Show plain JSON{"id": "CVE-2020-8009", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2020-01-27T14:15:11.217", "references": [{"url": "https://www.securenetworkinc.com/news/2020/1/22/new-vulnerability-motu-avb-directory-traversal", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.securenetworkinc.com/news/2020/1/22/new-vulnerability-motu-avb-directory-traversal", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "AVB MOTU devices through 2020-01-22 allow /.. Directory Traversal, as demonstrated by reading the /etc/passwd file."}, {"lang": "es", "value": "Los dispositivos AVB MOTU hasta el 22-01-2020, permiten Salto de Directorio /.., como es demostrado mediante la lectura del archivo /etc/passwd."}], "lastModified": "2024-11-21T05:38:12.537", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:motu:avb_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FA0D687-AE7A-433E-BDF8-C4C4F6AE8326", "versionEndIncluding": "2020-01-22"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:motu:112d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "43005D10-0110-4DA7-A59F-9549CBFE1AC1"}, {"criteria": "cpe:2.3:h:motu:1248:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "34734A03-6A0A-45B6-88F6-2D70ADF198E9"}, {"criteria": "cpe:2.3:h:motu:16a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9DE36888-96C5-4B76-8EA9-CCEC6EB8A4DD"}, {"criteria": "cpe:2.3:h:motu:24ai:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "24CF212D-089C-41A9-9E62-7597F3EEB50E"}, {"criteria": "cpe:2.3:h:motu:24ao:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7B1E7F8F-4F68-469D-BD66-DE07B47D5B7A"}, {"criteria": "cpe:2.3:h:motu:624:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AADFCC4C-29CF-4755-901A-7C6D2F47BC3C"}, {"criteria": "cpe:2.3:h:motu:828es:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "32ABE074-2629-40F9-9AEC-CD56CBD27C52"}, {"criteria": "cpe:2.3:h:motu:828x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "60D5251B-1589-47B1-8CF1-16077A7F3E32"}, {"criteria": "cpe:2.3:h:motu:8a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8F10102D-FA5A-46C7-9159-8711E60E401C"}, {"criteria": "cpe:2.3:h:motu:8d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9698D651-9695-429B-A682-286CFD635620"}, {"criteria": "cpe:2.3:h:motu:8m:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1509F8C5-46FB-4EB0-9F12-BDC5C8D45FF6"}, {"criteria": "cpe:2.3:h:motu:8pre-es:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BCAF560F-0E82-4712-B41E-8E2CA55991C3"}, {"criteria": "cpe:2.3:h:motu:avb:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7988DA87-F513-41DF-8A7D-0AED219C1629"}, {"criteria": "cpe:2.3:h:motu:lp32:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EF8CE98A-BF2D-4406-A000-4342F3532CB8"}, {"criteria": "cpe:2.3:h:motu:m64:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "753D5656-9F8D-488F-A198-EE148B50C366"}, {"criteria": "cpe:2.3:h:motu:monitor_8:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "32B8A1F3-09E8-4DBB-965D-D03F9EC41F9B"}, {"criteria": "cpe:2.3:h:motu:moto_avb_switch:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5782F020-89F3-4850-9200-7E2B95FCBA3A"}, {"criteria": "cpe:2.3:h:motu:stage-b16:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6B6E2EF0-642B-43DA-A3DD-9C45200EBC7B"}, {"criteria": "cpe:2.3:h:motu:ultralite-mk4:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "716575DA-D9A1-469C-B080-EC48674B2634"}, {"criteria": "cpe:2.3:h:motu:ultralite_avb:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "607DB0BD-A447-48ED-A1D5-1EB6399116CC"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}