Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:enttec:datagate_mk2_firmware:70044:05032019-482:*:*:*:*:*:*", "matchCriteriaId": "5B9A37C2-12DA-4B4F-ADA2-0AF9B8DB6AF7", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:enttec:datagate_mk2:-:*:*:*:*:*:*:*", "matchCriteriaId": "253A65CA-28AE-489B-B187-9C75E3D3E7EA", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:enttec:storm_24_firmware:70044:05032019-482:*:*:*:*:*:*", "matchCriteriaId": "CDAA74C7-1191-4E53-B4CB-24677F741044", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:enttec:storm_24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7068E69-8504-451B-B413-8B681AE41878", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:enttec:pixelator_firmware:70044:05032019-482:*:*:*:*:*:*", "matchCriteriaId": "00EBFAEB-AE67-4DBB-A427-CBCFAC24F8BF", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:enttec:pixelator:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0C61125-DEE1-4ED3-ACC7-B0E9A0F0D993", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:enttec:e-streamer_mk2_firmware:70044:05032019-482:*:*:*:*:*:*", "matchCriteriaId": "1AF62A27-2CD4-4E26-90C0-CBE5806FB568", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:enttec:e-streamer_mk2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F01D05A7-1D5B-4D27-AF4F-99A5B772D8B8", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "An issue was discovered on the ENTTEC Datagate MK2, Storm 24, Pixelator, and E-Streamer MK2 with firmware 70044_update_05032019-482. They allow high-privileged root access by www-data via sudo without requiring appropriate access control. (Furthermore, the user account that controls the web application service is granted full access to run any system commands with elevated privilege, without the need for password authentication. Should vulnerabilities be identified and exploited within the web application, it may be possible for a threat actor to create or run high-privileged binaries or executables that are available within the operating system of the device.)"}, {"lang": "es", "value": "Fue encontrado un problema en los dispositivos Datagate MK2, Storm 24, Pixelator y E-Streamer MK2 con el firmware versi\u00f3n 70044_update_05032019-482 de ENTTEC. Ellos permiten acceso root con privilegios elevados por www-data mediante sudo sin requerir de un control de acceso apropiado. (Adem\u00e1s, la cuenta de usuario que controla el servicio de aplicaci\u00f3n web concede acceso completo para ejecutar cualquier comando del sistema con privilegios elevados, sin la necesidad de autenticaci\u00f3n de contrase\u00f1a. En el supuesto de que las vulnerabilidades se identifiquen y exploten en la aplicaci\u00f3n web, puede ser posible que un atacante cree o ejecute archivos binarios o ejecutables con privilegios elevados que est\u00e9n disponibles en el sistema operativo del dispositivo.)"}], "id": "CVE-2019-12775", "lastModified": "2024-11-21T04:23:33.130", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-06-07T16:29:00.643", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.mogozobo.com/?p=3476"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.mogozobo.com/?p=3476"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-269"}], "source": "nvd@nist.gov", "type": "Primary"}]}