Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:emc:scaleio:2.0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "73E578EC-E7F8-4E4E-98ED-AD1F000DF8B3", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:scaleio:2.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C514B774-4EC0-42EE-8421-970C85CF398C", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:scaleio:2.0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "70C41DD1-C7DE-4BC3-8184-DC1DFDCFEE2E", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:scaleio:2.0.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B1B7D777-73FB-427C-8D0F-E1D81A55D015", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in EMC ScaleIO 2.0.1.x. A buffer overflow vulnerability in the SDBG service may potentially allow a remote unauthenticated attacker to execute arbitrary commands with root privileges on an affected server."}, {"lang": "es", "value": "Se ha descubierto un problema en EMC ScaleIO 2.0.1.x. Una vulnerabilidad en el servicio SDBG podr\u00eda permitir que un atacante remoto no autenticado ejecute comandos arbitrarios con privilegios root en un servidor afectado."}], "id": "CVE-2017-8020", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-11-28T07:29:00.413", "references": [{"source": "security_alert@emc.com", "tags": ["Mailing List", "Third Party Advisory"], "url": "http://seclists.org/fulldisclosure/2017/Nov/35"}, {"source": "security_alert@emc.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/101995"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mailing List", "Third Party Advisory"], "url": "http://seclists.org/fulldisclosure/2017/Nov/35"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/101995"}], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}