{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T03:03:23.862","vulnerabilities":[{"cve":{"id":"CVE-2020-12145","sourceIdentifier":"sirt@silver-peak.com","published":"2020-11-05T19:15:12.430","lastModified":"2024-11-21T04:59:21.287","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Silver Peak Unity Orchestrator versions prior to 8.9.11+, 8.10.11+, or 9.0.1+ uses HTTP headers to authenticate REST API calls from localhost. This makes it possible to log in to Orchestrator by introducing an HTTP HOST header set to 127.0.0.1 or localhost. Orchestrator instances that are hosted by customers –on-premise or in a public cloud provider –are affected by this vulnerability."},{"lang":"es","value":"Silver Peak Unity Orchestrator versiones anteriores a 8.9.11+, 8.10.11+, o 9.0.1+ usan encabezados HTTP para autentificar unas llamadas a la API REST desde el host local. Esto hace posible acceder a Orchestrator al introducir un ajuste del encabezado HTTP HOST en la versión 127.0.0.1 o localhost. Unas instancias de Orchestrator que son alojadas por clientes -en sitio o en un proveedor de nube pública- están afectadas por esta vulnerabilidad"}],"metrics":{"cvssMetricV31":[{"source":"sirt@silver-peak.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.7,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"sirt@silver-peak.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:silver-peak:unity_orchestrator:*:*:*:*:*:*:*:*","versionEndExcluding":"8.9.11\\+","matchCriteriaId":"F57E088F-B275-47E0-87E9-D392F5E78CA7"},{"vulnerable":true,"criteria":"cpe:2.3:a:silver-peak:unity_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"8.10","versionEndExcluding":"8.10.11\\+","matchCriteriaId":"06BDDCC0-D63B-4729-9FB7-95B89A54389A"},{"vulnerable":true,"criteria":"cpe:2.3:a:silver-peak:unity_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0","versionEndExcluding":"9.0.1\\+","matchCriteriaId":"5302B8F8-6B84-48F0-BD59-8FF7368AB888"}]}]}],"references":[{"url":"https://www.silver-peak.com/support/user-documentation/security-advisories","source":"sirt@silver-peak.com","tags":["Vendor Advisory"]},{"url":"https://www.silver-peak.com/support/user-documentation/security-advisories","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}