Vulnerability Details : CVE-2020-24051
The Moog EXO Series EXVF5C-2 and EXVP7C2-3 units support the ONVIF interoperability IP-based physical security protocol, which requires authentication for some of its operations. It was found that the authentication check for those ONVIF operations can be bypassed. An attacker can abuse this issue to execute privileged operations without authentication, for instance, to create a new Administrator user.
Exploit prediction scoring system (EPSS) score for CVE-2020-24051
Probability of exploitation activity in the next 30 days: 0.49%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 73 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2020-24051
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2020-24051
-
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-24051
-
https://ioactive.com/moog-exo-series-multiple-vulnerabilities/
Moog EXO Series Multiple Vulnerabilities | IOActiveThird Party Advisory
-
https://ioac.tv/3hy1xu6
Exploit;Third Party Advisory
Products affected by CVE-2020-24051
- cpe:2.3:o:moog:exvf5c-2_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:moog:exvp7c2-3_firmware:-:*:*:*:*:*:*:*