Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity High
Privileges Required High
Scope Unchanged
Confidentiality Impact Low
Integrity Impact High
Availability Impact High
User Interaction Required
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
This CVE is not in the KEV list.
The EPSS score is 0.00087.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Arubanetworks
Subscribe
|
Nx-1000
Subscribe
Nx-10k
Subscribe
Nx-11k
Subscribe
Nx-2000
Subscribe
Nx-3000
Subscribe
Nx-5000
Subscribe
Nx-6000
Subscribe
Nx-700
Subscribe
Nx-7000
Subscribe
Nx-8000
Subscribe
Nx-9000
Subscribe
Vx-1000
Subscribe
Vx-2000
Subscribe
Vx-3000
Subscribe
Vx-500
Subscribe
Vx-5000
Subscribe
Vx-6000
Subscribe
Vx-7000
Subscribe
Vx-8000
Subscribe
Vx-9000
Subscribe
|
|
Silver-peak
Subscribe
|
Nx-1000 Firmware
Subscribe
Nx-10k Firmware
Subscribe
Nx-11k Firmware
Subscribe
Nx-2000 Firmware
Subscribe
Nx-3000 Firmware
Subscribe
Nx-5000 Firmware
Subscribe
Nx-6000 Firmware
Subscribe
Nx-7000 Firmware
Subscribe
Nx-700 Firmware
Subscribe
Nx-8000 Firmware
Subscribe
Nx-9000 Firmware
Subscribe
Unity Edgeconnect For Amazon Web Services
Subscribe
Unity Edgeconnect For Azure
Subscribe
Unity Edgeconnect For Google Cloud Platform
Subscribe
Unity Orchestrator
Subscribe
Vx-1000 Firmware
Subscribe
Vx-2000 Firmware
Subscribe
Vx-3000 Firmware
Subscribe
Vx-5000 Firmware
Subscribe
Vx-500 Firmware
Subscribe
Vx-6000 Firmware
Subscribe
Vx-7000 Firmware
Subscribe
Vx-8000 Firmware
Subscribe
Vx-9000 Firmware
Subscribe
|
Configuration 1 [-]
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-4458 | The certificate used to identify Orchestrator to EdgeConnect devices is not validated, which makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted Orchestrator. |
Solution
Any required configuration • Do not change Orchestrator’s IP address as discovered by the EdgeConnect appliance. • Upgrade to Silver Peak Unity ECOS™ 8.3.2+ or 8.1.9.12+ and Silver Peak Unity Orchestrator™ 8.9.2+. • In Orchestrator, enable the “Verify Orchestrator Certificate” option under Advanced Security Settings. Solution link - References The full details of the CVE can be found at https://www.silver-peak.com/sites/default/files/advisory/security_advisory_notice_rogue_orchestrator_cve_2020_12143.pdf
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Silver Peak
Published:
Updated: 2024-08-04T11:48:58.488Z
Reserved: 2020-04-24T00:00:00
Link: CVE-2020-12143
No data.
Status : Modified
Published: 2020-05-05T20:15:12.137
Modified: 2024-11-21T04:59:20.960
Link: CVE-2020-12143
No data.
OpenCVE Enrichment
No data.
EUVD