CVE-2020-14248
MEDIUM
5,3
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none
MEDIUM
5,0
Source: [email protected]
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: partial
Integrity: none
Availability: none
Description
AI Translation Available
BigFix Inventory up to v10.0.2 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0013
Percentile
0,3th
Updated
EPSS Score Trend (Last 90 Days)
319
Cleartext Transmission of Sensitive Information
DraftCommon Consequences
Security Scopes Affected:
Integrity
Confidentiality
Potential Impacts:
Read Application Data
Modify Files Or Directories
Other
Applicable Platforms
Technologies:
Cloud Computing, ICS/OT, Mobile, Not Technology-Specific, System on Chip, Test/Debug Hardware
Application
Bigfix Platform by Hcltech
Version Range Affected
From
9.0.0
(inclusive)
To
10.0.2
(inclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:hcltech:bigfix_platform:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0085735
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0085735