ID

VAR-202104-0019


CVE

CVE-2020-11925


TITLE

Luvion Grand Elite 3 Connect  Vulnerability regarding inadequate protection of credentials in

Trust: 0.8

sources: JVNDB: JVNDB-2020-016463

DESCRIPTION

An issue was discovered in Luvion Grand Elite 3 Connect through 2020-02-25. Authentication to the device is based on a username and password. The root credentials are the same across all devices of this model. Luvion Grand Elite 3 Connect Exists in an inadequate protection of credentials.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. ------------------------------------------ [Vulnerability Type] Incorrect Access Control ------------------------------------------ [Vendor of Product] Luvion ------------------------------------------ [Affected Product Code Base] Luvion Grand Elite 3 Connect - Could not be determined ------------------------------------------ [Affected Component] Underlying linux system. ------------------------------------------ [Attack Type] Remote ------------------------------------------ [Impact Code execution] true ------------------------------------------ [Attack Vectors] Any attacker with network access can exploit this vulnerability. ------------------------------------------ [Discoverer] Willem Westerhof, Jasper Nota, Jim Blankendaal, Martijn Baalman from Qbit in assignment of Consumentenbond. ------------------------------------------ [Reference] N/A Use CVE-2020-11925

Trust: 1.8

sources: NVD: CVE-2020-11925 // JVNDB: JVNDB-2020-016463 // VULMON: CVE-2020-11925 // PACKETSTORM: 179804

AFFECTED PRODUCTS

vendor:luvionmodel:grand elite 3 connectscope:lteversion:2020-02-25

Trust: 1.0

vendor:luvionmodel:grand elite 3 connectscope:lteversion:gr elite 3 connect firmware 2020/02/25 until

Trust: 0.8

vendor:luvionmodel:grand elite 3 connectscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-016463 // NVD: CVE-2020-11925

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-11925
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2020-11925
value: HIGH

Trust: 1.0

NVD: CVE-2020-11925
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202104-097
value: HIGH

Trust: 0.6

VULMON: CVE-2020-11925
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-11925
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2020-11925
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2020-11925
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2020-11925 // JVNDB: JVNDB-2020-016463 // CNNVD: CNNVD-202104-097 // NVD: CVE-2020-11925 // NVD: CVE-2020-11925

PROBLEMTYPE DATA

problemtype:CWE-522

Trust: 1.0

problemtype:CWE-521

Trust: 1.0

problemtype:Inadequate protection of credentials (CWE-522) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-016463 // NVD: CVE-2020-11925

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202104-097

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-097

PATCH

title:Top Pageurl:https://www.luvion.com/

Trust: 0.8

title:Luvion Grand Elite 3 Connect Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=146963

Trust: 0.6

sources: JVNDB: JVNDB-2020-016463 // CNNVD: CNNVD-202104-097

EXTERNAL IDS

db:NVDid:CVE-2020-11925

Trust: 3.5

db:JVNDBid:JVNDB-2020-016463

Trust: 0.8

db:CNNVDid:CNNVD-202104-097

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:VULMONid:CVE-2020-11925

Trust: 0.1

db:PACKETSTORMid:179804

Trust: 0.1

sources: OTHER: None // VULMON: CVE-2020-11925 // JVNDB: JVNDB-2020-016463 // PACKETSTORM: 179804 // CNNVD: CNNVD-202104-097 // NVD: CVE-2020-11925

REFERENCES

url:https://www.eurofins-cybersecurity.com/news/connected-devices-baby-monitor/

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-11925

Trust: 1.5

url:http://seclists.org/fulldisclosure/2024/jul/14

Trust: 1.0

url:https://cwe.mitre.org/data/definitions/522.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2020-11925 // JVNDB: JVNDB-2020-016463 // PACKETSTORM: 179804 // CNNVD: CNNVD-202104-097 // NVD: CVE-2020-11925

CREDITS

Willem Westerhof | Secura

Trust: 0.1

sources: OTHER: None

SOURCES

db:OTHERid: -
db:VULMONid:CVE-2020-11925
db:JVNDBid:JVNDB-2020-016463
db:PACKETSTORMid:179804
db:CNNVDid:CNNVD-202104-097
db:NVDid:CVE-2020-11925

LAST UPDATE DATE

2025-01-30T21:17:30.722000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2020-11925date:2021-04-08T00:00:00
db:JVNDBid:JVNDB-2020-016463date:2021-12-09T02:38:00
db:CNNVDid:CNNVD-202104-097date:2021-04-09T00:00:00
db:NVDid:CVE-2020-11925date:2024-11-21T04:58:55.160

SOURCES RELEASE DATE

db:OTHERid: - date:2024-07-26T13:11:06
db:VULMONid:CVE-2020-11925date:2021-04-02T00:00:00
db:JVNDBid:JVNDB-2020-016463date:2021-12-09T00:00:00
db:PACKETSTORMid:179804date:2024-07-30T12:35:43
db:CNNVDid:CNNVD-202104-097date:2021-04-02T00:00:00
db:NVDid:CVE-2020-11925date:2021-04-02T16:15:13.570