ID

VAR-202002-1340


CVE

CVE-2020-9023


TITLE

Iteris Vantage Velocity Field Unit Inadequate protection of credentials on devices

Trust: 0.8

sources: JVNDB: JVNDB-2020-002045

DESCRIPTION

Iteris Vantage Velocity Field Unit 2.3.1 and 2.4.2 devices have two users that are not documented and are configured with weak passwords (User bluetooth, password bluetooth; User eclipse, password eclipse). Also, bluetooth is the root password. Iteris Vantage Velocity Field Unit Devices contain vulnerabilities in insufficient protection of credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Iteris Vantage Velocity Field Unit is a road monitoring field device of American Iteris Company. Remote attackers can use this vulnerability to submit special requests and can execute arbitrary OS commands with ROOT permissions

Trust: 2.16

sources: NVD: CVE-2020-9023 // JVNDB: JVNDB-2020-002045 // CNVD: CNVD-2020-16514

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-16514

AFFECTED PRODUCTS

vendor:iterismodel:vantage velocityscope:eqversion:2.3.1

Trust: 1.8

vendor:iterismodel:vantage velocityscope:eqversion:2.4.2

Trust: 1.8

vendor:iterismodel:vantage velocity field unitscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2020-16514 // JVNDB: JVNDB-2020-002045 // NVD: CVE-2020-9023

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-9023
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-002045
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2020-16514
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202002-886
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2020-9023
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-002045
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-16514
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-9023
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-002045
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-16514 // JVNDB: JVNDB-2020-002045 // CNNVD: CNNVD-202002-886 // NVD: CVE-2020-9023

PROBLEMTYPE DATA

problemtype:CWE-521

Trust: 1.0

problemtype:CWE-522

Trust: 0.8

sources: JVNDB: JVNDB-2020-002045 // NVD: CVE-2020-9023

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202002-886

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202002-886

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-002045

PATCH

title:Vantage Velocityurl:https://www.iteris.com/products/travel-time/vantage-velocity

Trust: 0.8

title:Patch for Iteris Vantage Velocity Field Unit Undocumented Account Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/207979

Trust: 0.6

sources: CNVD: CNVD-2020-16514 // JVNDB: JVNDB-2020-002045

EXTERNAL IDS

db:NVDid:CVE-2020-9023

Trust: 3.0

db:JVNDBid:JVNDB-2020-002045

Trust: 0.8

db:CNVDid:CNVD-2020-16514

Trust: 0.6

db:CNNVDid:CNNVD-202002-886

Trust: 0.6

sources: CNVD: CNVD-2020-16514 // JVNDB: JVNDB-2020-002045 // CNNVD: CNNVD-202002-886 // NVD: CVE-2020-9023

REFERENCES

url:https://sku11army.blogspot.com/2020/01/iteris-vantage-velocity-field-unit-no.html

Trust: 3.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9023

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-9023

Trust: 0.8

sources: CNVD: CNVD-2020-16514 // JVNDB: JVNDB-2020-002045 // CNNVD: CNNVD-202002-886 // NVD: CVE-2020-9023

SOURCES

db:CNVDid:CNVD-2020-16514
db:JVNDBid:JVNDB-2020-002045
db:CNNVDid:CNNVD-202002-886
db:NVDid:CVE-2020-9023

LAST UPDATE DATE

2024-11-23T21:36:05.093000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-16514date:2020-03-10T00:00:00
db:JVNDBid:JVNDB-2020-002045date:2020-03-03T00:00:00
db:CNNVDid:CNNVD-202002-886date:2020-03-16T00:00:00
db:NVDid:CVE-2020-9023date:2024-11-21T05:39:51.003

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-16514date:2020-03-10T00:00:00
db:JVNDBid:JVNDB-2020-002045date:2020-03-03T00:00:00
db:CNNVDid:CNNVD-202002-886date:2020-02-17T00:00:00
db:NVDid:CVE-2020-9023date:2020-02-17T04:15:10.920