ID

VAR-202102-0157


CVE

CVE-2020-15833


TITLE

Mofi Network MOFI4500-4GXeLTE backdoor vulnerability

Trust: 0.6

sources: CNVD: CNVD-2021-13967

DESCRIPTION

An issue was discovered on Mofi Network MOFI4500-4GXeLTE 4.1.5-std devices. The Dropbear SSH daemon has been modified to accept an alternate hard-coded path to a public key that allows root access. This key is stored in a /rom location that cannot be modified by the device owner. Mofi Network MOFI4500-4GXeLTE is a wireless router of Mofi Network Company

Trust: 1.53

sources: NVD: CVE-2020-15833 // CNVD: CNVD-2021-13967 // VULMON: CVE-2020-15833

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-13967

AFFECTED PRODUCTS

vendor:mofinetworkmodel:mofi4500-4gxeltescope:eqversion:4.1.5-std

Trust: 1.0

vendor:mofimodel:network mofi4500-4gxelte 4.1.5-stdscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2021-13967 // NVD: CVE-2020-15833

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-15833
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2021-13967
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202101-2609
value: CRITICAL

Trust: 0.6

VULMON: CVE-2020-15833
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-15833
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

CNVD: CNVD-2021-13967
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-15833
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2021-13967 // VULMON: CVE-2020-15833 // CNNVD: CNNVD-202101-2609 // NVD: CVE-2020-15833

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.0

sources: NVD: CVE-2020-15833

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202101-2609

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-202101-2609

PATCH

title:Patch for Mofi Network MOFI4500-4GXeLTE backdoor vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/250461

Trust: 0.6

title:Mofi Network MOFI4500-4GXeLTE Repair measures for trust management problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=140640

Trust: 0.6

sources: CNVD: CNVD-2021-13967 // CNNVD: CNNVD-202101-2609

EXTERNAL IDS

db:NVDid:CVE-2020-15833

Trust: 2.3

db:CNVDid:CNVD-2021-13967

Trust: 0.6

db:CNNVDid:CNNVD-202101-2609

Trust: 0.6

db:VULMONid:CVE-2020-15833

Trust: 0.1

sources: CNVD: CNVD-2021-13967 // VULMON: CVE-2020-15833 // CNNVD: CNNVD-202101-2609 // NVD: CVE-2020-15833

REFERENCES

url:https://mofinetwork.com/index.php?main_page=page&id=14

Trust: 1.7

url:https://www.criticalstart.com/critical-vulnerabilities-discovered-in-mofi-routers/

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-15833

Trust: 1.2

url:https://cwe.mitre.org/data/definitions/798.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2021-13967 // VULMON: CVE-2020-15833 // CNNVD: CNNVD-202101-2609 // NVD: CVE-2020-15833

SOURCES

db:CNVDid:CNVD-2021-13967
db:VULMONid:CVE-2020-15833
db:CNNVDid:CNNVD-202101-2609
db:NVDid:CVE-2020-15833

LAST UPDATE DATE

2024-11-23T22:54:55.550000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-13967date:2021-03-03T00:00:00
db:VULMONid:CVE-2020-15833date:2021-02-04T00:00:00
db:CNNVDid:CNNVD-202101-2609date:2021-02-09T00:00:00
db:NVDid:CVE-2020-15833date:2024-11-21T05:06:16.880

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-13967date:2021-03-03T00:00:00
db:VULMONid:CVE-2020-15833date:2021-02-01T00:00:00
db:CNNVDid:CNNVD-202101-2609date:2021-01-31T00:00:00
db:NVDid:CVE-2020-15833date:2021-02-01T02:15:14.987