ID

VAR-202008-1034


CVE

CVE-2020-7525


TITLE

spaceLYnk and Wiser for KNX Vulnerability regarding improper restriction of excessive authentication attempts in

Trust: 0.8

sources: JVNDB: JVNDB-2020-010516

DESCRIPTION

Improper Restriction of Excessive Authentication Attempts vulnerability exists in all hardware versions of spaceLYnk and Wiser for KNX (formerly homeLYnk) which could allow an attacker to guess a password when brute force is used

Trust: 1.62

sources: NVD: CVE-2020-7525 // JVNDB: JVNDB-2020-010516

AFFECTED PRODUCTS

vendor:schneider electricmodel:spacelynkscope:ltversion:2.5.1

Trust: 1.0

vendor:schneider electricmodel:wiser for knxscope:ltversion:2.5.1

Trust: 1.0

vendor:schneider electricmodel:spacelynkscope: - version: -

Trust: 0.8

vendor:schneider electricmodel:wiser for knxscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-010516 // NVD: CVE-2020-7525

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2020-7525
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-010516
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202008-1470
value: HIGH

Trust: 0.6

NVD: CVE-2020-7525
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-010516
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

NVD: CVE-2020-7525
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-010516
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-010516 // CNNVD: CNNVD-202008-1470 // NVD: CVE-2020-7525

PROBLEMTYPE DATA

problemtype:CWE-307

Trust: 1.8

sources: JVNDB: JVNDB-2020-010516 // NVD: CVE-2020-7525

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202008-1470

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202008-1470

CONFIGURATIONS

sources: NVD: CVE-2020-7525

PATCH

title:SEVD-2020-224-02url:https://www.se.com/ww/en/download/document/sevd-2020-224-02/

Trust: 0.8

sources: JVNDB: JVNDB-2020-010516

EXTERNAL IDS

db:NVDid:CVE-2020-7525

Trust: 2.4

db:SCHNEIDERid:SEVD-2020-224-02

Trust: 1.6

db:JVNDBid:JVNDB-2020-010516

Trust: 0.8

db:CNNVDid:CNNVD-202008-1470

Trust: 0.6

sources: JVNDB: JVNDB-2020-010516 // CNNVD: CNNVD-202008-1470 // NVD: CVE-2020-7525

REFERENCES

url:https://www.se.com/ww/en/download/document/sevd-2020-224-02/

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-7525

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-7525

Trust: 0.8

sources: JVNDB: JVNDB-2020-010516 // CNNVD: CNNVD-202008-1470 // NVD: CVE-2020-7525

SOURCES

db:JVNDBid:JVNDB-2020-010516
db:CNNVDid:CNNVD-202008-1470
db:NVDid:CVE-2020-7525

LAST UPDATE DATE

2022-05-04T10:10:53.191000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2020-010516date:2021-01-25T09:01:16
db:CNNVDid:CNNVD-202008-1470date:2020-09-07T00:00:00
db:NVDid:CVE-2020-7525date:2020-09-04T18:00:00

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2020-010516date:2021-01-25T09:01:16
db:CNNVDid:CNNVD-202008-1470date:2020-08-31T00:00:00
db:NVDid:CVE-2020-7525date:2020-08-31T17:15:00