VDE-2020-034
Vulnerability from csaf_pepperlfuchsse - Published: 2020-09-10 13:22 - Updated: 2020-09-10 13:22An attacker could send a specially crafted packet that could have CodeMeter (All versions prior to 7.10) send back packets containing data from the heap.
Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to exploit these vulnerabilities.
<p>Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to exploit these vulnerabilities.</p>
This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.
<p>This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.</p>
CodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.
<p>CodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.</p>
Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.
<p>Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.</p>
CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Only CmActLicense update files with CmActLicense Firm Code are affected.
<p>CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Only CmActLicense update files with CmActLicense Firm Code are affected.</p>
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"names": [
"Tal Keren",
"Sharon Brizinov"
],
"organization": "Claroty",
"summary": "reporting"
},
{
"organization": "WIBU-Systems",
"summary": "reporting"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "Several vulnerabilities have been discovered in the utilized component WIBU-SYSTEMS CodeMeter Runtime.\nFor detailed information please refer to WIBU-SYSTEMS original Advisories at\u00a0https://wibu.com/support/security-advisories.html",
"title": "Summary"
},
{
"category": "description",
"text": "Pepperl+Fuchs analyzed and identified affected products.Products are affected according to WIBU-Systems classification.",
"title": "Impact"
},
{
"category": "description",
"text": "For VMT MSS\nUpdate to WIBU Systems CodeMeter Runtime 7.10 or newer.\n\n\nFor VMT IS\nPlease contact VMT GmbH to receive support for the product update process.",
"title": "Remediation"
},
{
"category": "description",
"text": "In general and without any update, this product can be operated in a secure local network that has no connection to an untrusted network, like internet or global corporate IT-net.",
"title": "Mitigation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "cert@pepperl-fuchs.com",
"name": "Pepperl+Fuchs SE",
"namespace": "https://www.pepperl-fuchs.com"
},
"references": [
{
"category": "self",
"summary": "VDE-2020-034: Pepperl+Fuchs: VMT MSS and VMT IS - Several vulnerabilities in products utilizing WIBU-SYSTEMS CodeMeter components - HTML",
"url": "https://certvde.com/en/advisories/VDE-2020-034/"
},
{
"category": "self",
"summary": "VDE-2020-034: Pepperl+Fuchs: VMT MSS and VMT IS - Several vulnerabilities in products utilizing WIBU-SYSTEMS CodeMeter components - CSAF",
"url": "https://pepperl-fuchs.csaf-tp.certvde.com/.well-known/csaf/white/2020/vde-2020-034.json"
},
{
"category": "external",
"summary": "Vendor PSIRT",
"url": "https://www.pepperl-fuchs.com"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for Pepperl+Fuchs SE",
"url": "https://certvde.com/en/advisories/vendor/pepperl-fuchs/"
}
],
"title": "Pepperl+Fuchs: VMT MSS and VMT IS - Several vulnerabilities in products utilizing WIBU-SYSTEMS CodeMeter components",
"tracking": {
"aliases": [
"VDE-2020-034"
],
"current_release_date": "2020-09-10T13:22:00.000Z",
"generator": {
"date": "2025-06-30T07:35:02.211Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.29"
}
},
"id": "VDE-2020-034",
"initial_release_date": "2020-09-10T13:22:00.000Z",
"revision_history": [
{
"date": "2020-09-10T13:22:00.000Z",
"number": "1.0.0",
"summary": "Initial revision."
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.81",
"product": {
"name": "CodeMeter Runtime \u003c6.81",
"product_id": "CSAFPID-51001"
}
},
{
"category": "product_version_range",
"name": "\u003c6.90",
"product": {
"name": "CodeMeter Runtime \u003c6.90",
"product_id": "CSAFPID-51002"
}
},
{
"category": "product_version_range",
"name": "\u003c7.10",
"product": {
"name": "CodeMeter Runtime \u003c7.10",
"product_id": "CSAFPID-51003"
}
},
{
"category": "product_version_range",
"name": "\u003c7.10a",
"product": {
"name": "CodeMeter Runtime \u003c7.10a",
"product_id": "CSAFPID-51004"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "CodeMeter Runtime vers:all/*",
"product_id": "CSAFPID-51005"
}
},
{
"category": "product_version",
"name": "6.81",
"product": {
"name": "CodeMeter Runtime 6.81",
"product_id": "CSAFPID-52001"
}
},
{
"category": "product_version",
"name": "6.90",
"product": {
"name": "CodeMeter Runtime 6.90",
"product_id": "CSAFPID-52002"
}
},
{
"category": "product_version",
"name": "7.10",
"product": {
"name": "CodeMeter Runtime 7.10",
"product_id": "CSAFPID-52003"
}
},
{
"category": "product_version",
"name": "7.10a",
"product": {
"name": "CodeMeter Runtime 7.10a",
"product_id": "CSAFPID-52004"
}
}
],
"category": "product_name",
"name": "CodeMeter Runtime"
}
],
"category": "product_family",
"name": "Software"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "MSS",
"product": {
"name": "VMT Software MSS",
"product_id": "CSAFPID-51006"
}
},
{
"category": "product_name",
"name": "IS",
"product": {
"name": "VMT Software IS",
"product_id": "CSAFPID-51007"
}
}
],
"category": "product_family",
"name": "Software"
}
],
"category": "vendor",
"name": "VMT"
}
],
"category": "vendor",
"name": "Pepperl+Fuchs"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
],
"summary": "Affected products."
