Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:pingidentity:pingid_ssh_integration:*:*:*:*:*:*:*:*", "matchCriteriaId": "23E8201B-A95C-4984-BB39-96192DC78A99", "versionEndExcluding": "4.0.14", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Ping Identity PingID SSH before 4.0.14 contains a heap buffer overflow in PingID-enrolled servers. This condition can be potentially exploited into a Remote Code Execution vector on the authenticating endpoint."}, {"lang": "es", "value": "Ping Identity PingID SSH versiones anteriores a 4.0.14, contiene un desbordamiento del b\u00fafer en la regi\u00f3n heap de la memoria en los servidores inscritos en PingID. Esta condici\u00f3n puede ser explotada potencialmente en un vector de Ejecuci\u00f3n de C\u00f3digo Remota en el endpoint de autenticaci\u00f3n."}], "id": "CVE-2020-10654", "lastModified": "2024-11-21T04:55:46.493", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-05-13T13:15:14.110", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://docs.pingidentity.com/bundle/pingid/page/hmc1587998527490.html"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://docs.pingidentity.com/bundle/pingid/page/okt1564020467088.html"}, {"source": "cve@mitre.org", "tags": ["Product"], "url": "https://www.pingidentity.com/"}, {"source": "cve@mitre.org", "tags": ["Product"], "url": "https://www.pingidentity.com/en/cloud/pingid.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://docs.pingidentity.com/bundle/pingid/page/hmc1587998527490.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://docs.pingidentity.com/bundle/pingid/page/okt1564020467088.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"], "url": "https://www.pingidentity.com/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"], "url": "https://www.pingidentity.com/en/cloud/pingid.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-787"}], "source": "nvd@nist.gov", "type": "Primary"}]}