{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T18:30:35.751","vulnerabilities":[{"cve":{"id":"CVE-2020-23036","sourceIdentifier":"cve@mitre.org","published":"2021-10-22T20:15:09.817","lastModified":"2024-11-21T05:13:30.207","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MEDIA NAVI Inc SMACom v1.2 was discovered to contain an insecure session validation vulnerability in the session handling of the `password` authentication parameter of the wifi photo transfer module. This vulnerability allows attackers with network access privileges or on public wifi networks to read the authentication credentials and follow-up requests containing the user password via a man in the middle attack."},{"lang":"es","value":"Se ha detectado que MEDIA NAVI Inc SMACom versión v1.2, contiene una vulnerabilidad de comprobación de sesión no segura en el manejo de la sesión del parámetro de autenticación \"password\" del módulo de transferencia de fotos por wifi. Esta vulnerabilidad permite a atacantes con privilegios de acceso a la red o en redes wifi públicas leer las credenciales de autenticación y las peticiones de seguimiento que contienen la contraseña del usuario por medio de un ataque de tipo man in the middle"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-522"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:medianavi:smacom:1.2:*:*:*:*:iphone_os:*:*","matchCriteriaId":"D95313FA-C8E4-420A-BC56-363FD01D919C"}]}]}],"references":[{"url":"https://cwe.mitre.org/data/definitions/522.html","source":"cve@mitre.org","tags":["Technical Description"]},{"url":"https://www.vulnerability-lab.com/get_content.php?id=2211","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://cwe.mitre.org/data/definitions/522.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Technical Description"]},{"url":"https://www.vulnerability-lab.com/get_content.php?id=2211","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}