An issue was discovered on Swisscom Internet Box 2, Internet Box Standard, Internet Box Plus prior to 10.04.38, Internet Box 3 prior to 11.01.20, and Internet Box light prior to 08.06.06. Given the (user-configurable) credentials for the local Web interface or physical access to a device's plus or reset button, an attacker can create a user with elevated privileges on the Sysbus-API. This can then be used to modify local or remote SSH access, thus allowing a login session as the superuser.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.swisscom.ch | Vendor Advisory | 
| https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2020-16134.txt | Vendor Advisory | 
| https://www.swisscom.ch | Vendor Advisory | 
| https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2020-16134.txt | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
Configuration 3 (hide)
| AND | 
 
 | 
Configuration 4 (hide)
| AND | 
 
 | 
Configuration 5 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 05:06
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.swisscom.ch - Vendor Advisory | |
| References | () https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2020-16134.txt - Vendor Advisory | 
28 Jun 2021, 13:16
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:h:swisscom:internet_box_plus:-:*:*:*:*:*:*:* cpe:2.3:h:swisscom:internet_box_2:-:*:*:*:*:*:*:* cpe:2.3:o:swisscom:internet_box_2_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:swisscom:internet_box_3_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:swisscom:internet_box_standard_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:swisscom:internet_box_standard:-:*:*:*:*:*:*:* cpe:2.3:h:swisscom:internet_box_3:-:*:*:*:*:*:*:* cpe:2.3:o:swisscom:internet_box_light_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:swisscom:internet_box_plus_firmware:*:*:*:*:*:*:*:* | cpe:2.3:h:swisscom:internet-box_plus:-:*:*:*:*:*:*:* cpe:2.3:o:swisscom:internet-box_3_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:swisscom:internet-box_2_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:swisscom:internet-box_light:-:*:*:*:*:*:*:* cpe:2.3:o:swisscom:internet-box_standard_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:swisscom:internet-box_standard:-:*:*:*:*:*:*:* cpe:2.3:o:swisscom:internet-box_light_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:swisscom:internet-box_2:-:*:*:*:*:*:*:* cpe:2.3:h:swisscom:internet-box_3:-:*:*:*:*:*:*:* cpe:2.3:o:swisscom:internet-box_plus_firmware:*:*:*:*:*:*:*:* | 
Information
                Published : 2020-08-04 19:15
Updated : 2024-11-21 05:06
NVD link : CVE-2020-16134
Mitre link : CVE-2020-16134
CVE.ORG link : CVE-2020-16134
JSON object : View
Products Affected
                swisscom
- internet-box_3_firmware
- internet-box_light
- internet-box_2
- internet-box_plus
- internet-box_2_firmware
- internet-box_plus_firmware
- internet-box_light_firmware
- internet-box_3
- internet-box_standard_firmware
- internet-box_standard
CWE
                