Vulnerability Details : CVE-2020-3926
An arbitrary-file-access vulnerability exists in ServiSign security plugin, as long as the attackers learn the specific API function, they may access arbitrary files on target system via crafted API parameter.
Products affected by CVE-2020-3926
- cpe:2.3:a:changingtec:servisign:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-3926
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-3926
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:C/I:N/A:N |
10.0
|
6.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N |
1.6
|
4.0
|
TWCERT/CC |
CWE ids for CVE-2020-3926
-
The product makes files or directories accessible to unauthorized actors, even though they should not be.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-3926
-
https://www.chtsecurity.com/news/1179d48b-7609-4f67-9d7e-3bac2979c6ce
Vulnerabilities of ServiSign Components|中華資安國際 CHT Security Co., Ltd.Third Party Advisory
-
https://tvn.twcert.org.tw/taiwanvn/TVN-201910006
台灣漏洞紀錄平台 Taiwan Vulnerability NoteThird Party Advisory
Jump to