ID

VAR-202101-0394


CVE

CVE-2020-27542


TITLE

Rostelecom CS-C2SHW  In  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2020-015668

DESCRIPTION

Rostelecom CS-C2SHW 5.0.082.1 is affected by: Bash command injection. The camera reads configuration from QR code (including network settings). The static IP configuration from QR code is copied to the file /config/ip-static and after reboot data from this file is inserted into bash command (without any escaping). So bash injection is possible. Camera doesn't parse QR codes if it's already successfully configured. Camera is always rebooted after successful configuration via QR code. Rostelecom CS-C2SHW Has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Trust: 1.71

sources: NVD: CVE-2020-27542 // JVNDB: JVNDB-2020-015668 // VULMON: CVE-2020-27542

IOT TAXONOMY

category:['camera device']sub_category:camera

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor: - model:cs-c2shw_firmwarescope:eqversion:5.0.082.1

Trust: 1.0

vendor:rostelecommodel:cs-c2shwscope:eqversion:cs-c2shw firmware 5.0.082.1

Trust: 0.8

vendor:rostelecommodel:cs-c2shwscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-015668 // NVD: CVE-2020-27542

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-27542
value: MEDIUM

Trust: 1.0

NVD: CVE-2020-27542
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202101-2330
value: MEDIUM

Trust: 0.6

VULMON: CVE-2020-27542
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-27542
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2020-27542
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-27542
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2020-27542 // JVNDB: JVNDB-2020-015668 // CNNVD: CNNVD-202101-2330 // NVD: CVE-2020-27542

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:OS Command injection (CWE-78) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-015668 // NVD: CVE-2020-27542

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202101-2330

PATCH

title:Top Pageurl:https://www.company.rt.ru/en/

Trust: 0.8

sources: JVNDB: JVNDB-2020-015668

EXTERNAL IDS

db:NVDid:CVE-2020-27542

Trust: 2.6

db:JVNDBid:JVNDB-2020-015668

Trust: 0.8

db:CNNVDid:CNNVD-202101-2330

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:VULMONid:CVE-2020-27542

Trust: 0.1

sources: OTHER: None // VULMON: CVE-2020-27542 // JVNDB: JVNDB-2020-015668 // CNNVD: CNNVD-202101-2330 // NVD: CVE-2020-27542

REFERENCES

url:https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-27542

Trust: 1.4

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: OTHER: None // VULMON: CVE-2020-27542 // JVNDB: JVNDB-2020-015668 // CNNVD: CNNVD-202101-2330 // NVD: CVE-2020-27542

SOURCES

db:OTHERid: -
db:VULMONid:CVE-2020-27542
db:JVNDBid:JVNDB-2020-015668
db:CNNVDid:CNNVD-202101-2330
db:NVDid:CVE-2020-27542

LAST UPDATE DATE

2025-01-30T21:46:06.172000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2020-27542date:2021-02-02T00:00:00
db:JVNDBid:JVNDB-2020-015668date:2021-10-08T09:02:00
db:CNNVDid:CNNVD-202101-2330date:2021-02-09T00:00:00
db:NVDid:CVE-2020-27542date:2024-11-21T05:21:20.550

SOURCES RELEASE DATE

db:VULMONid:CVE-2020-27542date:2021-01-26T00:00:00
db:JVNDBid:JVNDB-2020-015668date:2021-10-08T00:00:00
db:CNNVDid:CNNVD-202101-2330date:2021-01-26T00:00:00
db:NVDid:CVE-2020-27542date:2021-01-26T18:15:46.240