{"vulnerability": "cve-2020-1064", "sightings": [{"uuid": "c5559036-38d0-4d7a-8ca4-a57a9555044c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10640", "type": "seen", "source": "https://t.me/cibsecurity/38050", "content": "\u203c CVE-2020-10640 \u203c\n\nEmerson OpenEnterprise versions through 3.3.4 may allow an attacker to run an arbitrary commands with system privileges or perform remote code execution via a specific communication service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-24T22:15:01.000000Z"}, {"uuid": "9aaa7062-042b-4492-883f-b2838f6832f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10641", "type": "seen", "source": "https://t.me/SecLabNews/7470", "content": "\u0412 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 Ignition 8 Gateway \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Inductive Automation \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u043e\u043f\u0430\u0441\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2020-10641), \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0438 \u0442\u0430\u043a\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u044b. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043e\u0446\u0435\u043d\u043a\u0443 \u0432 9,1 \u0431\u0430\u043b\u043b\u0430 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS v3.    \n\u0412 \u041f\u041e Ignition 8 Gateway \u0434\u043b\u044f \u0410\u0421\u0423 \u0422\u041f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 DoS-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c", "creation_timestamp": "2020-04-28T11:45:01.000000Z"}, {"uuid": "072cb15a-172f-4d52-bbec-4ad3574fa517", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10640", "type": "seen", "source": "https://t.me/SecLabNews/7686", "content": "\u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u0438\u0437 \u00ab\u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e\u00bb \u0432\u044b\u044f\u0432\u0438\u043b\u0438 \u0447\u0435\u0442\u044b\u0440\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 (CVE-2020-10640, CVE-2020-10632, CVE-2020-10636 \u0438 CVE-2020-6970) \u0432 Emerson OpenEnterprise \u2014 \u0440\u0435\u0448\u0435\u043d\u0438\u0438 \u0434\u043b\u044f \u0434\u0438\u0441\u043f\u0435\u0442\u0447\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u0441\u0431\u043e\u0440\u0430 \u0434\u0430\u043d\u043d\u044b\u0445 (SCADA), \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u043e\u043c \u0434\u043b\u044f \u043d\u0435\u0444\u0442\u0435\u0433\u0430\u0437\u043e\u0432\u043e\u0439 \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u043e\u0441\u0442\u0438.    \n\u0412 \u041f\u041e Emerson OpenEnterprise \u0434\u043b\u044f SCADA \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439", "creation_timestamp": "2020-05-27T11:15:02.000000Z"}, {"uuid": "e4b03d73-af53-4bf2-895d-622ab0cfe970", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10644", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/scada/inductive_ignition_rce.rb", "content": "", "creation_timestamp": "2020-06-25T16:25:27.000000Z"}, {"uuid": "4def81f1-8689-47d6-9d77-1a3e2acaecc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10648", "type": "published-proof-of-concept", "source": "https://t.me/freeosint/1172", "content": "\ud83d\udce1U-boot \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 Starlink \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0433\u043b\u0430\u0432\u043d\u043e\u0433\u043e \u0431\u0443\u0442\u043b\u043e\u0430\u0434\u0435\u0440\u0430 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u0430 (\u043f\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c \u043f\u043e\u0441\u0442\u0430\u043c \u0432 \u043a\u0430\u043d\u0430\u043b\u0435 \u0443\u0436\u0435 \u0441\u043a\u043e\u0440\u0435\u0435 \u0432\u0441\u0435\u0433\u043e \u0437\u043d\u0430\u0435\u0442\u0435, \u0438\u043b\u0438 \u0440\u0430\u043d\u0435\u0435 \u0437\u043d\u0430\u043b\u0438), \u0435\u0441\u043b\u0438 \u043a\u0442\u043e \u0432\u0434\u0440\u0443\u0433 \u0437\u0430\u0445\u043e\u0447\u0435\u0442 \u0437\u0430\u043d\u044f\u0442\u044c\u0441\u044f \u0435\u0433\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435\u043c,  \u043f\u0440\u0438\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u044e \u043d\u0438\u0436\u0435 \u0441\u0441\u044b\u043b\u043a\u0438 \u0434\u043b\u044f \u0443\u043f\u0440\u043e\u0449\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430\n\n\ud83d\udce1U-boot is used in Starlink as the main bootloader in terminal (according to some posts in the channel, you probably already know, or previously knew), if someone suddenly wants to do his research, I attach the links below to simplify the process.