Vulnerability Details : CVE-2020-29057
Potential exploit
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. It allows remote attackers to cause a denial of service (reboot) by sending random bytes to the telnet server on port 23, aka a "shawarma" attack.
Vulnerability category: Denial of service
Products affected by CVE-2020-29057
- cpe:2.3:o:cdatatec:72408a_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:72408a_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:72408a_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:72408a_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:9008a_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:9008a_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:9008a_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:9008a_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:9016a_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:9016a_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:9016a_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:9016a_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:92408a_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:92408a_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:92408a_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:92408a_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:92416a_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:92416a_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:92416a_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:92416a_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:9288_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:9288_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:9288_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:9288_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97016_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97016_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97016_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97016_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97024p_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97024p_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97024p_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97024p_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97028p_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97028p_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97028p_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97028p_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97042p_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97042p_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97042p_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97042p_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97084p_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97084p_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97084p_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97084p_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97168p_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97168p_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97168p_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:97168p_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1002s_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104b_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104s_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104sn_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1108s_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1204s-r2_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1204sn_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1208s-r2_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1216s-r1_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1608gs_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1608sn_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1616gs_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1616sn_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.05_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd8000_firmware:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd8000_firmware:2.4.03_000:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd8000_firmware:2.4.04_001:*:*:*:*:*:*:*
- cpe:2.3:o:cdatatec:fd8000_firmware:2.4.05_000:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-29057
0.62%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-29057
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
References for CVE-2020-29057
-
https://pierrekim.github.io/blog/2020-07-07-cdata-olt-0day-vulnerabilities.html
Multiple vulnerabilities found in CDATA OLTs - IT Security Research by PierreExploit;Third Party Advisory
Jump to