Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-3933

Summary
Assigner-twcert
Assigner Org ID-cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e
Published At-11 Feb, 2020 | 08:00
Updated At-17 Sep, 2024 | 03:23
Rejected At-
Credits

TAIWAN SECOM CO., LTD. - User Account Enumeration

TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, allows attackers to enumerate and exam user account in the system.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:twcert
Assigner Org ID:cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e
Published At:11 Feb, 2020 | 08:00
Updated At:17 Sep, 2024 | 03:23
Rejected At:
▼CVE Numbering Authority (CNA)
TAIWAN SECOM CO., LTD. - User Account Enumeration

TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, allows attackers to enumerate and exam user account in the system.

Affected Products
Vendor
TAIWAN SECOM CO., LTD.
Product
Door Access Control system
Versions
Affected
  • From 0 through 3.3.2 (custom)
Vendor
TAIWAN SECOM CO., LTD.
Product
Personnel Attendance system
Versions
Affected
  • From 0 through 3.3.0.3_20160517 (custom)
Problem Types
TypeCWE IDDescription
textN/AUser Account Enumeration
Type: text
CWE ID: N/A
Description: User Account Enumeration
Metrics
VersionBase scoreBase severityVector
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Update to: Door Access Control system ver. 3.5.4 Personnel Attendance system prior to ver. 3.4.0.0.3.05_20191112

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.twcert.org.tw/en/cp-139-3317-d4edc-2.html
x_refsource_MISC
https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bac
x_refsource_MISC
https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760b
x_refsource_MISC
Hyperlink: https://www.twcert.org.tw/en/cp-139-3317-d4edc-2.html
Resource:
x_refsource_MISC
Hyperlink: https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bac
Resource:
x_refsource_MISC
Hyperlink: https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760b
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.twcert.org.tw/en/cp-139-3317-d4edc-2.html
x_refsource_MISC
x_transferred
https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bac
x_refsource_MISC
x_transferred
https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760b
x_refsource_MISC
x_transferred
Hyperlink: https://www.twcert.org.tw/en/cp-139-3317-d4edc-2.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bac
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760b
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:twcert@cert.org.tw
Published At:11 Feb, 2020 | 12:15
Updated At:01 Jan, 2022 | 19:58

TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, allows attackers to enumerate and exam user account in the system.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Secondary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

secom
secom
>>dr.id_access_control>>Versions before 3.3.2(exclusive)
cpe:2.3:a:secom:dr.id_access_control:*:*:*:*:*:*:*:*
secom
secom
>>dr.id_attendance_system>>Versions before 3.3.0.3_20160517(exclusive)
cpe:2.3:a:secom:dr.id_attendance_system:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760btwcert@cert.org.tw
Third Party Advisory
https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bactwcert@cert.org.tw
Third Party Advisory
https://www.twcert.org.tw/en/cp-139-3317-d4edc-2.htmltwcert@cert.org.tw
Third Party Advisory
Hyperlink: https://gist.github.com/chtsecurity/4db471b34c3959e5ab9ec31570e4760b
Source: twcert@cert.org.tw
Resource:
Third Party Advisory
Hyperlink: https://www.chtsecurity.com/news/1bb85fcd-9048-4587-b4d3-b18335572bac
Source: twcert@cert.org.tw
Resource:
Third Party Advisory
Hyperlink: https://www.twcert.org.tw/en/cp-139-3317-d4edc-2.html
Source: twcert@cert.org.tw
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

2Records found

CVE-2021-35962
Matching Score-8
Assigner-TWCERT/CC
ShareView Details
Matching Score-8
Assigner-TWCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.51% / 65.34%
||
7 Day CHG~0.00%
Published-16 Jul, 2021 | 15:20
Updated-16 Sep, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TAIWAN SECOM CO., LTD., Door Access Control and Personnel Attendance Management system - Path Traversal

Specific page parameters in Dr. ID Door Access Control and Personnel Attendance Management system does not filter special characters. Remote attackers can apply Path Traversal means to download credential files from the system without permission.

Action-Not Available
Vendor-secomTAIWAN SECOM CO., LTD.,
Product-personnel_attendance_systemdoor_access_controlDoor Access Control and Personnel Attendance Management system
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-3935
Matching Score-8
Assigner-TWCERT/CC
ShareView Details
Matching Score-8
Assigner-TWCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.22% / 44.36%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 08:00
Updated-16 Sep, 2024 | 22:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TAIWAN SECOM CO., LTD. – Sensitivity Information Exposure

TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, stores users’ information by cleartext in the cookie, which divulges password to attackers.

Action-Not Available
Vendor-secomTAIWAN SECOM CO., LTD.
Product-dr.id_access_controldr.id_attendance_systemDoor Access Control systemPersonnel Attendance system
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
Details not found