Vulnerability Details : CVE-2020-24592
Mitel MiCloud Management Portal before 6.1 SP5 could allow an attacker, by sending a crafted request, to view system information due to insufficient output sanitization.
Products affected by CVE-2020-24592
- cpe:2.3:a:mitel:micloud_management_portal:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitel:micloud_management_portal:6.1:-:*:*:*:*:*:*
- cpe:2.3:a:mitel:micloud_management_portal:6.1:sp4:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-24592
0.21%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-24592
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2020-24592
-
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-24592
-
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0010
Mitel Product Security Advisory 20-0010Vendor Advisory
-
https://www.mitel.com/support/security-advisories
Security AdvisoriesVendor Advisory
Jump to