CVE-2020-26155
Severity CVSS v4.0:
Pending analysis
Type:
CWE-427
Uncontrolled Search Path Element
Publication date:
18/03/2021
Last modified:
28/06/2022
Description
Multiple files and folders in Utimaco SecurityServer 4.20.0.4 and 4.31.1.0. are installed with Read/Write permissions for authenticated users, which allows for binaries to be manipulated by non-administrator users. Additionally, entries are made to the PATH environment variable which, in conjunction with these weak permissions, could enable an attacker to perform a DLL hijacking attack.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
4.40
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:utimaco:block-safe_firmware:2.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:utimaco:block-safe_firmware:3.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:utimaco:cryptoserver_cp5_firmware:5.0.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:utimaco:cryptoserver_cp5_firmware:5.1.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:utimaco:cryptoserver_cp5_vs-nfd_firmware:5.1.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:utimaco:paymentserver_firmware:*:*:*:*:*:*:*:* | 3.0 (including) | 4.31.0 (including) |
| cpe:2.3:o:utimaco:paymentserver_hybrid_firmware:*:*:*:*:*:*:*:* | 3.0 (including) | 4.33.0 (including) |
| cpe:2.3:o:utimaco:securityserver_firmware:*:*:*:*:*:*:*:* | 3.0 (including) | 4.31.1 (including) |
| cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



