Overview
- Description
- The server-request receiver function of Shockwall system has an improper authentication vulnerability. An authenticated attacker of an agent computer within the local area network can use the local registry information to launch server-side request forgery (SSRF) attack on another agent computer, resulting in arbitrary code execution for controlling the system or disrupting service.
- Source
- twcert@cert.org.tw
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9
- Impact score
- 6
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.7
- Impact score
- 10
- Exploitability score
- 5.1
- Vector string
- AV:A/AC:L/Au:S/C:C/I:C/A:C
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sun_moon_jingyao:network_computer_terminal_protection_system_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4C5A07A-4EC0-4C55-AA34-8456B6390AEC", "versionEndExcluding": "7.20.0401" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:sun_moon_jingyao:network_computer_terminal_protection_system:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B270A307-73C6-4189-B8E9-001D6B317BDD" } ], "operator": "OR" } ], "operator": "AND" } ]