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"summary": "Fixed products."
}
],
"relationships": [
{
"category": "installed_with",
"full_product_name": {
"name": "CodeMeter Runtime \u003c6.81 installed with VMT Software MSS",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-51001",
"relates_to_product_reference": "CSAFPID-51006"
},
{
"category": "installed_with",
"full_product_name": {
"name": "CodeMeter Runtime \u003c6.90 installed with VMT Software MSS",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-51002",
"relates_to_product_reference": "CSAFPID-51006"
},
{
"category": "installed_with",
"full_product_name": {
"name": "CodeMeter Runtime \u003c7.10 installed with VMT Software MSS",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-51003",
"relates_to_product_reference": "CSAFPID-51006"
},
{
"category": "installed_with",
"full_product_name": {
"name": "CodeMeter Runtime \u003c7.10a installed with VMT Software MSS",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-51004",
"relates_to_product_reference": "CSAFPID-51006"
},
{
"category": "installed_with",
"full_product_name": {
"name": "CodeMeter Runtime vers:all/* installed with VMT Software MSS",
"product_id": "CSAFPID-31005"
},
"product_reference": "CSAFPID-51005",
"relates_to_product_reference": "CSAFPID-51006"
},
{
"category": "installed_with",
"full_product_name": {
"name": "CodeMeter Runtime \u003c6.81 installed with VMT Software IS",
"product_id": "CSAFPID-31006"
},
"product_reference": "CSAFPID-51001",
"relates_to_product_reference": "CSAFPID-51007"
},
{
"category": "installed_with",
"full_product_name": {
"name": "CodeMeter Runtime \u003c6.90 installed with VMT Software IS",
"product_id": "CSAFPID-31007"
},
"product_reference": "CSAFPID-51002",
"relates_to_product_reference": "CSAFPID-51007"
},
{
"category": "installed_with",
"full_product_name": {
"name": "CodeMeter Runtime \u003c7.10 installed with VMT Software IS",
"product_id": "CSAFPID-31008"
},
"product_reference": "CSAFPID-51003",
"relates_to_product_reference": "CSAFPID-51007"
},
{
"category": "installed_with",
"full_product_name": {
"name": "CodeMeter Runtime \u003c7.10a installed with VMT Software IS",
"product_id": "CSAFPID-31009"
},
"product_reference": "CSAFPID-51004",
"relates_to_product_reference": "CSAFPID-51007"
},
{
"category": "installed_with",
"full_product_name": {
"name": "CodeMeter Runtime vers:all/* installed with VMT Software IS",
"product_id": "CSAFPID-31010"
},
"product_reference": "CSAFPID-51005",
"relates_to_product_reference": "CSAFPID-51007"
},
{
"category": "installed_with",
"full_product_name": {
"name": "CodeMeter Runtime 6.81 installed with VMT Software MSS",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-52001",
"relates_to_product_reference": "CSAFPID-51006"
},
{
"category": "installed_with",
"full_product_name": {
"name": "CodeMeter Runtime 6.90 installed with VMT Software MSS",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-52002",
"relates_to_product_reference": "CSAFPID-51006"
},
{
"category": "installed_with",
"full_product_name": {
"name": "CodeMeter Runtime 7.10 installed with VMT Software MSS",
"product_id": "CSAFPID-32003"
},
"product_reference": "CSAFPID-52003",
"relates_to_product_reference": "CSAFPID-51006"
},
{
"category": "installed_with",
"full_product_name": {
"name": "CodeMeter Runtime 7.10a installed with VMT Software MSS",
"product_id": "CSAFPID-32004"
},
"product_reference": "CSAFPID-52004",
"relates_to_product_reference": "CSAFPID-51006"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-16233",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "description",
"text": "An attacker could send a specially crafted packet that could have CodeMeter (All versions prior to 7.10) send back packets containing data from the heap.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31003",
"CSAFPID-31008"
]
},
"remediations": [
{
"category": "mitigation",
"details": "In general and without any update, this product can be operated in a secure local network that has no connection to an untrusted network, like internet or global corporate IT-net.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "For VMT MSS\nUpdate to WIBU Systems CodeMeter Runtime 7.10 .\n\n\nFor VMT IS\nPlease contact VMT GmbH to receive support for the product update process.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31003",
"CSAFPID-31008"
]
}
],
"title": "CVE-2020-16233"
},
{
"cve": "CVE-2020-14509",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"notes": [
{
"category": "description",
"text": "Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to exploit these vulnerabilities.",
"title": "Vulnerability Description"
},
{
"category": "description",
