8.2
CVE-2020-16102
- EPSS 0.98%
- Veröffentlicht 14.12.2020 20:15:12
- Zuletzt bearbeitet 21.11.2024 05:06:46
- Quelle disclosures@gallagher.com
- CVE-Watchlists
- Unerledigt
Improper Authentication vulnerability in Gallagher Command Centre Server allows an unauthenticated remote attacker to create items with invalid configuration, potentially causing the server to crash and fail to restart. This issue affects: Gallagher Command Centre 8.30 versions prior to 8.30.1299(MR2); 8.20 versions prior to 8.20.1218(MR4); 8.10 versions prior to 8.10.1253(MR6); 8.00 versions prior to 8.00.1252(MR7); version 7.90 and prior versions.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Gallagher ≫ Command Centre Version < 7.90.0
Gallagher ≫ Command Centre Version >= 8.00 < 8.00.1252
Gallagher ≫ Command Centre Version >= 8.10 < 8.10.1253
Gallagher ≫ Command Centre Version >= 8.20 < 8.20.1218
Gallagher ≫ Command Centre Version >= 8.30 < 8.30.1299
Gallagher ≫ Command Centre Version8.00.1252 Update-
Gallagher ≫ Command Centre Version8.00.1252 Updatemaintenance_release7
Gallagher ≫ Command Centre Version8.10.1253 Update-
Gallagher ≫ Command Centre Version8.10.1253 Updatemaintenance_release6
Gallagher ≫ Command Centre Version8.20.1218 Update-
Gallagher ≫ Command Centre Version8.20.1218 Updatemaintenance_release4
Gallagher ≫ Command Centre Version8.30.1299 Update-
Gallagher ≫ Command Centre Version8.30.1299 Updatemaintenance_release2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.98% | 0.747 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.2 | 3.9 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
|
| nvd@nist.gov | 6.4 | 10 | 4.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:P
|
| disclosures@gallagher.com | 7.1 | 2.8 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
|
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
CWE-306 Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.