Vulnerability Description
Emmanuel MyDomoAtHome (MDAH) REST API REST API Domoticz ISS Gateway 0.2.40 is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this, via a specially crafted request to gain access to sensitive information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Domoticz | Mydomoathome | 0.240 |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/47824ExploitThird Party AdvisoryVDB Entry
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.phpExploitThird Party Advisory
- https://www.exploit-db.com/exploits/47824ExploitThird Party AdvisoryVDB Entry
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.phpExploitThird Party Advisory
FAQ
What is CVE-2020-21990?
CVE-2020-21990 is a vulnerability with a CVSS score of 7.5 (HIGH). Emmanuel MyDomoAtHome (MDAH) REST API REST API Domoticz ISS Gateway 0.2.40 is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote ...
How severe is CVE-2020-21990?
CVE-2020-21990 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-21990?
Check the references section above for vendor advisories and patch information. Affected products include: Domoticz Mydomoathome.