Categories
NVD NVD Nist GOV

NVD – CVE-2020-13364

CVE-2020-13364 Detail

Undergoing Analysis


This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary.

Description

A backdoor in certain Zyxel products allows remote TELNET access via a CGI script. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4.81(AALS.0)C0 and V4.81(AAAJ.1)C0; NSA310 4.22(AFK.0)C0 and 4.22(AFK.1)C0; NAS326 V5.21(AAZF.8)C0, V5.11(AAZF.4)C0, V5.11(AAZF.2)C0, and V5.11(AAZF.3)C0; NSA310S V4.75(AALH.2)C0; NSA320S V4.75(AANV.2)C0 and V4.75(AANV.1)C0; NSA221 V4.41(AFM.1)C0; and NAS540 V5.21(AATB.5)C0 and V5.21(AATB.3)C0.

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source

Change History

0 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2020-13364
NVD Published Date:
08/06/2020
NVD Last Modified:
08/06/2020
Source:
MITRE

Categories
NVD NVD Nist GOV

NVD – CVE-2020-13365

CVE-2020-13365 Detail

Undergoing Analysis


This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary.

Description

Certain Zyxel products have a locally accessible binary that allows a non-root user to generate a password for an undocumented user account that can be used for a TELNET session as root. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4.81(AALS.0)C0 and V4.81(AAAJ.1)C0; NSA310 4.22(AFK.0)C0 and 4.22(AFK.1)C0; NAS326 V5.21(AAZF.8)C0, V5.11(AAZF.4)C0, V5.11(AAZF.2)C0, and V5.11(AAZF.3)C0; NSA310S V4.75(AALH.2)C0; NSA320S V4.75(AANV.2)C0 and V4.75(AANV.1)C0; NSA221 V4.41(AFM.1)C0; and NAS540 V5.21(AATB.5)C0 and V5.21(AATB.3)C0.

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source

Change History

0 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2020-13365
NVD Published Date:
08/06/2020
NVD Last Modified:
08/06/2020
Source:
MITRE

Categories
NVD NVD Nist GOV

NVD – CVE-2020-13376

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Categories
NVD NVD Nist GOV

NVD – CVE-2020-13404

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Categories
NVD NVD Nist GOV

NVD – CVE-2020-13522

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Categories
NVD NVD Nist GOV

NVD – CVE-2020-13523

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Categories
NVD NVD Nist GOV

NVD – CVE-2020-13793

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Categories
NVD NVD Nist GOV

NVD – CVE-2020-13819

CVE-2020-13819 Detail

Current Description

Extreme EAC Appliance 8.4.1.24 allows unauthenticated reflected XSS via a parameter in a GET request.

View Analysis Description

Analysis Description

Extreme EAC Appliance 8.4.1.24 allows unauthenticated reflected XSS via a parameter in a GET request.

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-79 Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) NIST  

Change History

1 change records found show changes

Initial Analysis 8/06/2020 4:0:14 PM

Action Type Old Value New Value
Added CPE Configuration
OR
     *cpe:2.3:a:extremenetworks:extreme_management_center:*:*:*:*:*:*:*:* versions up to (excluding) 8.5.0.169
Added CVSS V2
NIST (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Added CVSS V2 Metadata
Victim must voluntarily interact with attack mechanism
Added CVSS V3.1
NIST AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Added CWE
NIST CWE-79
Changed Reference Type
https://documentation.extremenetworks.com/release_notes/netsight/XMC_8.5.0_Release_Notes.pdf No Types Assigned
https://documentation.extremenetworks.com/release_notes/netsight/XMC_8.5.0_Release_Notes.pdf Release Notes, Vendor Advisory
Changed Reference Type
https://gtacknowledge.extremenetworks.com No Types Assigned
https://gtacknowledge.extremenetworks.com Vendor Advisory
Changed Reference Type
https://gtacknowledge.extremenetworks.com/articles/Solution/000051136 No Types Assigned
https://gtacknowledge.extremenetworks.com/articles/Solution/000051136 Vendor Advisory

