Show plain JSON{"containers": {"cna": {"affected": [{"product": "Voluson S8", "vendor": "GE", "versions": [{"status": "affected", "version": "n/a"}]}], "credits": [{"lang": "en", "value": "Marc Ruef/Rocco Gagliardi"}], "descriptions": [{"lang": "en", "value": "A vulnerability classified as critical was found in GE Voluson S8. Affected is the underlying Windows XP operating system. Missing patches might introduce an excessive attack surface. Access to the local network is required for this attack to succeed."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-06-30T23:14:07.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://www.scip.ch/?news.20200701"}, {"tags": ["x_refsource_MISC"], "url": "https://vuldb.com/?id.129835"}], "title": "GE Voluson S8 Windows Operating System Patches privileges management", "x_generator": "vuldb.com", "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-36549", "REQUESTER": "cna@vuldb.com", "STATE": "PUBLIC", "TITLE": "GE Voluson S8 Windows Operating System Patches privileges management"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Voluson S8", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "GE"}]}}, "credit": "Marc Ruef/Rocco Gagliardi", "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A vulnerability classified as critical was found in GE Voluson S8. Affected is the underlying Windows XP operating system. Missing patches might introduce an excessive attack surface. Access to the local network is required for this attack to succeed."}]}, "generator": "vuldb.com", "impact": {"cvss": {"baseScore": "8.8", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-269 Improper Privilege Management"}]}]}, "references": {"reference_data": [{"name": "https://www.scip.ch/?news.20200701", "refsource": "MISC", "url": "https://www.scip.ch/?news.20200701"}, {"name": "https://vuldb.com/?id.129835", "refsource": "MISC", "url": "https://vuldb.com/?id.129835"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T17:30:08.357Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.scip.ch/?news.20200701"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://vuldb.com/?id.129835"}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-04-16T17:28:38.466654Z", "id": "CVE-2020-36549", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-04-16T17:52:27.727Z"}}]}, "cveMetadata": {"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-36549", "datePublished": "2022-06-17T13:10:20.000Z", "dateReserved": "2022-06-16T00:00:00.000Z", "dateUpdated": "2025-04-16T17:52:27.727Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}