VAR-202005-1060

Vulnerability from variot - Updated: 2024-08-14 14:44

Inadequate folder security permissions in Emerson OpenEnterprise versions through 3.3.4 may allow modification of important configuration files, which could cause the system to fail or behave in an unpredictable manner. OpenEnterprise teeth Emerson Industrial SCADA It's software. OpenEnterprise contains the following multiple vulnerabilities: * Improper ownership management (CWE-282) - CVE-2020-10632 Inadequate cipher strength (CWE-326) - CVE-2020-10636 Lack of authentication for critical features (CWE-306) - CVE-2020-10640The potential impact will vary for each vulnerability, but you may be affected by: * Incorrect settings of access permissions for folders in the system allow a local third party to tamper with important configuration files, resulting in system failures or unexpected behavior. - CVE-2020-10632 By a local third party OpenEnterprise The password of the user account is obtained - CVE-2020-10636 A remote third party may execute arbitrary commands with system privileges or execute arbitrary code via a specific communication path. - CVE-2020-10640. Emerson Electric OpenEnterprise is a set of data acquisition and monitoring system (SCADA) mainly used for remote oil and gas applications by Emerson Electric.

There is a security vulnerability in Emerson Electric OpenEnterprise 3.3.4 and earlier versions. The vulnerability results from the program setting unsafe permissions for folders. Attackers can use this vulnerability to modify important configuration files, causing system failures or anomalies. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202005-1060",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "electric openenterprise",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "\u003c=3.3.4"
      },
      {
        "model": "openenterprise scada server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "3.3.4"
      },
      {
        "model": "openenterprise scada server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": "3.3.4    all previous  s"
      },
      {
        "model": "openenterprise scada server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a8\u30de\u30bd\u30f3",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "21189bd7-874f-4161-b42a-d22194346b1c"
      },
      {
        "db": "IVD",
        "id": "83abc14e-eb03-44cf-90b6-cea015740c6c"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-32663"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-004589"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10632"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Roman Lozko of Kaspersky",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-953"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2020-10632",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2020-10632",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2020-32663",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "21189bd7-874f-4161-b42a-d22194346b1c",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "83abc14e-eb03-44cf-90b6-cea015740c6c",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2020-10632",
            "impactScore": 1.4,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ics-cert@hq.dhs.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.0,
            "id": "CVE-2020-10632",
            "impactScore": 6.0,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "IPA",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-004589",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2020-10632",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "ics-cert@hq.dhs.gov",
            "id": "CVE-2020-10632",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2020-10632",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-32663",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202005-953",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "21189bd7-874f-4161-b42a-d22194346b1c",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "83abc14e-eb03-44cf-90b6-cea015740c6c",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-10632",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "21189bd7-874f-4161-b42a-d22194346b1c"
      },
      {
        "db": "IVD",
        "id": "83abc14e-eb03-44cf-90b6-cea015740c6c"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-32663"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-10632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-004589"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-953"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10632"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10632"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Inadequate folder security permissions in Emerson OpenEnterprise versions through 3.3.4 may allow modification of important configuration files, which could cause the system to fail or behave in an unpredictable manner. OpenEnterprise teeth Emerson Industrial SCADA It\u0027s software. OpenEnterprise contains the following multiple vulnerabilities: * Improper ownership management (CWE-282) - CVE-2020-10632* Inadequate cipher strength (CWE-326) - CVE-2020-10636* Lack of authentication for critical features (CWE-306) - CVE-2020-10640The potential impact will vary for each vulnerability, but you may be affected by: * Incorrect settings of access permissions for folders in the system allow a local third party to tamper with important configuration files, resulting in system failures or unexpected behavior. - CVE-2020-10632* By a local third party OpenEnterprise The password of the user account is obtained - CVE-2020-10636* A remote third party may execute arbitrary commands with system privileges or execute arbitrary code via a specific communication path. - CVE-2020-10640. Emerson Electric OpenEnterprise is a set of data acquisition and monitoring system (SCADA) mainly used for remote oil and gas applications by Emerson Electric. \n\r\n\r\nThere is a security vulnerability in Emerson Electric OpenEnterprise 3.3.4 and earlier versions. The vulnerability results from the program setting unsafe permissions for folders. Attackers can use this vulnerability to modify important configuration files, causing system failures or anomalies. **  ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-10632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-004589"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-32663"
