ID

VAR-202009-0966


CVE

CVE-2020-24373


TITLE

Freebox server cross-site request forgery vulnerability

Trust: 1.2

sources: CNVD: CNVD-2020-57060 // CNNVD: CNNVD-202009-1012

DESCRIPTION

A CSRF vulnerability in the UPnP MediaServer implementation in Freebox Server before 4.2.3. Freebox Server Contains a cross-site request forgery vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. The Freebox server is a DSL modem, router, Wi-Fi hotspot, NAS (250 GB hard disk), DECT base with up to 8 connected DECT phones, and digital video recorder-T for TNT (also known as DVB) And IPTV. There is a cross-site request forgery vulnerability in Freebox Server versions prior to 4.2.3, which is caused by the WEB application not fully verifying whether the request comes from a trusted user. An attacker can use this vulnerability to send unexpected requests to the server through the affected client

Trust: 2.16

sources: NVD: CVE-2020-24373 // JVNDB: JVNDB-2020-011226 // CNVD: CNVD-2020-57060

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-57060

AFFECTED PRODUCTS

vendor:freemodel:freebox miniscope:ltversion:4.2.3

Trust: 1.0

vendor:freemodel:freebox deltascope:ltversion:4.2.3

Trust: 1.0

vendor:freemodel:freebox popscope:ltversion:4.2.3

Trust: 1.0

vendor:freemodel:freebox onescope:ltversion:4.2.3

Trust: 1.0

vendor:freemodel:freebox revolutionscope:ltversion:4.2.3

Trust: 1.0

vendor:freemodel:freebox deltascope: - version: -

Trust: 0.8

vendor:freemodel:freebox miniscope: - version: -

Trust: 0.8

vendor:freemodel:freebox onescope: - version: -

Trust: 0.8

vendor:freemodel:freebox popscope: - version: -

Trust: 0.8

vendor:freemodel:freebox revolutionscope: - version: -

Trust: 0.8

vendor:freeboxmodel:serverscope:ltversion:4.2.3

Trust: 0.6

sources: CNVD: CNVD-2020-57060 // JVNDB: JVNDB-2020-011226 // NVD: CVE-2020-24373

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-24373
value: HIGH

Trust: 1.0

NVD: CVE-2020-24373
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-57060
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202009-1012
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-24373
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2020-57060
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-24373
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-24373
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-57060 // JVNDB: JVNDB-2020-011226 // CNNVD: CNNVD-202009-1012 // NVD: CVE-2020-24373

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.0

problemtype:Cross-site request forgery (CWE-352) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-011226 // NVD: CVE-2020-24373

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202009-1012

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-202009-1012

PATCH

title:freeboxurl:https://dev.freebox.fr/blog/?p=10222

Trust: 0.8

title:Patch for Freebox server cross-site request forgery vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/236470

Trust: 0.6

title:Freebox server Fixes for cross-site request forgery vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=128749

Trust: 0.6

sources: CNVD: CNVD-2020-57060 // JVNDB: JVNDB-2020-011226 // CNNVD: CNNVD-202009-1012

EXTERNAL IDS

db:NVDid:CVE-2020-24373

Trust: 3.0

db:JVNDBid:JVNDB-2020-011226

Trust: 0.8

db:CNVDid:CNVD-2020-57060

Trust: 0.6

db:CNNVDid:CNNVD-202009-1012

Trust: 0.6

sources: CNVD: CNVD-2020-57060 // JVNDB: JVNDB-2020-011226 // CNNVD: CNNVD-202009-1012 // NVD: CVE-2020-24373

REFERENCES

url:https://www.gabriel.urdhr.fr/2020/09/23/dns-rebinding-freebox/

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-24373

Trust: 2.0

url:https://dev.freebox.fr/blog/?p=10222

Trust: 1.6

sources: CNVD: CNVD-2020-57060 // JVNDB: JVNDB-2020-011226 // CNNVD: CNNVD-202009-1012 // NVD: CVE-2020-24373

SOURCES

db:CNVDid:CNVD-2020-57060
db:JVNDBid:JVNDB-2020-011226
db:CNNVDid:CNNVD-202009-1012
db:NVDid:CVE-2020-24373

LAST UPDATE DATE

2024-11-23T22:51:16.889000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-57060date:2020-11-19T00:00:00
db:JVNDBid:JVNDB-2020-011226date:2021-03-24T02:15:00
db:CNNVDid:CNNVD-202009-1012date:2020-11-16T00:00:00
db:NVDid:CVE-2020-24373date:2024-11-21T05:14:41.583

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-57060date:2020-10-15T00:00:00
db:JVNDBid:JVNDB-2020-011226date:2021-03-24T00:00:00
db:CNNVDid:CNNVD-202009-1012date:2020-09-16T00:00:00
db:NVDid:CVE-2020-24373date:2020-09-16T20:15:13.973