9.8
CVSSv3

CVE-2020-29127

Published: 30/11/2020 Updated: 03/12/2020
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 891
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists on Fujitsu Eternus Storage DX200 S4 devices through 2020-11-25. After logging into the portal as a root user (using any web browser), the portal can be accessed with root privileges when the URI cgi-bin/csp?cspid={XXXXXXXXXX}&csppage=cgi_PgOverview&csplang=en is visited from a different web browser.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fujitsu eternus_storage_dx200_s4_firmware

Exploits

Fujitsu Eternus Storage DX200 S4 fails to set cookies for authentication allowing for replay of URLs to achieve root level privileges ...

Github Repositories

Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat information, gain a competitive advantage, and stay informed about the latest trends.

CVE Prioritizer Tool CVE_Prioritizer is a powerful tool that helps you prioritize vulnerability patching by combining CVSS, EPSS, and CISA's Known Exploited Vulnerabilities It provides valuable insights into the likelihood of exploitation and the potential impact of vulnerabilities on your information system Why Combine CVSS, EPSS, and CISA's KEV? CVE_Prioritizer le

Risklogyx represents a robust solution that aids in the prioritization of vulnerability patching. It achieves this by amalgamating CVSS, EPSS, and CISA's Known Exploited Vulnerabilities data. This tool delivers invaluable insights into the probability of exploitation and the potential repercussions of vulnerabilities on your information system.

Risklogyx Risklogyx represents a robust solution that aids in the prioritization of vulnerability patching It achieves this by amalgamating CVSS, EPSS, and CISA's Known Exploited Vulnerabilities data This tool delivers invaluable insights into the probability of exploitation and the potential repercussions of vulnerabilities on your information system Installation Clo