ID

VAR-201904-0938


CVE

CVE-2019-11320


TITLE

Motorola CX2 and M2 Vulnerabilities related to authorization, permissions, and access control

Trust: 0.8

sources: JVNDB: JVNDB-2019-003511

DESCRIPTION

In Motorola CX2 1.01 and M2 1.01, users can access the router's /priv_mgt.html web page to launch telnetd, as demonstrated by the 192.168.51.1 address. Motorola CX2 and M2 Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Both Motorola M2 and Motorola CX2 are products of Motorola. The Motorola M2 is a smartphone. Motorola CX2 is a wireless router. A security vulnerability exists in Motorola CX2 version 1.01 and Motorola M2 version 1.01. An attacker can exploit this vulnerability to access the router's /priv_mgt.html Web page

Trust: 1.8

sources: NVD: CVE-2019-11320 // JVNDB: JVNDB-2019-003511 // VULHUB: VHN-142955 // VULMON: CVE-2019-11320

AFFECTED PRODUCTS

vendor:motorolamodel:cx2scope:eqversion:1.01

Trust: 1.8

vendor:motorolamodel:m2scope:eqversion:1.01

Trust: 1.8

sources: JVNDB: JVNDB-2019-003511 // NVD: CVE-2019-11320

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-11320
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-11320
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201904-897
value: CRITICAL

Trust: 0.6

VULHUB: VHN-142955
value: HIGH

Trust: 0.1

VULMON: CVE-2019-11320
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-11320
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-142955
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-11320
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-142955 // VULMON: CVE-2019-11320 // JVNDB: JVNDB-2019-003511 // CNNVD: CNNVD-201904-897 // NVD: CVE-2019-11320

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-142955 // JVNDB: JVNDB-2019-003511 // NVD: CVE-2019-11320

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201904-897

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201904-897

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-003511

PATCH

title:トップページurl:https://www.motorolasolutions.com/ja_jp.html?geo=redirect

Trust: 0.8

sources: JVNDB: JVNDB-2019-003511

EXTERNAL IDS

db:NVDid:CVE-2019-11320

Trust: 2.6

db:JVNDBid:JVNDB-2019-003511

Trust: 0.8

db:CNNVDid:CNNVD-201904-897

Trust: 0.7

db:VULHUBid:VHN-142955

Trust: 0.1

db:VULMONid:CVE-2019-11320

Trust: 0.1

sources: VULHUB: VHN-142955 // VULMON: CVE-2019-11320 // JVNDB: JVNDB-2019-003511 // CNNVD: CNNVD-201904-897 // NVD: CVE-2019-11320

REFERENCES

url:https://github.com/teamseri0us/pocs/blob/master/iot/motorola.pdf

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-11320

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11320

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-142955 // VULMON: CVE-2019-11320 // JVNDB: JVNDB-2019-003511 // CNNVD: CNNVD-201904-897 // NVD: CVE-2019-11320

SOURCES

db:VULHUBid:VHN-142955
db:VULMONid:CVE-2019-11320
db:JVNDBid:JVNDB-2019-003511
db:CNNVDid:CNNVD-201904-897
db:NVDid:CVE-2019-11320

LAST UPDATE DATE

2024-11-23T21:59:59.638000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-142955date:2020-08-24T00:00:00
db:VULMONid:CVE-2019-11320date:2020-08-24T00:00:00
db:JVNDBid:JVNDB-2019-003511date:2019-05-20T00:00:00
db:CNNVDid:CNNVD-201904-897date:2020-08-25T00:00:00
db:NVDid:CVE-2019-11320date:2024-11-21T04:20:52.847

SOURCES RELEASE DATE

db:VULHUBid:VHN-142955date:2019-04-18T00:00:00
db:VULMONid:CVE-2019-11320date:2019-04-18T00:00:00
db:JVNDBid:JVNDB-2019-003511date:2019-05-20T00:00:00
db:CNNVDid:CNNVD-201904-897date:2019-04-18T00:00:00
db:NVDid:CVE-2019-11320date:2019-04-18T17:29:01.070