Lucene search

K
cveIcscertCVE-2020-6959
HistoryJan 22, 2020 - 3:15 p.m.

CVE-2020-6959

2020-01-2215:15:11
CWE-502
icscert
web.nvd.nist.gov
29
maxpro vms
maxpro nvr
vms560
build 595
t2-patch
unsafe deserialization
remote code execution
cve-2020-6959
nvd

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.016

Percentile

87.4%

The following versions of MAXPRO VMS and NVR, MAXPRO VMS:HNMSWVMS prior to Version VMS560 Build 595 T2-Patch, HNMSWVMSLT prior to Version VMS560 Build 595 T2-Patch, MAXPRO NVR: MAXPRO NVR XE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR SE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR PE prior to Version NVR 5.6 Build 595 T2-Patch, and MPNVRSWXX prior to Version NVR 5.6 Build 595 T2-Patch are vulnerable to an unsafe deserialization of untrusted data. An attacker may be able to remotely modify deserialized data without authentication using a specially crafted web request, resulting in remote code execution.

Affected configurations

Nvd
Node
honeywellmaxpro_nvr_xeMatch-
AND
honeywellmaxpro_nvr_xe_firmwareRange5.6
Node
honeywellmaxpro_nvr_seMatch-
AND
honeywellmaxpro_nvr_se_firmwareRange5.6
Node
honeywellmaxpro_nvr_peMatch-
AND
honeywellmaxpro_nvr_pe_firmwareRange5.6
Node
honeywellmpnvrswxxMatch-
AND
honeywellmpnvrswxx_firmwareRange5.6
Node
honeywellhnmswvmsMatch-
AND
honeywellhnmswvms_firmwareRangevms560
Node
honeywellhnmswvmsltMatch-
AND
honeywellhnmswvmslt_firmwareRangevms560
VendorProductVersionCPE
honeywellmaxpro_nvr_xe-cpe:2.3:h:honeywell:maxpro_nvr_xe:-:*:*:*:*:*:*:*
honeywellmaxpro_nvr_xe_firmware*cpe:2.3:o:honeywell:maxpro_nvr_xe_firmware:*:*:*:*:*:*:*:*
honeywellmaxpro_nvr_se-cpe:2.3:h:honeywell:maxpro_nvr_se:-:*:*:*:*:*:*:*
honeywellmaxpro_nvr_se_firmware*cpe:2.3:o:honeywell:maxpro_nvr_se_firmware:*:*:*:*:*:*:*:*
honeywellmaxpro_nvr_pe-cpe:2.3:h:honeywell:maxpro_nvr_pe:-:*:*:*:*:*:*:*
honeywellmaxpro_nvr_pe_firmware*cpe:2.3:o:honeywell:maxpro_nvr_pe_firmware:*:*:*:*:*:*:*:*
honeywellmpnvrswxx-cpe:2.3:h:honeywell:mpnvrswxx:-:*:*:*:*:*:*:*
honeywellmpnvrswxx_firmware*cpe:2.3:o:honeywell:mpnvrswxx_firmware:*:*:*:*:*:*:*:*
honeywellhnmswvms-cpe:2.3:h:honeywell:hnmswvms:-:*:*:*:*:*:*:*
honeywellhnmswvms_firmware*cpe:2.3:o:honeywell:hnmswvms_firmware:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 121

CNA Affected

[
  {
    "product": "Honeywell Maxpro VMS & NVR",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "The following versions of MAXPRO VMS and NVR, MAXPRO VMS:HNMSWVMS prior to Version VMS560 Build 595 T2-Patch, HNMSWVMSLT prior to Version VMS560 Build 595 T2-Patch, MAXPRO NVR: MAXPRO NVR XE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR SE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR PE prior to Version NVR 5.6 Build 595 T2-Patch, MPNVRSWXX prior to Version NVR 5.6 Build 595 T2-Patch"
      }
    ]
  }
]

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.016

Percentile

87.4%

Related for CVE-2020-6959