CVE-2020-35585: Vulnerability Analysis & Exploit Details

Status: Analyzed - Published on 23-12-2020

CVE-2020-35585
Vulnerability Scoring

7.5
/10

Attack Complexity Details

  • Attack Complexity: Low Impact
  • Attack Vector: NETWORK
  • Privileges Required: None
  • Scope: UNCHANGED
  • User Interaction: NONE

CIA Impact Definition

  • Confidentiality: HIGH IMPACT
  • Integrity:
  • Availability:

CVE-2020-35585 Vulnerability Summary

In Solstice Pod before 3.3.0 (or Open4.3), the screen key can be enumerated using brute-force attacks via the /lookin/info Solstice Open Control API because there are only 1.7 million possibilities.

Access Complexity Graph for CVE-2020-35585

Impact Analysis for CVE-2020-35585

CVE-2020-35585: Detailed Information and External References

EPSS

0.00326

EPSS %

0.70746

References

0.00326

CWE

CWE-307

CAPEC

0.00326

  • Dictionary-based Password Attack: An attacker tries each of the words in a dictionary as passwords to gain access to the system via some user's account. If the password chosen by the user was a word within the dictionary, this attack will be successful (in the absence of other mitigations). This is a specific instance of the password brute forcing attack pattern. Dictionary Attacks differ from similar attacks such as Password Spraying (CAPEC-565) and Credential Stuffing (CAPEC-600), since they leverage unknown username/password combinations and don't care about inducing account lockouts.
  • Password Brute Forcing: An adversary tries every possible value for a password until they succeed. A brute force attack, if feasible computationally, will always be successful because it will essentially go through all possible passwords given the alphabet used (lower case letters, upper case letters, numbers, symbols, etc.) and the maximum length of the password.
  • Use of Known Domain Credentials: An adversary guesses or obtains (i.e. steals or purchases) legitimate credentials (e.g. userID/password) to achieve authentication and to perform authorized actions under the guise of an authenticated user or service.
  • Password Spraying: In a Password Spraying attack, an adversary tries a small list (e.g. 3-5) of common or expected passwords, often matching the target's complexity policy, against a known list of user accounts to gain valid credentials. The adversary tries a particular password for each user account, before moving onto the next password in the list. This approach assists the adversary in remaining undetected by avoiding rapid or frequent account lockouts. The adversary may then reattempt the process with additional passwords, once enough time has passed to prevent inducing a lockout.
  • Credential Stuffing: An adversary tries known username/password combinations against different systems, applications, or services to gain additional authenticated access. Credential Stuffing attacks rely upon the fact that many users leverage the same username/password combination for multiple systems, applications, and services.
  • Use of Known Kerberos Credentials: An adversary obtains (i.e. steals or purchases) legitimate Kerberos credentials (e.g. Kerberos service account userID/password or Kerberos Tickets) with the goal of achieving authenticated access to additional systems, applications, or services within the domain.
  • Use of Known Operating System Credentials: An adversary guesses or obtains (i.e. steals or purchases) legitimate operating system credentials (e.g. userID/password) to achieve authentication and to perform authorized actions on the system, under the guise of an authenticated user or service. This applies to any Operating System.

Vulnerable Configurations

  • cpe:2.3:o:mersive:solstice_pod_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:2.6.0:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:2.6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:2.6.2:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:2.6.2:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:2.7.0:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:2.7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:2.7.2:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:2.7.2:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:2.7.3:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:2.7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:2.8.0:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:2.8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:2.8.4:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:2.8.4:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:2.8.7:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:2.8.7:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:2.8.9:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:2.8.9:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:3.0.5:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:3.0.5:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:3.1:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:3.1:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:3.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:3.2.0:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:3.2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:mersive:solstice_pod_firmware:3.2.1:*:*:*:*:*:*:*
    cpe:2.3:o:mersive:solstice_pod_firmware:3.2.1:*:*:*:*:*:*:*
  • cpe:2.3:h:mersive:solstice_pod:-:*:*:*:*:*:*:*
    cpe:2.3:h:mersive:solstice_pod:-:*:*:*:*:*:*:*

CVSS3 Source

nvd@nist.gov

CVSS3 Type

Primary

CVSS3 Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Protect Your Infrastructure: Combat Critical CVE Threats

Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.

Recently Published CVEs