{"id": "CVE-2020-22253", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2022-04-06T23:15:08.830", "references": [{"url": "http://www.xiongmaitech.com/en/index.php/news/info/12/68", "tags": ["Mitigation", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.xiongmaitech.com/en/index.php/news/info/12/68", "tags": ["Mitigation", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "Xiongmai Technology Co devices AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, and HI3518E_50H10L_S39 were all discovered to have port 9530 open which allows unauthenticated attackers to make arbitrary Telnet connections with the victim device."}, {"lang": "es", "value": "Los dispositivos de Xiongmai Technology Co AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS y HI3518E_50H10L_S39, presentan el puerto 9530 abierto, lo que permite a atacantes no autenticados realizar conexiones Telnet arbitrarias con el dispositivo v\u00edctima"}], "lastModified": "2024-11-21T05:13:13.093", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:xiongmaitech:ahb7008t-mh-v2_firmware:4.02.r11.7601.nat.onvifc.20170420:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2337743-6515-4D1E-8B6B-0259E080BE3D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:xiongmaitech:ahb7008t-mh-v2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BBF088E7-3524-457F-8EEA-701D47E8B74D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:xiongmaitech:ahb7804r-els_firmware:4.02.r11.nat.onvifc.20160422:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B86CFDB2-430D-4922-B9E3-789D9A99BF7D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:xiongmaitech:ahb7804r-els:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B8585D82-151C-4D41-BC74-505607025BA5"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:xiongmaitech:ahb7804r-mh-v2_firmware:4.02.r11.7601.nat.onvifc.20170424:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21E69506-0B0F-4516-952C-B5341828CC9E"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:xiongmaitech:ahb7804r-mh-v2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "53BDF5A2-9D42-4431-8909-3C55338C3C41"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:xiongmaitech:ahb7808r-ms-v2_firmware:4.02.r11.nat.onvifc.20170327:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83377CE0-7AF5-40E8-9F36-187580F57FD2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:xiongmaitech:ahb7808r-ms-v2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A582697F-4F26-4A48-8501-794133B9566F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:xiongmaitech:ahb7808r-ms_firmware:4.02.r11.nat.onvifc.20170328:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2682CEE3-77F0-4933-ABD4-8BA52FDB3C4E"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:xiongmaitech:ahb7808r-ms:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4CD6C0E4-F203-4DCA-ABFA-7045B642F311"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:xiongmaitech:ahb7808t-ms-v2_firmware:4.02.r11.nat.onvifc.20161205:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE549C20-763C-4332-BC2F-537290EE87F9"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:xiongmaitech:ahb7808t-ms-v2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4E344CEF-B455-4851-BC2C-708C5A70FC9B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:xiongmaitech:ahb7804r-lms_firmware:4.02.r11.nat.onvifc.20170301:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38952070-2328-437D-8CDA-24151D101FE7"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:xiongmaitech:ahb7804r-lms:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1064493C-BE25-4A62-BBCC-F1C4F9B1E712"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:xiongmaitech:hi3518e_50h10l_s39_firmware:4.02.r12.nat.onvifs.20170727_all:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE275C8A-C82B-48D1-88D2-81804F072139"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:xiongmaitech:hi3518e_50h10l_s39:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "322E389F-ED78-4F6C-AA50-DAF9CE257484"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}