Overview
- Description
- A vulnerability in specified versions of American Dynamics victor Web Client and Software House C•CURE Web Client could allow an unauthenticated attacker on the network to create and sign their own JSON Web Token and use it to execute an HTTP API Method without the need for valid authentication/authorization. Under certain circumstances, this could be used by an attacker to impact system availability by conducting a Denial of Service attack.
- Source
- productsecurity@jci.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.3
- Impact score
- 3.6
- Exploitability score
- 1.6
- Vector string
- CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5.7
- Impact score
- 6.9
- Exploitability score
- 5.5
- Vector string
- AV:A/AC:M/Au:N/C:N/I:N/A:C
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:johnsoncontrols:c-cure_web:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C1E9FAF-B52D-4ABE-8457-7CA79C0C5DBC", "versionEndIncluding": "2.90" }, { "criteria": "cpe:2.3:a:johnsoncontrols:victor_web:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E225100B-FAF2-403E-8443-D055A1BFBD23", "versionEndIncluding": "5.6" } ], "operator": "OR" } ] } ]