Show plain JSON{"id": "CVE-2019-12288", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2019-05-23T18:29:01.543", "references": [{"url": "http://f1security.co.kr/cve/cve_190314.htm", "tags": ["Broken Link"], "source": "cve@mitre.org"}, {"url": "http://f1security.co.kr/cve/cve_190314.htm", "tags": ["Broken Link"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-306"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in upgrade_htmls.cgi on VStarcam 100T (C7824WIP) KR75.8.53.20 and 200V (C38S) KR203.18.1.20 devices. The web service, network, and account files can be manipulated through a web UI firmware update without any authentication. The attacker can achieve access to the device through a manipulated web UI firmware update."}, {"lang": "es", "value": "Se detect\u00f3 un problema en upgrade_htmls.cgi en dispositivos VStarcam 100T (C7824WIP) KR75.8.53.20 y 200V (C38S) KR203.18.1.20. El servicio web, la red y los archivos de cuenta pueden ser manipulados por medio de una actualizaci\u00f3n de firmware de la web UI sin autenticaci\u00f3n alguna. El atacante puede conseguir acceso al dispositivo por medio de una actualizaci\u00f3n de firmware de la interfaz de usuario web manipulada."}], "lastModified": "2024-11-21T04:22:33.580", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:vstarcam:c7824iwp_firmware:kr75.8.53.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3764DC7-40BB-4BF2-88FC-EDE94810E580"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:vstarcam:c7824iwp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B339EA57-7733-494E-9038-306E4FDAB6DC"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:vstracm:c38s_firmware:kr203.18.1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34C5383A-BC5F-4A69-BD5D-BC7F313C40A5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:vstracm:c38s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D6719A22-3B6C-4407-92C5-E38BFA0DF0D7"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}