ID

VAR-202002-0939


CVE

CVE-2020-3923


TITLE

TAT-76 and TAT-77 Unauthorized authentication vulnerabilities in the series

Trust: 0.8

sources: JVNDB: JVNDB-2020-002412

DESCRIPTION

DVR firmware in TAT-76 and TAT-77 series of products, provided by TONNET, contain misconfigured authentication mechanism. Attackers can crack the default password and gain access to the system. TAT-76 and TAT-77 The series contains vulnerabilities related to fraudulent authentication.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Tonnet TAT-76 is a network camera device

Trust: 2.16

sources: NVD: CVE-2020-3923 // JVNDB: JVNDB-2020-002412 // CNVD: CNVD-2020-14864

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-14864

AFFECTED PRODUCTS

vendor:tonnetmodel:tat-76108g3scope:lteversion:20181221_76208g3

Trust: 1.0

vendor:tonnetmodel:tat-76116g3scope:lteversion:20181221_76216g3

Trust: 1.0

vendor:tonnetmodel:tat-76132g3scope:lteversion:tat-70832g3_20181221-1

Trust: 1.0

vendor:tonnetmodel:tat-71416g1scope:lteversion:tat-71416g1_20181225

Trust: 1.0

vendor:tonnetmodel:tat-77104g1scope:lteversion:tat-77104g1_20190107

Trust: 1.0

vendor:tonnetmodel:tat-76104g3scope:lteversion:20181220_76104g3

Trust: 1.0

vendor:tonnetmodel:tat-70432nscope:lteversion:tat-77208g1_20181225

Trust: 1.0

vendor:tonnetmodel:tat-71832g1scope:lteversion:tat-71832g1_20190510

Trust: 1.0

vendor:tonnetmodel:tat-70432nscope: - version: -

Trust: 0.8

vendor:tonnetmodel:tat-71416g1scope: - version: -

Trust: 0.8

vendor:tonnetmodel:tat-71832g1scope: - version: -

Trust: 0.8

vendor:tonnetmodel:tat-76104g3scope: - version: -

Trust: 0.8

vendor:tonnetmodel:tat-76108g3scope: - version: -

Trust: 0.8

vendor:tonnetmodel:tat-76116g3scope: - version: -

Trust: 0.8

vendor:tonnetmodel:tat-76132g3scope: - version: -

Trust: 0.8

vendor:tonnetmodel:tat-77104g1scope: - version: -

Trust: 0.8

vendor:tonnetmodel:tat-76scope: - version: -

Trust: 0.6

vendor:tonnetmodel:tat-77scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2020-14864 // JVNDB: JVNDB-2020-002412 // NVD: CVE-2020-3923

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3923
value: CRITICAL

Trust: 1.0

twcert@cert.org.tw: CVE-2020-3923
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-002412
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2020-14864
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202002-1289
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2020-3923
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-002412
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-14864
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-3923
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

twcert@cert.org.tw: CVE-2020-3923
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-002412
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-14864 // JVNDB: JVNDB-2020-002412 // CNNVD: CNNVD-202002-1289 // NVD: CVE-2020-3923 // NVD: CVE-2020-3923

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.0

problemtype:CWE-863

Trust: 0.8

sources: JVNDB: JVNDB-2020-002412 // NVD: CVE-2020-3923

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202002-1289

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-202002-1289

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-002412

PATCH

title:Top Pageurl:https://www.tonnet.com.tw/

Trust: 0.8

title:Patch for Tonnet TAT-76 Default Password Authentication Bypass Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/206263

Trust: 0.6

title:Tonnet TAT-76 and TAT-77 Fixes for access control error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=111091

Trust: 0.6

sources: CNVD: CNVD-2020-14864 // JVNDB: JVNDB-2020-002412 // CNNVD: CNNVD-202002-1289

EXTERNAL IDS

db:NVDid:CVE-2020-3923

Trust: 3.0

db:TWCERTid:TVN-201910003

Trust: 2.2

db:JVNDBid:JVNDB-2020-002412

Trust: 0.8

db:CNVDid:CNVD-2020-14864

Trust: 0.6

db:CNNVDid:CNNVD-202002-1289

Trust: 0.6

sources: CNVD: CNVD-2020-14864 // JVNDB: JVNDB-2020-002412 // CNNVD: CNNVD-202002-1289 // NVD: CVE-2020-3923

REFERENCES

url:https://www.chtsecurity.com/news/4ef5eb3a-fdc3-4d78-8dd7-ec7213e2bbcf

Trust: 2.4

url:https://tvn.twcert.org.tw/taiwanvn/tvn-201910003

Trust: 2.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3923

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-3923

Trust: 0.8

sources: CNVD: CNVD-2020-14864 // JVNDB: JVNDB-2020-002412 // CNNVD: CNNVD-202002-1289 // NVD: CVE-2020-3923

CREDITS

Weber Tsai (CHT Security) , Keniver Wang (CHT Security) , Redhung Chen (CHT Security Intern)

Trust: 0.6

sources: CNNVD: CNNVD-202002-1289

SOURCES

db:CNVDid:CNVD-2020-14864
db:JVNDBid:JVNDB-2020-002412
db:CNNVDid:CNNVD-202002-1289
db:NVDid:CVE-2020-3923

LAST UPDATE DATE

2024-11-23T23:11:33.829000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-14864date:2020-03-02T00:00:00
db:JVNDBid:JVNDB-2020-002412date:2020-03-13T00:00:00
db:CNNVDid:CNNVD-202002-1289date:2021-01-05T00:00:00
db:NVDid:CVE-2020-3923date:2024-11-21T05:31:57.977

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-14864date:2020-03-02T00:00:00
db:JVNDBid:JVNDB-2020-002412date:2020-03-13T00:00:00
db:CNNVDid:CNNVD-202002-1289date:2020-02-27T00:00:00
db:NVDid:CVE-2020-3923date:2020-02-27T04:15:10.577