Vulnerabilities > CVE-2020-12133 - Deserialization of Untrusted Data vulnerability in Farukawa Electric Consciousmap

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
farukawa
CWE-502
critical

Summary

The Apros Evolution, ConsciusMap, and Furukawa provisioning systems through 2.8.1 allow remote code execution because of javax.faces.ViewState Java deserialization.

Common Weakness Enumeration (CWE)

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/157383/ZSL-2020-5565.txt
idPACKETSTORM:157383
last seen2020-04-25
published2020-04-24
reporterLiquidWorm
sourcehttps://packetstormsecurity.com/files/157383/Furukawa-Electric-ConsciusMAP-2.8.1-Java-Deserialization-Remote-Code-Execution.html
titleFurukawa Electric ConsciusMAP 2.8.1 Java Deserialization Remote Code Execution

Statements

contributorSergio Roberto Scarpin
lastmodified2020-05-22
organizationFurukawa Electric
statementThe vulnerability CVE-2020-12133 has been fixed at version 2.8.5.4 released May,18th 2020. Customers are advised to update to the latest version, or contact your integrator’s Technical Support if needed.