Vulnerability Details : CVE-2020-9384
Potential exploit
An Insecure Direct Object Reference (IDOR) vulnerability in the Change Password feature of Subex ROC Partner Settlement 10.5 allows remote authenticated users to achieve account takeover via manipulation of POST parameters. NOTE: This vulnerability may only affect a testing version of the application
Products affected by CVE-2020-9384
- cpe:2.3:a:subex:roc_partner_settlement:10.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-9384
0.37%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-9384
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2020-9384
-
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-9384
-
https://www.subex.com/partner-settlement/
Telecom Partner Settlement | Carrier | Content Billing Solution - SubexVendor Advisory
-
http://packetstormsecurity.com/files/157197/Subex-ROC-Partner-Settlement-10.5-Insecure-Direct-Object-Reference.html
Subex ROC Partner Settlement 10.5 Insecure Direct Object Reference ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to