CRITICAL · 9.8

CVE-2020-6760

Schmid ZI 620 V400 VPN 090 routers allow an attacker to execute OS commands as root via shell metacharacters to an entry on the SSH subcommand menu, as demonstrated by ping.

Vulnerability Description

Schmid ZI 620 V400 VPN 090 routers allow an attacker to execute OS commands as root via shell metacharacters to an entry on the SSH subcommand menu, as demonstrated by ping.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
Schmid-TelecomZi 620 V400 Firmware090
Schmid-TelecomZi 620 V400-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-6760?

CVE-2020-6760 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Schmid ZI 620 V400 VPN 090 routers allow an attacker to execute OS commands as root via shell metacharacters to an entry on the SSH subcommand menu, as demonstrated by ping.

How severe is CVE-2020-6760?

CVE-2020-6760 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2020-6760?

Check the references section above for vendor advisories and patch information. Affected products include: Schmid-Telecom Zi 620 V400 Firmware, Schmid-Telecom Zi 620 V400.