{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T04:43:23.682","vulnerabilities":[{"cve":{"id":"CVE-2020-12484","sourceIdentifier":"security@vivo.com","published":"2024-12-17T03:15:05.613","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"When using special mode to connect to enterprise wifi, certain options are not properly configured and attackers can pretend to be enterprise wifi through a carefully constructed wifi with the same name, which can lead to man-in-the-middle attacks."},{"lang":"es","value":"Al usar el modo especial para conectarse a una red wifi empresarial, ciertas opciones no están configuradas correctamente y los atacantes pueden hacerse pasar por una red wifi empresarial a través de una red wifi cuidadosamente construida con el mismo nombre, lo que puede conducir a ataques de intermediario."}],"metrics":{"cvssMetricV31":[{"source":"security@vivo.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":5.2}]},"weaknesses":[{"source":"security@vivo.com","type":"Secondary","description":[{"lang":"en","value":"CWE-306"}]}],"references":[{"url":"https://www.vivo.com/en/support/security-advisory-detail?id=3","source":"security@vivo.com"}]}}]}