Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:librewireless:ls9_firmware:7040:*:*:*:*:*:*:*", "matchCriteriaId": "FD8392D3-FEA4-4BFA-A35C-2E17F9081F31", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:librewireless:ls9:-:*:*:*:*:*:*:*", "matchCriteriaId": "70E3ECA6-A10C-4234-B879-08AB7342CBAA", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is Unauthenticated Root ADB Access Over TCP. The LS9 web interface provides functionality to access ADB over TCP. This is not enabled by default, but can be enabled by sending a crafted request to a web management interface endpoint. Requests made to this endpoint do not require authentication. As such, any unauthenticated user who is able to access the web interface will be able to gain root privileges on the LS9 module."}, {"lang": "es", "value": "Se detect\u00f3 un problema en los dispositivos Libre Wireless LS9 versi\u00f3n LS1.5/p7040. Se presenta un acceso ADB Root No Autenticado a trav\u00e9s de TCP. La interfaz web LS9 proporciona una funcionalidad para acceder a ADB a trav\u00e9s de TCP. Esto no est\u00e1 habilitado por defecto, pero puede ser habilitado mediante el env\u00edo de una petici\u00f3n dise\u00f1ada a un endpoint de la interfaz de administraci\u00f3n web. Las peticiones realizadas a este endpoint no requieren autenticaci\u00f3n. Como tal, cualquier usuario no autenticado que pueda acceder a la interfaz web podr\u00e1 obtener privilegios de root en el m\u00f3dulo LS9."}], "id": "CVE-2020-35757", "lastModified": "2024-11-21T05:28:01.400", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-05-03T21:15:07.270", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.iot-inspector.com/blog/advisory-multiple-issues-libre-wireless-ls9/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.iot-inspector.com/blog/advisory-multiple-issues-libre-wireless-ls9/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-306"}], "source": "nvd@nist.gov", "type": "Primary"}]}