Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:niscomed:m1000_multipara_patient_monitor_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3695BBDF-27F7-465D-8E43-F75EAAF3CF74", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:niscomed:m1000_multipara_patient_monitor:-:*:*:*:*:*:*:*", "matchCriteriaId": "960CD525-337E-4B2B-92EF-BA4F4FDBF304", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "An issue was discovered on Nescomed Multipara Monitor M1000 devices. The device enables an unencrypted TELNET service by default, with a blank password for the admin account. This allows an attacker to gain root access to the device over the local network."}, {"lang": "es", "value": "Se detect\u00f3 un problema en los dispositivos Nescomed Multipara Monitor M1000. El dispositivo habilita un servicio TELNET sin cifrar por defecto, con una contrase\u00f1a en blanco para la cuenta de administrador. Esto permite a un atacante obtener acceso root al dispositivo a trav\u00e9s de la red local"}], "id": "CVE-2020-15482", "lastModified": "2024-11-21T05:05:36.437", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-08-26T16:15:12.510", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://payatu.com/advisory/unauthenticated-telnet-service-in-niscomed-patient-monitor"}, {"source": "cve@mitre.org", "tags": ["Product"], "url": "https://www.niscomed.com/multipara-monitor.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://payatu.com/advisory/unauthenticated-telnet-service-in-niscomed-patient-monitor"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"], "url": "https://www.niscomed.com/multipara-monitor.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-287"}, {"lang": "en", "value": "CWE-319"}], "source": "nvd@nist.gov", "type": "Primary"}]}