Vulnerability Description
An issue was discovered in signotec signoPAD-API/Web (formerly Websocket Pad Server) before 3.1.1 on Windows. It is possible to perform a Denial of Service attack because the implementation doesn't limit the parsing of nested JSON structures. If a victim visits an attacker-controlled website, this vulnerability can be exploited via WebSocket data with a deeply nested JSON array.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Signotec | Signopad-Api\/Web | < 3.1.1 |
| Microsoft | Windows | - |
References
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-053.tExploitThird Party Advisory
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-053.tExploitThird Party Advisory
FAQ
What is CVE-2020-9343?
CVE-2020-9343 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An issue was discovered in signotec signoPAD-API/Web (formerly Websocket Pad Server) before 3.1.1 on Windows. It is possible to perform a Denial of Service attack because the implementation doesn't li...
How severe is CVE-2020-9343?
CVE-2020-9343 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-9343?
Check the references section above for vendor advisories and patch information. Affected products include: Signotec Signopad-Api\/Web, Microsoft Windows.