ID

VAR-202102-0159


CVE

CVE-2020-15835


TITLE

Mofi Network MOFI4500-4GXeLTE certification bypass vulnerability

Trust: 0.6

sources: CNVD: CNVD-2021-13965

DESCRIPTION

An issue was discovered on Mofi Network MOFI4500-4GXeLTE 4.1.5-std devices. The authentication function contains undocumented code that provides the ability to authenticate as root without knowing the actual root password. An adversary with the private key can remotely authenticate to the management interface as root. Mofi Network MOFI4500-4GXeLTE is a wireless router of Mofi Network Company

Trust: 1.53

sources: NVD: CVE-2020-15835 // CNVD: CNVD-2021-13965 // VULMON: CVE-2020-15835

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-13965

AFFECTED PRODUCTS

vendor:mofinetworkmodel:mofi4500-4gxeltescope:eqversion:4.1.5-std

Trust: 1.0

vendor:mofimodel:network mofi4500-4gxelte 4.1.5-stdscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2021-13965 // NVD: CVE-2020-15835

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-15835
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2021-13965
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202101-2611
value: CRITICAL

Trust: 0.6

VULMON: CVE-2020-15835
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-15835
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

CNVD: CNVD-2021-13965
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-15835
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2021-13965 // VULMON: CVE-2020-15835 // CNNVD: CNNVD-202101-2611 // NVD: CVE-2020-15835

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.0

sources: NVD: CVE-2020-15835

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202101-2611

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-202101-2611

PATCH

title:Patch for Mofi Network MOFI4500-4GXeLTE certification bypass vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/250471

Trust: 0.6

title:Mofi Network MOFI4500-4GXeLTE Remediation measures for authorization problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=140642

Trust: 0.6

sources: CNVD: CNVD-2021-13965 // CNNVD: CNNVD-202101-2611

EXTERNAL IDS

db:NVDid:CVE-2020-15835

Trust: 2.3

db:CNVDid:CNVD-2021-13965

Trust: 0.6

db:CNNVDid:CNNVD-202101-2611

Trust: 0.6

db:VULMONid:CVE-2020-15835

Trust: 0.1

sources: CNVD: CNVD-2021-13965 // VULMON: CVE-2020-15835 // CNNVD: CNNVD-202101-2611 // NVD: CVE-2020-15835

REFERENCES

url:https://mofinetwork.com/index.php?main_page=page&id=14

Trust: 1.7

url:https://www.criticalstart.com/critical-vulnerabilities-discovered-in-mofi-routers/

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-15835

Trust: 1.2

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2021-13965 // VULMON: CVE-2020-15835 // CNNVD: CNNVD-202101-2611 // NVD: CVE-2020-15835

SOURCES

db:CNVDid:CNVD-2021-13965
db:VULMONid:CVE-2020-15835
db:CNNVDid:CNNVD-202101-2611
db:NVDid:CVE-2020-15835

LAST UPDATE DATE

2024-11-23T21:34:52.581000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-13965date:2021-03-03T00:00:00
db:VULMONid:CVE-2020-15835date:2021-02-03T00:00:00
db:CNNVDid:CNNVD-202101-2611date:2021-02-09T00:00:00
db:NVDid:CVE-2020-15835date:2024-11-21T05:06:17.167

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-13965date:2021-03-03T00:00:00
db:VULMONid:CVE-2020-15835date:2021-02-01T00:00:00
db:CNNVDid:CNNVD-202101-2611date:2021-01-31T00:00:00
db:NVDid:CVE-2020-15835date:2021-02-01T02:15:15.160