Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:netscout:airmagnet_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DB48988-6A36-4464-81E6-ABE1B0FAA32A", "versionEndIncluding": "11.1.4", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netscout:sensor4-r1s1w1-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "2410556C-3BB2-4725-8997-95336BDD876C", "vulnerable": false}, {"criteria": "cpe:2.3:h:netscout:sensor4-r2s1-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FDB1451-A5C3-41B3-BD87-6209063F20FA", "vulnerable": false}, {"criteria": "cpe:2.3:h:netscout:sensor4-r2s1-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "D24C763D-D787-4753-A2E7-435C9CBFA52A", "vulnerable": false}, {"criteria": "cpe:2.3:h:netscout:sensor6-r1s0w1-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C8BE027-EAA9-4A3C-B978-FF88B5C7C456", "vulnerable": false}, {"criteria": "cpe:2.3:h:netscout:sensor6-r2s1-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AE3A340-A915-48C7-A4F5-1AC4CEFEE7BE", "vulnerable": false}, {"criteria": "cpe:2.3:h:netscout:sensor6-r2s1-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1AA6C47-EB6A-48CB-A9F0-CF1E6C5E10E6", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "NETSCOUT AirMagnet Enterprise 11.1.4 build 37257 and earlier has a sensor escalated privileges vulnerability that can be exploited to provide someone with administrative access to a sensor, with credentials to invoke a command to provide root access to the operating system. The attacker must complete a straightforward password-cracking exercise."}, {"lang": "es", "value": "NETSCOUT AirMagnet Enterprise versi\u00f3n 11.1.4 build 37257 y anteriores, presenta una vulnerabilidad de escalada de privilegios del sensor que puede ser explotada para proporcionar a alguien acceso administrativo hacia un sensor, con credenciales para invocar un comando para proporcionar acceso root al sistema operativo. El atacante debe completar un ejercicio de descifrado de contrase\u00f1as sencillo"}], "id": "CVE-2020-28251", "lastModified": "2024-11-21T05:22:31.433", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-12-03T17:15:13.223", "references": [{"source": "cve@mitre.org", "tags": ["Product"], "url": "https://www.netscout.com/products"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.netscout.com/securityadvisories"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"], "url": "https://www.netscout.com/products"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.netscout.com/securityadvisories"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}