Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2020-13712", "assignerOrgId": "747bec18-acd0-4d99-a5c8-5e366c66ab7e", "state": "PUBLISHED", "assignerShortName": "SWI", "dateReserved": "2020-06-01T00:00:00.000Z", "datePublished": "2024-12-20T21:37:35.021Z", "dateUpdated": "2024-12-26T19:29:55.387Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "platforms": ["oMG2000"], "product": "MGOS", "vendor": "Sierra Wireless", "versions": [{"status": "affected", "version": "all versions before 3.15.1", "versionType": "Custom"}]}, {"defaultStatus": "unaffected", "platforms": ["MG90"], "product": "MGOS", "vendor": "Sierra Wireless", "versions": [{"status": "affected", "version": "all versions before 4.2.1", "versionType": "Custom"}]}], "datePublic": "2020-11-19T21:36:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>\n\nA command injection is possible through the user interface, allowing arbitrary command execution as \nthe root user. oMG2000 running MGOS 3.15.1 or earlier is affected. \n\nMG90 running MGOS 4.2.1 or earlier is affected.</p>"}], "value": "A command injection is possible through the user interface, allowing arbitrary command execution as \nthe root user. oMG2000 running MGOS 3.15.1 or earlier is affected.\u00a0\n\nMG90 running MGOS 4.2.1 or earlier is affected."}], "impacts": [{"descriptions": [{"lang": "en", "value": "Command Injection"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "747bec18-acd0-4d99-a5c8-5e366c66ab7e", "shortName": "SWI", "dateUpdated": "2024-12-20T21:37:35.021Z"}, "references": [{"url": "https://source.sierrawireless.com/-/media/support_downloads/security-bulletins/pdf/swi-psa-2020-006---mgos-security-update.ashx"}], "source": {"discovery": "UNKNOWN"}, "title": "MGOS Command Injection", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-77", "lang": "en", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"}]}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2024-12-26T19:28:59.870255Z", "id": "CVE-2020-13712", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-12-26T19:29:55.387Z"}}]}}