CVE-2020-6865
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
ZTE SDN controller platform is impacted by an information leakage vulnerability. Due to the program's failure to optimize the response of failure to the request, the caller can directly view the internal error code location of the component. Attackers could exploit this vulnerability to obtain sensitive information. This affects: OSCP versions V16.19.10 and V16.19.20.
La plataforma del controlador SDN de ZTE está afectada por una vulnerabilidad de filtrado de información. Debido al fallo del programa para optimizar la respuesta de fallo a la petición, él que llama puede visualizar directamente la ubicación del código de error interno del componente. Los atacantes podrían explotar esta vulnerabilidad para obtener información confidencial. Esto afecta: OSCP versiones V16.19.10 y V16.19.20.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-01-13 CVE Reserved
- 2020-04-30 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1012782 | 2020-05-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Zte Search vendor "Zte" | Oscp Search vendor "Zte" for product "Oscp" | 16.19.10 Search vendor "Zte" for product "Oscp" and version "16.19.10" | - |
Affected
| ||||||
Zte Search vendor "Zte" | Oscp Search vendor "Zte" for product "Oscp" | 16.19.20 Search vendor "Zte" for product "Oscp" and version "16.19.20" | - |
Affected
|