Vulnerability Details : CVE-2020-12106
The Web portal of the WiFi module of VPNCrypt M10 2.6.5 allows unauthenticated users to send HTTP POST request to several critical Administrative functions such as, changing credentials of the Administrator account or connect the product to a rogue access point.
Products affected by CVE-2020-12106
- cpe:2.3:o:stengg:vpncrypt_m10_firmware:2.6.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-12106
0.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-12106
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2020-12106
-
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-12106
-
https://www.stengg.com/media/1076253/vpncrypt-m10-cve-advisory-notice.pdf
Third Party Advisory
-
https://www.stengg.com/cybersecurity
Cybersecurity - Electronics | ST EngineeringThird Party Advisory
Jump to