Show plain JSON{"id": "CVE-2020-7579", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 6.1, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 2.8}]}, "published": "2020-03-10T20:15:22.117", "references": [{"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-938930.pdf", "tags": ["Vendor Advisory"], "source": "productcert@siemens.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}, {"type": "Secondary", "source": "productcert@siemens.com", "description": [{"lang": "en", "value": "CWE-80"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability has been identified in Spectrum Power\u2122 5 (All versions < v5.50 HF02). The web server could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. If deployed according to recommended system configuration, Siemens consideres the environmental vector as CR:L/IR:M/AR:H/MAV:A (4.1)."}, {"lang": "es", "value": "Se ha identificado una vulnerabilidad en Spectrum Power\u2122 5 (Todas las versiones anteriores a v5.50 HF02). El servidor web podr\u00eda permitir ataques de tipo Cross-Site Scripting (XSS) si los usuarios desprevenidos son enga\u00f1ados para acceder a un enlace malicioso. Es requerida una interacci\u00f3n del usuario para una explotaci\u00f3n con \u00e9xito. Si se implement\u00f3 de acuerdo con la configuraci\u00f3n de sistema recomendada, Siemens considera el vector de entorno como CR:L/IR:M/AR:H/MAV:A (4.1)."}], "lastModified": "2020-03-11T18:19:43.447", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:siemens:spectrum_power_5:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "194D3E9F-DBD6-435E-B004-85B99C2556C1", "versionEndIncluding": "5.50"}, {"criteria": "cpe:2.3:a:siemens:spectrum_power_5:5.50:hf01:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9605593-F79F-4B51-BE9F-356CED509E5A"}], "operator": "OR"}]}], "sourceIdentifier": "productcert@siemens.com"}