Lucene search

K
cve[email protected]CVE-2020-36529
HistoryJun 07, 2022 - 6:15 p.m.

CVE-2020-36529

2022-06-0718:15:10
CWE-77
web.nvd.nist.gov
21
5
cve-2020-36529
vulnerability
critical
sevone network management system
command injection
privilege escalation
remote attack
traceroute handler

8.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.2%

A vulnerability classified as critical has been found in SevOne Network Management System up to 5.7.2.22. This affects the file traceroute.php of the Traceroute Handler. The manipulation leads to privilege escalation with a command injection. It is possible to initiate the attack remotely.

Affected configurations

Vulners
NVD
Node
ibmsevone_network_performance_managementMatch5.7.2.0
OR
ibmsevone_network_performance_managementMatch5.7.2.1
OR
ibmsevone_network_performance_managementMatch5.7.2.2
OR
ibmsevone_network_performance_managementMatch5.7.2.3
OR
ibmsevone_network_performance_managementMatch5.7.2.4
OR
ibmsevone_network_performance_managementMatch5.7.2.5
OR
ibmsevone_network_performance_managementMatch5.7.2.6
OR
ibmsevone_network_performance_managementMatch5.7.2.7
OR
ibmsevone_network_performance_managementMatch5.7.2.8
OR
ibmsevone_network_performance_managementMatch5.7.2.9
OR
ibmsevone_network_performance_managementMatch5.7.2.10
OR
ibmsevone_network_performance_managementMatch5.7.2.11
OR
ibmsevone_network_performance_managementMatch5.7.2.12
OR
ibmsevone_network_performance_managementMatch5.7.2.13
OR
ibmsevone_network_performance_managementMatch5.7.2.14
OR
ibmsevone_network_performance_managementMatch5.7.2.15
OR
ibmsevone_network_performance_managementMatch5.7.2.16
OR
ibmsevone_network_performance_managementMatch5.7.2.17
OR
ibmsevone_network_performance_managementMatch5.7.2.18
OR
ibmsevone_network_performance_managementMatch5.7.2.19
OR
ibmsevone_network_performance_managementMatch5.7.2.20
OR
ibmsevone_network_performance_managementMatch5.7.2.21
OR
ibmsevone_network_performance_managementMatch5.7.2.22
VendorProductVersionCPE
ibmsevone_network_performance_management5.7.2.0cpe:2.3:a:ibm:sevone_network_performance_management:5.7.2.0:*:*:*:*:*:*:*
ibmsevone_network_performance_management5.7.2.1cpe:2.3:a:ibm:sevone_network_performance_management:5.7.2.1:*:*:*:*:*:*:*
ibmsevone_network_performance_management5.7.2.2cpe:2.3:a:ibm:sevone_network_performance_management:5.7.2.2:*:*:*:*:*:*:*
ibmsevone_network_performance_management5.7.2.3cpe:2.3:a:ibm:sevone_network_performance_management:5.7.2.3:*:*:*:*:*:*:*
ibmsevone_network_performance_management5.7.2.4cpe:2.3:a:ibm:sevone_network_performance_management:5.7.2.4:*:*:*:*:*:*:*
ibmsevone_network_performance_management5.7.2.5cpe:2.3:a:ibm:sevone_network_performance_management:5.7.2.5:*:*:*:*:*:*:*
ibmsevone_network_performance_management5.7.2.6cpe:2.3:a:ibm:sevone_network_performance_management:5.7.2.6:*:*:*:*:*:*:*
ibmsevone_network_performance_management5.7.2.7cpe:2.3:a:ibm:sevone_network_performance_management:5.7.2.7:*:*:*:*:*:*:*
ibmsevone_network_performance_management5.7.2.8cpe:2.3:a:ibm:sevone_network_performance_management:5.7.2.8:*:*:*:*:*:*:*
ibmsevone_network_performance_management5.7.2.9cpe:2.3:a:ibm:sevone_network_performance_management:5.7.2.9:*:*:*:*:*:*:*
Rows per page:
1-10 of 231

CNA Affected

[
  {
    "product": "Network Management System",
    "vendor": "SevOne",
    "versions": [
      {
        "status": "affected",
        "version": "5.7.2.0"
      },
      {
        "status": "affected",
        "version": "5.7.2.1"
      },
      {
        "status": "affected",
        "version": "5.7.2.2"
      },
      {
        "status": "affected",
        "version": "5.7.2.3"
      },
      {
        "status": "affected",
        "version": "5.7.2.4"
      },
      {
        "status": "affected",
        "version": "5.7.2.5"
      },
      {
        "status": "affected",
        "version": "5.7.2.6"
      },
      {
        "status": "affected",
        "version": "5.7.2.7"
      },
      {
        "status": "affected",
        "version": "5.7.2.8"
      },
      {
        "status": "affected",
        "version": "5.7.2.9"
      },
      {
        "status": "affected",
        "version": "5.7.2.10"
      },
      {
        "status": "affected",
        "version": "5.7.2.11"
      },
      {
        "status": "affected",
        "version": "5.7.2.12"
      },
      {
        "status": "affected",
        "version": "5.7.2.13"
      },
      {
        "status": "affected",
        "version": "5.7.2.14"
      },
      {
        "status": "affected",
        "version": "5.7.2.15"
      },
      {
        "status": "affected",
        "version": "5.7.2.16"
      },
      {
        "status": "affected",
        "version": "5.7.2.17"
      },
      {
        "status": "affected",
        "version": "5.7.2.18"
      },
      {
        "status": "affected",
        "version": "5.7.2.19"
      },
      {
        "status": "affected",
        "version": "5.7.2.20"
      },
      {
        "status": "affected",
        "version": "5.7.2.21"
      },
      {
        "status": "affected",
        "version": "5.7.2.22"
      }
    ]
  }
]

Social References

More

8.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.2%

Related for CVE-2020-36529