var-202006-1073
Vulnerability from variot
A vulnerability in the implementation of the inter-VM channel of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, adjacent attacker to execute arbitrary shell commands on the Virtual Device Server (VDS) of an affected device. The vulnerability is due to insufficient validation of signaling packets that are destined to VDS. An attacker could exploit this vulnerability by sending malicious packets to an affected device. A successful exploit could allow the attacker to execute arbitrary commands in the context of the Linux shell of VDS with the privileges of the root user. Because the device is designed on a hypervisor architecture, exploitation of a vulnerability that affects the inter-VM channel may lead to a complete system compromise. For more information about this vulnerability, see the Details section of this advisory. Cisco IOS The software contains an input verification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Cisco 809 Industrial Integrated Services Routers, etc. are all products of the United States Cisco (Cisco) company. Cisco 1000 Series Connected Grid Routers is a 1000 series Internet grid router. Cisco IOS Software is a set of software developed for its network equipment running on it.
Cisco 809 Industrial ISRs, 829 Industrial ISRs, and IOS Software's inter-VM channel in CGR1000 have input verification error vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1073", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m10" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)t1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.9\\(3\\)m0a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m9" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m9" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.7\\(3\\)m1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.8\\(3\\)m1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)t4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m6a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m10" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m9" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)t1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jaa1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.7\\(3\\)m7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)t4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)t3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.8\\(3\\)m2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.7\\(3\\)m3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.8\\(3\\)m3b" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.8\\(3\\)m5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m6a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.7\\(3\\)m2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m0a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)t2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.8\\(3\\)m2a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.8\\(3\\)m3a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.8\\(3\\)m4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)jaz1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m1b" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)cg" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)t1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m4a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.7\\(3\\)m6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.8\\(3\\)m" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)t2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.8\\(3\\)m3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)t2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpj" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(60\\)ez16" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m0a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m6a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m3a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.7\\(3\\)m5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.9\\(3\\)m" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpi" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)sg11a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m11" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.8\\(3\\)m0a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.7\\(3\\)m" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)t3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.7\\(3\\)m4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m6b" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)t3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.7\\(3\\)m4a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)t3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)cg" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m2a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)t0a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)t2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.7\\(3\\)m4b" }, { "model": "ios", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "industrial integrated services routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "809" }, { "model": "industrial integrated services routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "829" }, { "model": "series connected grid routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1000" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-31994" }, { "db": "JVNDB", "id": "JVNDB-2020-006137" }, { "db": "NVD", "id": "CVE-2020-3205" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:cisco:ios", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006137" } ] }, "cve": "CVE-2020-3205", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CVE-2020-3205", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 8.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2020-006137", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CNVD-2020-31994", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-3205", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-3205", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-006137", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-3205", "trust": 1.0, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2020-3205", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-006137", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-31994", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202006-392", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-31994" }, { "db": "JVNDB", "id": "JVNDB-2020-006137" }, { "db": "CNNVD", "id": "CNNVD-202006-392" }, { "db": "NVD", "id": "CVE-2020-3205" }, { "db": "NVD", "id": "CVE-2020-3205" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the implementation of the inter-VM channel of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, adjacent attacker to execute arbitrary shell commands on the Virtual Device Server (VDS) of an affected device. The vulnerability is due to insufficient validation of signaling packets that are destined to VDS. An attacker could exploit this vulnerability by sending malicious packets to an affected device. A successful exploit could allow the attacker to execute arbitrary commands in the context of the Linux shell of VDS with the privileges of the root user. Because the device is designed on a hypervisor architecture, exploitation of a vulnerability that affects the inter-VM channel may lead to a complete system compromise. For more information about this vulnerability, see the Details section of this advisory. Cisco IOS The software contains an input verification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Cisco 809 Industrial Integrated Services Routers, etc. are all products of the United States Cisco (Cisco) company. Cisco 1000 Series Connected Grid Routers is a 1000 series Internet grid router. Cisco IOS Software is a set of software developed for its network equipment running on it. \n\r\n\r\nCisco 809 Industrial ISRs, 829 Industrial ISRs, and IOS Software\u0027s inter-VM channel in CGR1000 have input verification error vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2020-3205" }, { "db": "JVNDB", "id": "JVNDB-2020-006137" }, { "db": "CNVD", "id": "CNVD-2020-31994" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-3205", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2020-006137", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-31994", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47192", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1935", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202006-392", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-31994" }, { "db": "JVNDB", "id": "JVNDB-2020-006137" }, { "db": "CNNVD", "id": "CNNVD-202006-392" }, { "db": "NVD", "id": "CVE-2020-3205" } ] }, "id": "VAR-202006-1073", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-31994" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-31994" } ] }, "last_update_date": "2024-11-23T21:59:11.975000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-ios-iot-udp-vds-inj-f2D5Jzrt", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-udp-vds-inj-f2D5Jzrt" }, { "title": "Patches for multiple Cisco product input validation error vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/220725" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-31994" }, { "db": "JVNDB", "id": "JVNDB-2020-006137" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 }, { "problemtype": "CWE-78", "trust": 1.0 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006137" }, { "db": "NVD", "id": "CVE-2020-3205" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-3205" }, { "trust": 1.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-ios-iot-udp-vds-inj-f2d5jzrt" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3205" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-ios-code-execution-via-cisco-industrial-routers-virtual-device-server-32416" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47192" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1935/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-31994" }, { "db": "JVNDB", "id": "JVNDB-2020-006137" }, { "db": "CNNVD", "id": "CNNVD-202006-392" }, { "db": "NVD", "id": "CVE-2020-3205" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-31994" }, { "db": "JVNDB", "id": "JVNDB-2020-006137" }, { "db": "CNNVD", "id": "CNNVD-202006-392" }, { "db": "NVD", "id": "CVE-2020-3205" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-09T00:00:00", "db": "CNVD", "id": "CNVD-2020-31994" }, { "date": "2020-07-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-006137" }, { "date": "2020-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-392" }, { "date": "2020-06-03T18:15:18.573000", "db": "NVD", "id": "CVE-2020-3205" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-09T00:00:00", "db": "CNVD", "id": "CNVD-2020-31994" }, { "date": "2020-07-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-006137" }, { "date": "2022-03-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-392" }, { "date": "2024-11-21T05:30:33.330000", "db": "NVD", "id": "CVE-2020-3205" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-392" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IOS Input verification vulnerabilities in software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006137" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-392" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.