{"id": "CVE-2020-5571", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2020-04-23T08:15:12.067", "references": [{"url": "https://jvn.jp/en/jp/JVN93064451/index.html", "tags": ["Third Party Advisory"], "source": "vultures@jpcert.or.jp"}, {"url": "https://k-tai.sharp.co.jp/support/info/info036.html", "tags": ["Third Party Advisory"], "source": "vultures@jpcert.or.jp"}, {"url": "https://jvn.jp/en/jp/JVN93064451/index.html", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://k-tai.sharp.co.jp/support/info/info036.html", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-200"}]}], "descriptions": [{"lang": "en", "value": "SHARP AQUOS series (AQUOS SH-M02 build number 01.00.05 and earlier, AQUOS SH-RM02 build number 01.00.04 and earlier, AQUOS mini SH-M03 build number 01.00.04 and earlier, AQUOS Keitai SH-N01 build number 01.00.01 and earlier, AQUOS L2 (UQ mobile/J:COM) build number 01.00.05 and earlier, AQUOS sense lite SH-M05 build number 03.00.04 and earlier, AQUOS sense (UQ mobile) build number 03.00.03 and earlier, AQUOS compact SH-M06 build number 02.00.02 and earlier, AQUOS sense plus SH-M07 build number 02.00.02 and earlier, AQUOS sense2 SH-M08 build number 02.00.05 and earlier, and AQUOS sense2 (UQ mobile) build number 02.00.06 and earlier) allow an attacker to obtain the sensitive information of the device via malicious applications installed on the device."}, {"lang": "es", "value": "La serie SHARP AQUOS (AQUOS SH-M02 AQUOS SH-M02 n\u00famero de compilaci\u00f3n 01.00.05 y anteriores, AQUOS SH-RM02 n\u00famero de compilaci\u00f3n 01.00.04 y anteriores, AQUOS mini SH-M03 n\u00famero de compilaci\u00f3n 01.00.04 y anteriores, AQUOS Keitai n\u00famero de compilaci\u00f3n SH-N01 01.00. 01 y anteriores, AQUOS L2 (UQ mobile/J:COM) n\u00famero de compilaci\u00f3n 01.00.05 y anteriores, AQUOS sense lite SH-M05 n\u00famero de compilaci\u00f3n 03.00.04 y anteriores, AQUOS sense (UQ mobile) n\u00famero de compilaci\u00f3n 03.00.03 y anteriores, AQUOS compact SH-M06 n\u00famero de compilaci\u00f3n 02.00.02 y anteriores, AQUOS sense plus SH-M07 n\u00famero de compilaci\u00f3n 02.00.02 y anteriores, AQUOS sense2 SH-M08 n\u00famero de compilaci\u00f3n 02.00.05 y anteriores, y AQUOS sense2 (UQ mobile) n\u00famero de compilaci\u00f3n 02.00 .06 y anteriores), permiten a un atacante obtener informaci\u00f3n confidencial del dispositivo por medio de aplicaciones maliciosas instaladas en el dispositivo."}], "lastModified": "2024-11-21T05:34:17.607", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sharp:aquos_sh-m02_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FD59544-20A6-48D8-AE3E-07E4E2DB1B8E", "versionEndIncluding": "01.00.05"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sharp:aquos_sh-m02:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1E89B46A-AED5-485F-A421-27A1F6858AE2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sharp:aquos_sh-rm02_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D494A126-5A45-43F0-8B91-9C485E4140B7", "versionEndIncluding": "01.00.04"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sharp:aquos_sh-rm02:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1D692574-174F-45B9-B9DC-2B648B46A20F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sharp:aquos_mini_sh-m03_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12BF766E-4616-4D6C-B0C0-B5091CB29C77", "versionEndIncluding": "01.00.04"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sharp:aquos_mini_sh-m03:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ED345507-6D48-4834-B3E4-0FC334743C60"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sharp:aquos_mini_sh-m03_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "938A6C88-A808-45A0-850B-BE3D92B86647", "versionEndIncluding": "01.00.01"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sharp:aquos_mini_sh-m03:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ED345507-6D48-4834-B3E4-0FC334743C60"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sharp:aquos_l2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0CCB54C-25EC-49AC-84F2-59B99E85557A", "versionEndIncluding": "01.00.05"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sharp:aquos_l2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "876398B9-E348-46BF-9BA5-7E5EF8EC3E71"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sharp:aquos_sense_lite_sh-m05_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FEECD7B-7D92-4065-A03F-568FF98F078A", "versionEndIncluding": "03.00.04"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sharp:aquos_sense_lite_sh-m05:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E2E9A50C-C4EF-4164-80E5-3145E762DB4F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sharp:aquos_sense_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2422A18E-EE73-4671-99AD-4DB32B06B107", "versionEndIncluding": "03.00.03"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sharp:aquos_sense:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "89A05AEE-D061-403B-9940-E8C715AA610F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sharp:aquos_compact_sh-m06_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CB139D3-98EB-4EBA-99D5-3B07E1BA5E36", "versionEndIncluding": "02.00.02"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sharp:aquos_compact_sh-m06:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "22B966CF-90A4-4332-817F-9C71DC414FEE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sharp:aquos_sense_plus_sh-m07_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2AEE981C-D7BC-446B-9847-61C1C3DE3E54", "versionEndIncluding": "0.2.00.02"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sharp:aquos_sense_plus_sh-m07:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D9BE91BA-6C58-42AC-A7F1-EA6E06B35C2F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sharp:aquos_sense2_sh-m08_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1D50AB6-954E-4E61-953F-C5C0B1571EA1", "versionEndIncluding": "02.00.05"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sharp:aquos_sense2_sh-m08:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3D666BE3-6407-421A-B10A-4D336D069C3E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sharp:aquos_sense2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0D366A8-6304-4564-A804-B367E0AF9B29", "versionEndIncluding": "02.00.06"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sharp:aquos_sense2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E2C7613D-2BAB-44E1-8F7F-14223425AFAC"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "vultures@jpcert.or.jp"}