      },
      {
        "db": "IVD",
        "id": "21189bd7-874f-4161-b42a-d22194346b1c"
      },
      {
        "db": "IVD",
        "id": "83abc14e-eb03-44cf-90b6-cea015740c6c"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-10632"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-10632",
        "trust": 4.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-20-140-02",
        "trust": 3.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-32663",
        "trust": 1.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-953",
        "trust": 1.0
      },
      {
        "db": "JVN",
        "id": "JVNVU92838573",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-004589",
        "trust": 0.8
      },
      {
        "db": "NSFOCUS",
        "id": "46744",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "21189BD7-874F-4161-B42A-D22194346B1C",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "83ABC14E-EB03-44CF-90B6-CEA015740C6C",
        "trust": 0.2
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-10632",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "21189bd7-874f-4161-b42a-d22194346b1c"
      },
      {
        "db": "IVD",
        "id": "83abc14e-eb03-44cf-90b6-cea015740c6c"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-32663"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-10632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-004589"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-953"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10632"
      }
    ]
  },
  "id": "VAR-202005-1060",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "21189bd7-874f-4161-b42a-d22194346b1c"
      },
      {
        "db": "IVD",
        "id": "83abc14e-eb03-44cf-90b6-cea015740c6c"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-32663"
      }
    ],
    "trust": 1.83333335
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "21189bd7-874f-4161-b42a-d22194346b1c"
      },
      {
        "db": "IVD",
        "id": "83abc14e-eb03-44cf-90b6-cea015740c6c"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-32663"
      }
    ]
  },
  "last_update_date": "2024-08-14T14:44:50.176000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Emerson\u00a0SupportNet",
        "trust": 0.8,
        "url": "https://www3.emersonprocess.com/remote/support/v3/main.html"
      },
      {
        "title": "Patch for Emerson OpenEnterprise Rights Management Improper Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/221349"
      },
      {
        "title": "Emerson Electric OpenEnterprise Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=119025"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-32663"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-004589"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-953"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-282",
        "trust": 1.0
      },
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": " others (CWE-Other) [NVD evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": " Inappropriate cryptographic strength (CWE-326) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-004589"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10632"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-20-140-02"
      },
      {
        "trust": 1.7,
        "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-140-02"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu92838573"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10632"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10636"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10640"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2020-10632/"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/46744"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-32663"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-10632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-004589"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-953"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10632"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "21189bd7-874f-4161-b42a-d22194346b1c"
      },
      {
        "db": "IVD",
        "id": "83abc14e-eb03-44cf-90b6-cea015740c6c"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-32663"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-10632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-004589"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-953"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10632"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-05-19T00:00:00",
        "db": "IVD",
        "id": "21189bd7-874f-4161-b42a-d22194346b1c"
      },
      {
        "date": "2020-05-19T00:00:00",
        "db": "IVD",
        "id": "83abc14e-eb03-44cf-90b6-cea015740c6c"
      },
      {
        "date": "2020-06-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-32663"
      },
      {
        "date": "2022-02-24T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-10632"
      },
      {
        "date": "2020-05-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-004589"
      },
      {
        "date": "2020-05-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202005-953"
      },
      {
        "date": "2022-02-24T19:15:08.543000",
        "db": "NVD",
        "id": "CVE-2020-10632"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-06-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-32663"
      },
      {
        "date": "2022-03-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-10632"
      },
      {
        "date": "2024-06-20T09:12:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-004589"
      },
      {
        "date": "2022-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202005-953"
      },
      {
        "date": "2022-03-07T19:58:14.080000",
        "db": "NVD",
        "id": "CVE-2020-10632"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-953"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Emerson\u00a0 Made \u00a0OpenEnterprise\u00a0 Multiple vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-004589"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "IVD",
        "id": "21189bd7-874f-4161-b42a-d22194346b1c"
      },
      {
        "db": "IVD",
        "id": "83abc14e-eb03-44cf-90b6-cea015740c6c"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-953"
      }
    ],
    "trust": 1.0
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…