CVE-2020-27985
 
Severity Score
7.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Security Onion v2 prior to 2.3.10 has an incorrect sudo configuration, which allows the administrative user to obtain root access without using the sudo password by editing and executing /home/<user>/SecurityOnion/setup/so-setup.
Security Onion versiones v2 anteriores a 2.3.10, presenta una configuraciĆ³n de sudo incorrecta, que permite al usuario administrador obtener acceso de root sin utilizar la contraseƱa de sudo editando y ejecutando /home/(user)/ SecurityOnion/setup/so-setup
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2020-10-28 CVE Reserved
- 2020-11-23 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-306: Missing Authentication for Critical Function
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/Security-Onion-Solutions/securityonion/releases | Release Notes |
URL | Date | SRC |
---|---|---|
https://s1gh.sh/cve-2020-27985-security-onion-local-privilege-escalation | 2024-08-04 |
URL | Date | SRC |
---|---|---|
https://github.com/Security-Onion-Solutions/securityonion/commit/b14670030349a2747a00ace665568ab5f51ac47b | 2021-07-21 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Securityonionsolutions Search vendor "Securityonionsolutions" | Security Onion Search vendor "Securityonionsolutions" for product "Security Onion" | >= 2.0.0 < 2.3.10 Search vendor "Securityonionsolutions" for product "Security Onion" and version " >= 2.0.0 < 2.3.10" | - |
Affected
|