Vulnerability Details : CVE-2020-6865
ZTE SDN controller platform is impacted by an information leakage vulnerability. Due to the program's failure to optimize the response of failure to the request, the caller can directly view the internal error code location of the component. Attackers could exploit this vulnerability to obtain sensitive information. This affects: OSCP versions V16.19.10 and V16.19.20.
Vulnerability category: Information leak
Products affected by CVE-2020-6865
- cpe:2.3:a:zte:oscp:16.19.10:*:*:*:*:*:*:*
- cpe:2.3:a:zte:oscp:16.19.20:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-6865
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 27 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-6865
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2020-6865
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-6865
-
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1012782
Security Bulletin DetailsVendor Advisory
Jump to