Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-8539

EPSS 5.76% · P91
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-8539

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Kia Motors Head Unit with Software version: SOP.003.30.18.0703, SOP.005.7.181019, and SOP.007.1.191209 may allow an attacker to inject unauthorized commands, by executing the micomd executable deamon, to trigger unintended functionalities. In addition, this executable may be used by an attacker to inject commands to generate CAN frames that are sent into the M-CAN bus (Multimedia CAN bus) of the vehicle.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Kia Motors Head Unit 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Kia Motors Head Unit是韩国起亚(Kia)公司的一款汽车的主机。该设备用于车机交互过程。 Kia Motors Head Unit 存在访问控制错误漏洞,该漏洞源于攻击者可利用该漏洞通过执行micomd可执行deamon注入未经授权的命令,以触发意外功能。此外,这个可执行文件可能被攻击者可利用该漏洞用来注入命令来生成发送到车辆的M-CAN总线(多媒体CAN总线)中的CAN帧。以下产品及版本受到影响:SOP.003.30.18.0703, SOP.005.7.181019, and SOP
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-8539

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-8539

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-12-01 · 20 CVEs total

CVE-2020-25181Wecon Technologies WECON Technologies PLC Editor 缓冲区错误漏洞
CVE-2020-9117多款Huawei产品缓冲区错误漏洞
CVE-2020-9114Huawei FusionCompute 权限许可和访问控制问题漏洞
CVE-2020-4128Hcl Technologies Domino 授权问题漏洞
CVE-2020-7545多款Schneider Electric产品安全漏洞
CVE-2020-7546多款 Schneider Electric 产品跨站脚本漏洞
CVE-2020-7547Schneider Electric Power Scada和EcoStruxure Power Monitoring Expert 安全漏洞
CVE-2020-7548多款 Schneider Electric 产品安全特征问题漏洞
CVE-2020-7533多款 Schneider Electric 产品信任管理问题漏洞
CVE-2020-25177Wecon Technologies WECON Technologies PLC Editor 缓冲区错误漏洞
CVE-2019-16958Desk 跨站脚本漏洞
CVE-2020-26762Edimax Technology Ipcam Ic-3116w和Edimax Technology Ipcam Ic-3140w 缓冲区错误漏洞
CVE-2020-28993ATX miniCMTS200a Broadband Gateway 路径遍历漏洞
CVE-2020-28971西部数据 Western Digital My Cloud 授权问题漏洞
CVE-2020-28940Western Digital My Cloud OS devices 授权问题漏洞
CVE-2020-28970Western Digital My Cloud OS 授权问题漏洞
CVE-2020-6880Zxelink Wireless Controller SQL注入漏洞
CVE-2020-11990Apache Cordova 安全漏洞
CVE-2020-29315ThinkAdmin 跨站脚本漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2020-8539

No comments yet


Leave a comment