2021-01-02 04:56:15 +00:00
id : CVE-2020-9047
2020-10-01 06:36:19 +00:00
info :
2022-06-27 18:18:09 +00:00
name : exacqVision Web Service - Remote Code Execution
2020-10-01 06:36:19 +00:00
author : dwisiswant0
severity : high
description : |
2022-06-27 18:39:48 +00:00
exacqVision Web Service is susceptible to remote code execution which could allow the execution of unauthorized code or operating system commands on systems running exacqVision Web Service versions 20.06.3.0 and prior and exacqVision Enterprise Manager versions 20.06.4.0 and prior. An attacker with administrative privileges could potentiallydownload and run a malicious executable that could allow OS command injection on the system.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
2023-09-06 12:22:36 +00:00
remediation : |
Apply the latest security patch or update provided by the vendor to fix the vulnerability.
2021-08-18 11:37:49 +00:00
reference :
2020-10-01 06:36:19 +00:00
- https://github.com/norrismw/CVE-2020-9047
2021-03-22 08:54:22 +00:00
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
- https://www.us-cert.gov/ics/advisories/ICSA-20-170-01
2022-06-27 18:18:09 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-9047
2024-01-29 17:11:14 +00:00
- https://github.com/hectorgie/PoC-in-GitHub
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 7.2
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-9047
cwe-id : CWE-347
2024-01-14 13:49:27 +00:00
epss-score : 0.00782
2024-01-29 17:11:14 +00:00
epss-percentile : 0.79503
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:a:johnsoncontrols:exacqvision_enterprise_manager:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : johnsoncontrols
product : exacqvision_enterprise_manager
2023-12-05 09:50:33 +00:00
tags : cve,cve2020,rce,exacqvision,johnsoncontrols
2020-10-01 06:36:19 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-10-01 06:36:19 +00:00
- method : GET
path :
- "{{BaseURL}}/version.web"
2022-06-28 03:08:22 +00:00
2020-10-01 06:36:19 +00:00
matchers-condition : and
matchers :
- type : word
2022-06-28 03:08:22 +00:00
part : body
2020-10-01 06:36:19 +00:00
words :
- "3.10.4.72058"
- "3.12.4.76544"
- "3.8.2.67295"
- "7.0.2.81005"
- "7.2.7.86974"
- "7.4.3.89785"
- "7.6.4.94391"
- "7.8.2.97826"
- "8.0.6.105408"
- "8.2.2.107285"
- "8.4.3.111614"
- "8.6.3.116175"
- "8.8.1.118913"
- "9.0.3.124620"
- "9.2.0.127940"
- "9.4.3.137684"
- "9.6.7.145949"
- "9.8.4.149166"
- "19.03.3.152166"
- "19.06.4.157118"
- "19.09.4.0"
- "19.12.2.0"
- "20.03.2.0"
- "20.06.3.0"
condition : or
2022-06-28 03:08:22 +00:00
2020-10-01 06:36:19 +00:00
- type : status
status :
- 200
2024-01-30 06:46:18 +00:00
# digest: 490a00463044022017f84551d51d9fd1aab567ff447355fcc747340b585a60d5f516e3ba7164387a022012cd0c84d6f350598fc6f6810628c9c6e0d7805365722cbd1e9203e04a938791:922c64590222798bb761d5b6d8e72950