Vulnerability Description
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to authlog.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microchip | Syncserver S100 Firmware | 2.90.70.3 |
| Microchip | Syncserver S100 | - |
| Microchip | Syncserver S200 Firmware | 1.30 |
| Microchip | Syncserver S200 | - |
| Microchip | Syncserver S250 Firmware | 1.25 |
| Microchip | Syncserver S250 | - |
| Microchip | Syncserver S300 Firmware | 2.65.0 |
| Microchip | Syncserver S300 | - |
| Microchip | Syncserver S350 Firmware | 2.80.1 |
| Microchip | Syncserver S350 | - |
Related Weaknesses (CWE)
References
- https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.htmlExploitThird Party Advisory
- https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.htmlExploitThird Party Advisory
FAQ
What is CVE-2020-9033?
CVE-2020-9033 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to authlog.php.
How severe is CVE-2020-9033?
CVE-2020-9033 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-9033?
Check the references section above for vendor advisories and patch information. Affected products include: Microchip Syncserver S100 Firmware, Microchip Syncserver S100, Microchip Syncserver S200 Firmware, Microchip Syncserver S200, Microchip Syncserver S250 Firmware.