Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ave:dominaplus:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1832192-40DB-4D8C-B0A8-DBB251F19100", "versionEndIncluding": "1.10.77", "versionStartIncluding": "1.8.4", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:ave:53ab-wbs_firmware:1.10.62:*:*:*:*:*:*:*", "matchCriteriaId": "51CC92CB-942B-4BE1-BEFE-57A71DAF7D50", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:ave:53ab-wbs:-:*:*:*:*:*:*:*", "matchCriteriaId": "171FD211-CB91-4123-99F4-12C19D68EEAF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:ave:ts01_firmware:1.0.65:*:*:*:*:*:*:*", "matchCriteriaId": "2AE9FCB9-DE6F-44B1-9433-02D7CDF88DA5", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:ave:ts01:-:*:*:*:*:*:*:*", "matchCriteriaId": "064E7673-1221-4142-A57F-001EDBAAEB6C", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:ave:ts03x-v_firmware:1.10.45a:*:*:*:*:*:*:*", "matchCriteriaId": "F31ABD8E-0CF3-4CE3-B8EF-8C46A7353457", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:ave:ts03x-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B20A9921-50C8-4954-A8B4-B43D32678695", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:ave:ts04x-v_firmware:1.10.45a:*:*:*:*:*:*:*", "matchCriteriaId": "9B777067-9710-4D28-9A5B-F0A4FF7D09AA", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:ave:ts04x-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "88A2B318-3DA2-491B-9A6C-BAEC0E10D185", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:ave:ts05_firmware:1.10.36:*:*:*:*:*:*:*", "matchCriteriaId": "7636D17E-6E48-409B-82BC-1E9C00B426F0", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:ave:ts05:-:*:*:*:*:*:*:*", "matchCriteriaId": "42DDCD50-D9C6-4515-8AFD-0FAD983D00C0", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:ave:ts05n-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8F9D39B-6F67-47EF-BB2C-86FBCD84D76C", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:ave:ts05n-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "73DFB4EC-EB30-4041-AB29-4000D5E2B29A", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "AVE DOMINAplus <=1.10.x suffers from an unauthenticated reboot command execution. Attackers can exploit this issue to cause a denial of service scenario."}, {"lang": "es", "value": "AVE DOMINAplus versiones anteriores a 1.10.x incluy\u00e9ndola, sufre de una ejecuci\u00f3n de comando de reinicio no autenticado. Los atacantes pueden explotar este problema para causar un escenario de denegaci\u00f3n de servicio"}], "id": "CVE-2020-21996", "lastModified": "2024-11-21T05:12:59.497", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-04-28T15:15:07.943", "references": [{"source": "cve@mitre.org", "tags": ["Technical Description"], "url": "https://cwe.mitre.org/data/definitions/306.html"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "url": "https://www.exploit-db.com/exploits/47820"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5548.php"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Technical Description"], "url": "https://cwe.mitre.org/data/definitions/306.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "url": "https://www.exploit-db.com/exploits/47820"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5548.php"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-306"}], "source": "nvd@nist.gov", "type": "Primary"}]}