ID

VAR-202004-0081


CVE

CVE-2020-10625


TITLE

WebAccess/NMS Vulnerability regarding lack of authentication for critical features in

Trust: 0.8

sources: JVNDB: JVNDB-2020-003804

DESCRIPTION

WebAccess/NMS (versions prior to 3.0.2) allows an unauthenticated remote user to create a new admin account. WebAccess/NMS There is a vulnerability in the lack of authentication for critical features.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to bypass authentication on affected installations of Advantech WebAccess/NMS. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of calls to the usersInputAction.action endpoint. Authentication is missing for the critical function of creating new administrator accounts. An attacker can leverage this vulnerability to create new accounts, leading to further compromise. Advantech WebAccess/NMS is a set of Web browser-based Network Management System (NMS) software package developed by China Taiwan Advantech Corporation. There is an access control error vulnerability in Advantech WebAccess/NMS versions prior to 3.0.2

Trust: 2.34

sources: NVD: CVE-2020-10625 // JVNDB: JVNDB-2020-003804 // ZDI: ZDI-20-414 // VULHUB: VHN-163122

AFFECTED PRODUCTS

vendor:advantechmodel:webaccess\/nmsscope:ltversion:3.0.2

Trust: 1.0

vendor:advantechmodel:webaccess/nmsscope:eqversion:3.0.2

Trust: 0.8

vendor:advantechmodel:webaccess/nmsscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-20-414 // JVNDB: JVNDB-2020-003804 // NVD: CVE-2020-10625

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-10625
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-003804
value: CRITICAL

Trust: 0.8

ZDI: CVE-2020-10625
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202004-388
value: CRITICAL

Trust: 0.6

VULHUB: VHN-163122
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-10625
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-003804
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-163122
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-10625
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-003804
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2020-10625
baseSeverity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-414 // VULHUB: VHN-163122 // JVNDB: JVNDB-2020-003804 // CNNVD: CNNVD-202004-388 // NVD: CVE-2020-10625

PROBLEMTYPE DATA

problemtype:CWE-306

Trust: 1.9

sources: VULHUB: VHN-163122 // JVNDB: JVNDB-2020-003804 // NVD: CVE-2020-10625

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202004-388

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-202004-388

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-003804

PATCH

title:Top Pageurl:https://www.advantech.com/

Trust: 0.8

title:Advantech has issued an update to correct this vulnerability.url:https://www.us-cert.gov/ics/advisories/icsa-20-098-01

Trust: 0.7

title:Advantech WebAccess/NMS Fixes for access control error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=115607

Trust: 0.6

sources: ZDI: ZDI-20-414 // JVNDB: JVNDB-2020-003804 // CNNVD: CNNVD-202004-388

EXTERNAL IDS

db:NVDid:CVE-2020-10625

Trust: 3.2

db:ICS CERTid:ICSA-20-098-01

Trust: 2.5

db:ZDIid:ZDI-20-414

Trust: 1.3

db:JVNDBid:JVNDB-2020-003804

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-9769

Trust: 0.7

db:CNNVDid:CNNVD-202004-388

Trust: 0.7

db:NSFOCUSid:46346

Trust: 0.6

db:AUSCERTid:ESB-2020.1251

Trust: 0.6

db:CNVDid:CNVD-2020-22312

Trust: 0.1

db:VULHUBid:VHN-163122

Trust: 0.1

sources: ZDI: ZDI-20-414 // VULHUB: VHN-163122 // JVNDB: JVNDB-2020-003804 // CNNVD: CNNVD-202004-388 // NVD: CVE-2020-10625

REFERENCES

url:https://www.us-cert.gov/ics/advisories/icsa-20-098-01

Trust: 3.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-10625

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10625

Trust: 0.8

url:http://www.nsfocus.net/vulndb/46346

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1251/

Trust: 0.6

url:https://www.zerodayinitiative.com/advisories/zdi-20-414/

Trust: 0.6

sources: ZDI: ZDI-20-414 // VULHUB: VHN-163122 // JVNDB: JVNDB-2020-003804 // CNNVD: CNNVD-202004-388 // NVD: CVE-2020-10625

CREDITS

rgod

Trust: 0.7

sources: ZDI: ZDI-20-414

SOURCES

db:ZDIid:ZDI-20-414
db:VULHUBid:VHN-163122
db:JVNDBid:JVNDB-2020-003804
db:CNNVDid:CNNVD-202004-388
db:NVDid:CVE-2020-10625

LAST UPDATE DATE

2024-11-23T21:59:22.093000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-414date:2020-04-08T00:00:00
db:VULHUBid:VHN-163122date:2020-04-10T00:00:00
db:JVNDBid:JVNDB-2020-003804date:2020-04-24T00:00:00
db:CNNVDid:CNNVD-202004-388date:2020-04-14T00:00:00
db:NVDid:CVE-2020-10625date:2024-11-21T04:55:43.403

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-414date:2020-04-08T00:00:00
db:VULHUBid:VHN-163122date:2020-04-09T00:00:00
db:JVNDBid:JVNDB-2020-003804date:2020-04-24T00:00:00
db:CNNVDid:CNNVD-202004-388date:2020-04-07T00:00:00
db:NVDid:CVE-2020-10625date:2020-04-09T14:15:12.683