Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:gurux:device_language_message_specification_director:*:*:*:*:*:*:*:*", "matchCriteriaId": "07D9B2FA-2B52-40C6-9FDE-321F932B18EC", "versionEndExcluding": "8.5.1905.1301", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Gurux GXDLMS Director prior to 8.5.1905.1301 downloads updates to add-ins and OBIS code over an unencrypted HTTP connection. A man-in-the-middle attacker can prompt the user to download updates by modifying the contents of gurux.fi/obis/files.xml and gurux.fi/updates/updates.xml. Then, the attacker can modify the contents of downloaded files. In the case of add-ins (if the user is using those), this will lead to code execution. In case of OBIS codes (which the user is always using as they are needed to communicate with the energy meters), this can lead to code execution when combined with CVE-2020-8810."}, {"lang": "es", "value": "Gurux GXDLMS Director versiones anteriores a 8.5.1905.1301, descarga actualizaciones para add-ins y c\u00f3digo OBIS por medio de una conexi\u00f3n HTTP sin cifrar. Un atacante de tipo man-in-the-middle puede solicitar al usuario que descargue actualizaciones modificando el contenido de los archivos gurux.fi/obis/files.xml y gurux.fi/updates/updates.xml. Luego, el atacante puede modificar el contenido de los archivos descargados. En el caso de add-ins (si el usuario los est\u00e1 utilizando), esto conllevar\u00e1 a una ejecuci\u00f3n de c\u00f3digo. En el caso de los c\u00f3digos OBIS (que el usuario siempre usa, ya que son necesarios para comunicarse con los medidores de energ\u00eda), esto puede conllevar a una ejecuci\u00f3n de c\u00f3digo cuando se combina con CVE-2020-8810."}], "id": "CVE-2020-8809", "lastModified": "2024-11-21T05:39:28.903", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-02-25T19:15:11.817", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/seqred-s-a/gxdlmsdirector-cve"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://seqred.pl/en/cve-gurux-gxdlms-director/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/seqred-s-a/gxdlmsdirector-cve"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://seqred.pl/en/cve-gurux-gxdlms-director/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-494"}], "source": "nvd@nist.gov", "type": "Primary"}]}