {"name": "spinetix hmp300", "cpeName": "spinetix:hmp300", "version": "-", "operator": "eq"}, {"name": "spinetix diva", "cpeName": "spinetix:diva", "version": "-", "operator": "eq"}, {"name": "spinetix hmp400", "cpeName": "spinetix:hmp400", "version": "-", "operator": "eq"}, {"name": "spinetix hmp400w", "cpeName": "spinetix:hmp400w", "version": "-", "operator": "eq"}], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:spinetix:dsos:4.5.2-1.0.2-1eb2ffbd:*:*:*:*:*:*:*", "versionEndIncluding": "4.5.2-1.0.2-1eb2ffbd", "cpe_name": []}]}, {"operator": "AND", "children": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:spinetix:hmp350_firmware:4.5.2-1.0.36229:*:*:*:*:*:*:*", "versionEndIncluding": "4.5.2-1.0.36229", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": false, "cpe23Uri": "cpe:2.3:h:spinetix:hmp350:-:*:*:*:*:*:*:*", "cpe_name": []}]}], "cpe_match": []}, {"operator": "AND", "children": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:spinetix:hmp300_firmware:4.5.2-1.0.36229:*:*:*:*:*:*:*", "versionEndIncluding": "4.5.2-1.0.36229", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": false, "cpe23Uri": "cpe:2.3:h:spinetix:hmp300:-:*:*:*:*:*:*:*", "cpe_name": []}]}], "cpe_match": []}, {"operator": "AND", "children": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:spinetix:diva_firmware:4.5.2-1.0.36229:*:*:*:*:*:*:*", "versionEndIncluding": "4.5.2-1.0.36229", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": false, "cpe23Uri": "cpe:2.3:h:spinetix:diva:-:*:*:*:*:*:*:*", "cpe_name": []}]}], "cpe_match": []}, {"operator": "AND", "children": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:spinetix:hmp400_firmware:4.5.2-1.0.2-1eb2ffbd:*:*:*:*:*:*:*", "versionEndIncluding": "4.5.2-1.0.2-1eb2ffbd", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": false, "cpe23Uri": "cpe:2.3:h:spinetix:hmp400:-:*:*:*:*:*:*:*", "cpe_name": []}]}], "cpe_match": []}, {"operator": "AND", "children": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:spinetix:hmp400w_firmware:4.5.2-1.0.2-1eb2ffbd:*:*:*:*:*:*:*", "versionEndIncluding": "4.5.2-1.0.2-1eb2ffbd", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": false, "cpe23Uri": "cpe:2.3:h:spinetix:hmp400w:-:*:*:*:*:*:*:*", "cpe_name": []}]}], "cpe_match": []}]}, "extraReferences": [{"url": "https://support.spinetix.com/wiki/SpinetiX-SA-20:01", "name": "https://support.spinetix.com/wiki/SpinetiX-SA-20:01", "refsource": "MISC", "tags": ["Release Notes", "Vendor Advisory"]}, {"url": "https://support.spinetix.com/wiki/DSOS_release_notes", "name": "https://support.spinetix.com/wiki/DSOS_release_notes", "refsource": "MISC", "tags": ["Release Notes", "Vendor Advisory"]}], "product_info": [{"vendor": "Spinetix", "product": "Dsos"}, {"vendor": "Spinetix", "product": "Diva_firmware"}, {"vendor": "Spinetix", "product": "Hmp300_firmware"}, {"vendor": "Spinetix", "product": "Hmp350_firmware"}, {"vendor": "Spinetix", "product": "Hmp400_firmware"}, {"vendor": "Spinetix", "product": "Hmp400w_firmware"}]}
{}