{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T20:05:39.720","vulnerabilities":[{"cve":{"id":"CVE-2020-5644","sourceIdentifier":"vultures@jpcert.or.jp","published":"2020-11-06T03:15:17.307","lastModified":"2024-11-21T05:34:24.853","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version \"05.65.00.BD\" and earlier, GT1450-QMBDE CoreOS version \"05.65.00.BD\" and earlier, GT1450-QLBDE CoreOS version \"05.65.00.BD\" and earlier, GT1455HS-QTBDE CoreOS version \"05.65.00.BD\" and earlier, and GT1450HS-QMBDE CoreOS version \"05.65.00.BD\" and earlier) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet."},{"lang":"es","value":"Vulnerabilidad de desbordamiento de búfer en la función TCP/IP incluida en el firmware del modelo GT14 de la serie GOT 1000 (GT1455-QTBDE CoreOS versión '05 .65.00.BD' y anteriores, GT1450-QMBDE CoreOS versión '05 .65.00.BD' y anteriores, GT1450-QLBDE CoreOS versión '05 .65.00.BD' y anteriores, GT1455HS-QTBDE CoreOS versión '05 .65.00.BD' y anteriores, y GT1450HS-QMBDE CoreOS versión '05 .65.00.BD' y anteriores), permite a un atacante no autenticado remoto detener las funciones de red de los productos o ejecutar un programa malicioso por medio de un paquete especialmente diseñado"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mitsubishielectric:coreos:*:*:*:*:*:*:*:*","versionEndIncluding":"05.65.00.bd","matchCriteriaId":"44FA010C-360A-4DE4-8F59-C67EA0569B2A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mitsubishielectric:gt1450-qlbde:-:*:*:*:*:*:*:*","matchCriteriaId":"F587B0E6-D2B1-47CC-80FE-8004698E4F71"},{"vulnerable":false,"criteria":"cpe:2.3:h:mitsubishielectric:gt1450-qmbde:-:*:*:*:*:*:*:*","matchCriteriaId":"FF218A1A-4B6D-4510-80A7-CC22B8D027A4"},{"vulnerable":false,"criteria":"cpe:2.3:h:mitsubishielectric:gt1450hs-qmbde:-:*:*:*:*:*:*:*","matchCriteriaId":"FE9E2C66-4742-4D50-A2AC-AE097BEF7CBE"},{"vulnerable":false,"criteria":"cpe:2.3:h:mitsubishielectric:gt1455-qtbde:-:*:*:*:*:*:*:*","matchCriteriaId":"D2726AE6-8870-4FB3-B15C-88AAB26FBB9F"},{"vulnerable":false,"criteria":"cpe:2.3:h:mitsubishielectric:gt1455hs-qtbde:-:*:*:*:*:*:*:*","matchCriteriaId":"3B4C3649-B5DF-4D62-A1EC-4A9DD2CA128A"}]}]}],"references":[{"url":"https://jvn.jp/vu/JVNVU99562395/index.html","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"https://jvn.jp/vu/JVNVU99562395/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}