"text": "\u003cp\u003eMultiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to exploit these vulnerabilities.\u003c/p\u003e",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31004",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "In general and without any update, this product can be operated in a secure local network that has no connection to an untrusted network, like internet or global corporate IT-net.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "For VMT MSS\nUpdate to WIBU Systems CodeMeter Runtime 7.10 .\n\n\nFor VMT IS\nPlease contact VMT GmbH to receive support for the product update process.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31004",
"CSAFPID-31009"
]
}
],
"title": "CVE-2020-14509"
},
{
"cve": "CVE-2020-14519",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"notes": [
{
"category": "description",
"text": "This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.",
"title": "Vulnerability Description"
},
{
"category": "description",
"text": "\u003cp\u003eThis vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.\u003c/p\u003e",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31004",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "In general and without any update, this product can be operated in a secure local network that has no connection to an untrusted network, like internet or global corporate IT-net.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "For VMT MSS\nUpdate to WIBU Systems CodeMeter Runtime 7.10 .\n\n\nFor VMT IS\nPlease contact VMT GmbH to receive support for the product update process.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31004",
"CSAFPID-31009"
]
}
],
"title": "CVE-2020-14519"
},
{
"cve": "CVE-2020-14513",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "description",
"text": "CodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.",
"title": "Vulnerability Description"
},
{
"category": "description",
"text": "\u003cp\u003eCodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.\u003c/p\u003e",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31006"
]
},
"remediations": [
{
"category": "mitigation",
"details": "In general and without any update, this product can be operated in a secure local network that has no connection to an untrusted network, like internet or global corporate IT-net.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "For VMT MSS\nUpdate to WIBU Systems CodeMeter Runtime 7.10 .\n\n\nFor VMT IS\nPlease contact VMT GmbH to receive support for the product update process.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31006"
]
}
],
"title": "CVE-2020-14513"
},
{
"cve": "CVE-2020-14517",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "description",
"text": "Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.",
"title": "Vulnerability Description"
},
{
"category": "description",
"text": "\u003cp\u003eProtocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.\u003c/p\u003e",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-31005",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "mitigation",
"details": "In general and without any update, this product can be operated in a secure local network that has no connection to an untrusted network, like internet or global corporate IT-net.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "For VMT MSS\nUpdate to WIBU Systems CodeMeter Runtime 7.10 .\n\n\nFor VMT IS\nPlease contact VMT GmbH to receive support for the product update process.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31005",
"CSAFPID-31010"
]
}
],
"title": "CVE-2020-14517"
},
{
"cve": "CVE-2020-14515",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "description",
"text": "CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Only CmActLicense update files with CmActLicense Firm Code are affected.",
"title": "Vulnerability Description"
},
{
"category": "description",
"text": "\u003cp\u003eCodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Only CmActLicense update files with CmActLicense Firm Code are affected.\u003c/p\u003e",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31002",
"CSAFPID-31007"
]
},
"remediations": [
{
"category": "mitigation",
"details": "In general and without any update, this product can be operated in a secure local network that has no connection to an untrusted network, like internet or global corporate IT-net.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "For VMT MSS\nUpdate to WIBU Systems CodeMeter Runtime 7.10 .\n\n\nFor VMT IS\nPlease contact VMT GmbH to receive support for the product update process.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31002",
"CSAFPID-31007"
]
}
],
"title": "CVE-2020-14515"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.