The following versions of MAXPRO VMS and NVR, MAXPRO VMS:HNMSWVMS prior to Version VMS560 Build 595 T2-Patch, HNMSWVMSLT prior to Version VMS560 Build 595 T2-Patch, MAXPRO NVR: MAXPRO NVR XE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR SE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR PE prior to Version NVR 5.6 Build 595 T2-Patch, and MPNVRSWXX prior to Version NVR 5.6 Build 595 T2-Patch are vulnerable to an unsafe deserialization of untrusted data. An attacker may be able to remotely modify deserialized data without authentication using a specially crafted web request, resulting in remote code execution.
References
Link | Resource |
---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-021-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Information
Published : 2020-01-22 07:15
Updated : 2020-02-05 13:49
NVD link : CVE-2020-6959
Mitre link : CVE-2020-6959
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
honeywell
- maxpro_nvr_pe_firmware
- mpnvrswxx_firmware
- hnmswvms_firmware
- maxpro_nvr_xe
- maxpro_nvr_se_firmware
- maxpro_nvr_xe_firmware
- hnmswvmslt
- maxpro_nvr_pe
- hnmswvmslt_firmware
- hnmswvms
- maxpro_nvr_se
- mpnvrswxx