{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T20:40:15.712","vulnerabilities":[{"cve":{"id":"CVE-2020-36127","sourceIdentifier":"cve@mitre.org","published":"2021-05-07T11:15:08.140","lastModified":"2024-11-21T05:28:46.113","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by an information disclosure vulnerability. Through the PUK signature functionality, an administrator will not have access to the current p12 certificate and password. When accessing this functionality, the administrator has the option to replace the current certificate and it is not possible to view the certificate password (p12) already deployed on the platform. The replacement p12 certificate returns to users in base64 with its password, which can be accessed by non-administrator users."},{"lang":"es","value":"Pax Technology PAXSTORE versiones v7.0.8_20200511171508 y anteriores, está afectada por una vulnerabilidad de divulgación de información a través de la funcionalidad de firma PUK, un administrador no tendrá acceso al certificado p12 y la contraseña actuales.&#xa0;Al acceder a esta funcionalidad, el administrador tiene la opción de reemplazar el certificado actual y no es posible visualizar la contraseña del certificado (p12) ya implementada en la plataforma.&#xa0;El certificado p12 de reemplazo regresa a los usuarios en base64 con su contraseña, a la que puede ser accedida por usuarios no administradores"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-295"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:paxtechnology:paxstore:*:*:*:*:*:*:*:*","versionEndIncluding":"7.0.8_20200511171508","matchCriteriaId":"4189ECCE-FC22-42FF-B4DF-EB4119EE60D8"}]}]}],"references":[{"url":"https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://marketing.paxtechnology.com/about-pax","source":"cve@mitre.org","tags":["Product"]},{"url":"https://www.whatspos.com/","source":"cve@mitre.org","tags":["Product"]},{"url":"https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://marketing.paxtechnology.com/about-pax","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://www.whatspos.com/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}