Quick Info

CVE Dictionary Entry:
CVE-2020-13819
NVD Published Date:
08/05/2020
NVD Last Modified:
08/06/2020
Source:
MITRE

Categories
NVD NVD Nist GOV

NVD – CVE-2020-13921

CVE-2020-13921 Detail

Current Description

**Resolved** Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases.

View Analysis Description

Analysis Description

**Resolved** Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases.

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-89 Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) NIST  

Change History

2 change records found show changes

Initial Analysis 8/07/2020 9:26:22 AM

Action Type Old Value New Value
Added CPE Configuration
OR
     *cpe:2.3:a:apache:skywalking:6.5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:skywalking:6.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:skywalking:7.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:skywalking:8.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:skywalking:8.0.1:*:*:*:*:*:*:*
Added CVSS V2
NIST (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Added CVSS V3.1
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE
NIST CWE-89
Changed Reference Type
http://www.openwall.com/lists/oss-security/2020/08/05/3 No Types Assigned
http://www.openwall.com/lists/oss-security/2020/08/05/3 Mailing List, Third Party Advisory
Changed Reference Type
https://github.com/apache/skywalking/pull/4970 No Types Assigned
https://github.com/apache/skywalking/pull/4970 Third Party Advisory
Changed Reference Type
https://lists.apache.org/thread.html/[email protected]%3Cdev.skywalking.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/[email protected]%3Cdev.skywalking.apache.org%3E Mailing List, Vendor Advisory

CVE Modified by MITRE 8/05/2020 11:15:13 AM

Action Type Old Value New Value
Added Reference
http://www.openwall.com/lists/oss-security/2020/08/05/3 [No Types Assigned]
Added Reference
https://lists.apache.org/thread.html/[email protected]%3Cdev.skywalking.apache.org%3E [No Types Assigned]

Quick Info

CVE Dictionary Entry:
CVE-2020-13921
NVD Published Date:
08/05/2020
NVD Last Modified:
08/07/2020
Source:
MITRE

Categories
NVD NVD Nist GOV

NVD – CVE-2020-14344

CVE-2020-14344 Detail

Modified


This vulnerability has been modified since it was last analyzed by the NVD. It is awaiting reanalysis which may result in further changes to the information provided.

Current Description

An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.

View Analysis Description

Analysis Description

An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-190 Integer Overflow or Wraparound NIST  
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer Red Hat, Inc.  

Change History

3 change records found show changes

CVE Modified by MITRE 8/08/2020 8:15:12 AM

Action Type Old Value New Value
Added Reference
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html [No Types Assigned]

CVE Modified by MITRE 8/07/2020 8:15:11 PM

Action Type Old Value New Value
Added Reference
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html [No Types Assigned]

Initial Analysis 8/06/2020 4:26:16 PM

Action Type Old Value New Value
Added CPE Configuration
OR
     *cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:* versions up to (excluding) 1.6.10
Added CVSS V2
NIST (AV:L/AC:L/Au:N/C:P/I:P/A:P)
Added CVSS V3.1
NIST AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Added CWE
NIST CWE-190
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344 Issue Tracking, Patch, Third Party Advisory
Changed Reference Type
https://lists.x.org/archives/xorg-announce/2020-July/003050.html No Types Assigned
https://lists.x.org/archives/xorg-announce/2020-July/003050.html Mailing List, Patch, Vendor Advisory
Changed Reference Type
https://www.openwall.com/lists/oss-security/2020/07/31/1 No Types Assigned
https://www.openwall.com/lists/oss-security/2020/07/31/1 Mailing List, Patch, Third Party Advisory

Quick Info

CVE Dictionary Entry:
CVE-2020-14344
NVD Published Date:
08/05/2020
NVD Last Modified:
08/08/2020
Source:
MITRE