A vulnerability in specified versions of American Dynamics victor Web Client and Software House C•CURE Web Client could allow an unauthenticated attacker on the network to create and sign their own JSON Web Token and use it to execute an HTTP API Method without the need for valid authentication/authorization. Under certain circumstances, this could be used by an attacker to impact system availability by conducting a Denial of Service attack.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-324-01 | Patch Third Party Advisory US Government Resource |
https://us-cert.cisa.gov/ics/advisories/icsa-20-324-01 | Patch Third Party Advisory US Government Resource |
https://www.johnsoncontrols.com/cyber-solutions/security-advisories | Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-20-324-01 | Patch Third Party Advisory US Government Resource |
https://us-cert.cisa.gov/ics/advisories/icsa-20-324-01 | Patch Third Party Advisory US Government Resource |
https://www.johnsoncontrols.com/cyber-solutions/security-advisories | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.7
v3 : 7.1 |
References | () https://us-cert.cisa.gov/ics/advisories/icsa-20-324-01 - Patch, Third Party Advisory, US Government Resource | |
References | () https://www.johnsoncontrols.com/cyber-solutions/security-advisories - Vendor Advisory |
Information
Published : 2020-11-19 16:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-9049
Mitre link : CVE-2020-9049
CVE.ORG link : CVE-2020-9049
JSON object : View
Products Affected
johnsoncontrols
- c-cure_web
- victor_web