\n\n\ud83d\udcbeU-Boot Source Tree\n\ud83d\udcbeu-boot from starlink wi-fi gen2 \n\ud83d\udcbeU-Boot in OpenWrt\n\ud83d\udcbeu-boot docs \n\ud83d\udcbeThe u-booting securely\n\ud83d\udcbeU-Boot Secure Boot\n\ud83d\udcbeU-Boot Verified Boot vulnerability: CVE-2020-10648\n\ud83d\udcbeAnalysis and reverse-engineering of the original Starlink router(helpful information about u-boot in Starlink)\n\ud83d\udcbeReversing embedded device bootloader (U-Boot) - p.1\n\ud83d\udcbeReversing embedded device bootloader (U-Boot) - p.2\n\ud83d\udcbeDas U-Boot Verified Boot Bypass\n\ud83d\udcbeRecovering Firmware Through U-boot\n\ud83d\udcbeBushwhacking your way around a bootloader\n\ud83d\udcbeMultiple Vulnerabilities in U-Boot (CVE-2022-30790, CVE-2022-30552)\n\ud83d\udcbeCVE-2022-2347\n\ud83d\udcbedepthcharge is an U-Boot hacking toolkit for security researchers and tinkerers", "creation_timestamp": "2022-11-05T09:45:10.000000Z"}, {"uuid": "fea7d197-21bb-4b6f-aaf4-5db1181de6c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10642", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/936", "content": "#exploit\nCVE-2020-10642:\nRockwell Automation RSLinx Classic &lt;=4.11 - Incorrect Permission Assignment for Critical Resource\nhttps://www.us-cert.gov/ics/advisories/icsa-20-100-01\nhttps://cwe.mitre.org/data/definitions/732.html", "creation_timestamp": "2024-07-09T16:11:36.000000Z"}, {"uuid": "f3c61019-f491-418c-b4d4-5911d9f646c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10649", "type": "seen", "source": "https://t.me/cibsecurity/10807", "content": "ATENTION\u203c New - CVE-2020-10649\n\nDevActSvc.exe in ASUS Device Activation before 1.0.7.0 for Windows 10 notebooks and PCs could lead to unsigned code execution with no additional restrictions when a user puts an application at a particular path with a particular file name.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-03-30T09:47:31.000000Z"}, {"uuid": "993bd945-95ae-48df-b39a-2b084c772282", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10643", "type": "seen", "source": "https://t.me/cibsecurity/13686", "content": "ATENTION\u203c New - CVE-2020-10643\n\nAn authenticated remote attacker could use specially crafted URLs to send a victim using PI Vision 2019 mobile to a vulnerable web page due to a known issue in a third-party component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-28T02:55:27.000000Z"}, {"uuid": "f1d15265-cc22-4706-9012-c0fdf9cbfe1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10644", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "3ca9e5a8-b330-466f-b856-a925b286d50f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10644", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:21.000000Z"}, {"uuid": "7009d7e4-eb61-4222-8858-1e003def8c15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10641", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1005", "content": "#SCADA_Security\nSCADA systems vulnerabilities:\n1. CVE-2020-10641:\nDenial of service in Inductive Automation Ignition 8 Gateway (versions prior to 8.0.10)\nhttps://www.us-cert.gov/ics/advisories/icsa-20-112-01\n2. ZSL-2020-5564:\nP5 FNIP-8x16A/FNIP-4xSH (ver.1.0.11, 1.0.20) Ethernet Relay Switch - CSRF Stored Cross-Site Scripting (PoC)\nhttps://packetstormsecurity.com/files/157318/P5-FNIP-8x16A-FNIP-4xSH-CSRF-Cross-Site-Scripting.html", "creation_timestamp": "2020-12-23T18:12:15.000000Z"}, {"uuid": "79ea8a0c-5e69-4abe-b923-8d757bc7beb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10644", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1355", "content": "#SCADA_Security\nCVE-2020-10644, CVE-2020-12004:\nJava deserialization vulnerability in the Inductive Automation Ignition SCADA product, versions 8.0 - 8.0.7\nhttps://packetstormsecurity.com/files/158226/inductive_ignition_rce.rb.txt", "creation_timestamp": "2024-10-31T02:05:38.000000Z"}, {"uuid": "50d0cae9-c371-4e62-803e-04122dc8863a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-1064", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2005", "content": "Multiple vulnerabilities\n(CVE-2020-27649, CVE-2020-27651, CVE-2020-27653, CVE-2020-27654, CVE-2020-1060, CVE-2020-1064, CVE-2020-27655, CVE-2020-27657, CVE-2020-27658)\nin Synology SRM (Synology Router Manager) (PoCs)\nhttps://blog.talosintelligence.com/2020/10/vulnerability-spotlight-multiple.html", "creation_timestamp": "2022-05-27T01:29:01.000000Z"}]}