{"id": "CVE-2020-26122", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.2}]}, "published": "2020-12-07T16:15:12.027", "references": [{"url": "https://en.inspur.com/en/2487134/index.html", "tags": ["Broken Link"], "source": "cve@mitre.org"}, {"url": "https://en.inspur.com/en/security_bulletins/security_advisory2/2543921/index.html", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://en.inspur.com/en/2487134/index.html", "tags": ["Broken Link"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://en.inspur.com/en/security_bulletins/security_advisory2/2543921/index.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-347"}]}], "descriptions": [{"lang": "en", "value": "Inspur NF5266M5 through 3.21.2 and other server M5 devices allow remote code execution via administrator privileges. The Baseboard Management Controller (BMC) program of INSPUR server is weak in checking the firmware and lacks the signature verification mechanism, the attacker who obtains the administrator's rights can control the BMC by inserting malicious code into the firmware program and bypassing the current verification mechanism to upgrade the BMC."}, {"lang": "es", "value": "Inspur NF5266M5 versiones hasta 3.21.2 y otros dispositivos de servidor M5 permiten una ejecuci\u00f3n de c\u00f3digo remota por medio de privilegios de administrador. El programa Baseboard Management Controller (BMC) del servidor INSPUR es d\u00e9bil para verificar el firmware y carece del mecanismo de verificaci\u00f3n de firma, el atacante que obtiene los derechos de administrador puede controlar el BMC insertando c\u00f3digo malicioso en el programa de firmware y omitiendo el mecanismo de verificaci\u00f3n actual para actualice el BMC"}], "lastModified": "2024-11-21T05:19:17.680", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:nf8480m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9650F53-006D-4EE9-BA0A-D93776B1A4AC", "versionEndExcluding": "1.19.34"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:nf8480m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "10C2BCF8-8F5B-4BF3-9C2B-E4754EF8159E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:nf8260m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7428E4F-2CE1-42BA-8BF7-EC283B3562A1", "versionEndExcluding": "1.19.34"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:nf8260m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2AFE0790-2E84-4511-BFE5-30D0ABEA458C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:ns5162m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "815631E9-372B-4766-9FA7-3785D3C70AF5", "versionEndExcluding": "4.5.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:ns5162m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FE0B2202-4CAD-4621-8A52-1279AB5EAC29"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:ns5488m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2DBC040-08D8-4187-B6ED-B4492EB1279A", "versionEndExcluding": "1.19.33"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:ns5488m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E9E1320B-CB0F-4707-B252-A6E15E33E4C0"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:ns5484m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99D45F80-9E05-4AB8-B423-B851B3D4E9D5", "versionEndExcluding": "1.19.33"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:ns5484m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9720CEBE-A43F-4D50-B145-5F1A7DAECB3C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:ns5482m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1FC58F8-D3C9-40D3-8CFB-D76657D3CCB0", "versionEndExcluding": "1.19.33"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:ns5482m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8FB20EFF-9972-448D-8ACC-CB10219319ED"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:nf5280m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19E1EB2D-8301-4456-94C8-863DEEA234FA", "versionEndExcluding": "4.26.6"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:nf5280m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CF8BB878-D6CF-45FB-A560-A907E67E8E8C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:nf5468m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C34E0918-C606-4AFE-8FBB-AA5A4FFB93C0", "versionEndExcluding": "1.18.51"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:nf5468m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "08972D02-33F2-4213-823E-28EAB7F64A3A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:nf5488m5-d_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52C539B7-DD3C-4E3D-8714-678F71F7EBC7", "versionEndExcluding": "1.18.51"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:nf5488m5-d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "85EB5589-5463-44C4-83EF-CDE1BC7212CC"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:nf5180m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B6B0264-0FD1-47A5-9D93-614D9DE96D30", "versionEndExcluding": "4.18.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:nf5180m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "37250D88-DA60-446A-8069-4CA516819562"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:nf5270m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D7442D4-C143-4A85-B6A3-FA8B11D2812B", "versionEndExcluding": "4.9.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:nf5270m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B57F39BE-DA11-470B-93C8-FAA3F502BB0D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:nf5260m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BD40F0E-F8FA-454D-8D6C-A8ACF8B4E6BB", "versionEndExcluding": "3.8.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:nf5260m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8709006C-158D-4F4B-B639-641D1474B8A6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:nf5266m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F60D601-3010-45B2-8309-BDE6CE13D3A6", "versionEndExcluding": "3.21.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:nf5266m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4AA47068-4A0E-4AE5-8467-8B065761DD1B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:nf5466m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "660B06C6-B394-4E8D-AB2B-83F4E7BB6AB5", "versionEndExcluding": "4.28.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:nf5466m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4E1A0BF8-F53B-42F2-BF39-685A8209E562"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:inspur:nf5486m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7ED30E42-FD71-47E3-B78D-4731731456D9", "versionEndExcluding": "3.22.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:inspur:nf5486m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C05E9DB7-8617-4679-B264-322FFDCAF4D9"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}