{"vulnerability": "CVE-2020-1537", "sightings": [{"uuid": "4244d202-f703-4a11-9035-239025d40590", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15375", "type": "seen", "source": "https://t.me/cibsecurity/20581", "content": "\u203c CVE-2020-15375 \u203c\n\nBrocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. The vulnerability could allow a local authenticated user to run arbitrary commands and perform escalation of privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:45:55.000000Z"}, {"uuid": "95812085-fbc3-4934-b995-07e942fdb185", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1537", "type": "seen", "source": "https://t.me/cKure/1938", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 Microsoft issues emergency out-of-band security updates for Windows 8.1, RT 8.1, and Server 2012 R2 systems to patch two recently disclosed privilege escalation bugs (CVE-2020-1530 &amp; CVE-2020-1537) affecting Remote Access Service (RAS).", "creation_timestamp": "2020-08-21T06:26:24.000000Z"}, {"uuid": "688b144b-6b38-43ba-8cbb-6dfeccda8132", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15376", "type": "seen", "source": "https://t.me/cibsecurity/20565", "content": "\u203c CVE-2020-15376 \u203c\n\nBrocade Fabric OS versions before v9.0.0 and after version v8.1.0, configured in Virtual Fabric mode contain a weakness in the ldap implementation that could allow a remote ldap user to login in the Brocade Fibre Channel SAN switch with \"user\" privileges if it is not associated with any groups.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:36:06.000000Z"}, {"uuid": "d0538109-ba17-4104-ae33-403fe94f84c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15376", "type": "seen", "source": "https://t.me/cibsecurity/20585", "content": "\u203c CVE-2020-15376 \u203c\n\nBrocade Fabric OS versions before v9.0.0 and after version v8.1.0, configured in Virtual Fabric mode contain a weakness in the ldap implementation that could allow a remote ldap user to login in the Brocade Fibre Channel SAN switch with \"user\" privileges if it is not associated with any groups.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:46:01.000000Z"}, {"uuid": "d0525763-098f-4a3c-bc59-64c8fbff64f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15376", "type": "seen", "source": "https://t.me/cibsecurity/20644", "content": "\u203c CVE-2020-15376 \u203c\n\nBrocade Fabric OS versions before v9.0.0 and after version v8.1.0, configured in Virtual Fabric mode contain a weakness in the ldap implementation that could allow a remote ldap user to login in the Brocade Fibre Channel SAN switch with \"user\" privileges if it is not associated with any groups.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T02:25:32.000000Z"}, {"uuid": "7e3d7e19-5326-4bdd-806a-e9e71926d11a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15375", "type": "seen", "source": "https://t.me/cibsecurity/20640", "content": "\u203c CVE-2020-15375 \u203c\n\nBrocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. The vulnerability could allow a local authenticated user to run arbitrary commands and perform escalation of privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T02:25:25.000000Z"}, {"uuid": "6d495fad-e1c0-46b7-8a3a-528b9e20047e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15376", "type": "seen", "source": "https://t.me/cibsecurity/20624", "content": "\u203c CVE-2020-15376 \u203c\n\nBrocade Fabric OS versions before v9.0.0 and after version v8.1.0, configured in Virtual Fabric mode contain a weakness in the ldap implementation that could allow a remote ldap user to login in the Brocade Fibre Channel SAN switch with \"user\" privileges if it is not associated with any groups.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:25:23.000000Z"}, {"uuid": "5b4e9c48-950a-4be3-acd6-a446bbe43ae7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15375", "type": "seen", "source": "https://t.me/cibsecurity/20620", "content": "\u203c CVE-2020-15375 \u203c\n\nBrocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. The vulnerability could allow a local authenticated user to run arbitrary commands and perform escalation of privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:25:19.000000Z"}, {"uuid": "9c32ff5f-3fd2-401a-81e4-11de319ec262", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15376", "type": "seen", "source": "https://t.me/cibsecurity/20604", "content": "\u203c CVE-2020-15376 \u203c\n\nBrocade Fabric OS versions before v9.0.0 and after version v8.1.0, configured in Virtual Fabric mode contain a weakness in the ldap implementation that could allow a remote ldap user to login in the Brocade Fibre Channel SAN switch with \"user\" privileges if it is not associated with any groups.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:05:15.000000Z"}, {"uuid": "60ac8910-9cdd-43ff-9918-9c6de6900ea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15375", "type": "seen", "source": "https://t.me/cibsecurity/20600", "content": "\u203c CVE-2020-15375 \u203c\n\nBrocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. The vulnerability could allow a local authenticated user to run arbitrary commands and perform escalation of privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:05:11.000000Z"}, {"uuid": "8957734e-1764-48f2-a692-74a7b60310a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15375", "type": "seen", "source": "https://t.me/cibsecurity/20561", "content": "\u203c CVE-2020-15375 \u203c\n\nBrocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. The vulnerability could allow a local authenticated user to run arbitrary commands and perform escalation of privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:36:03.000000Z"}, {"uuid": "8b6986e2-704c-458a-865e-42c0aba4a49a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1537", "type": "seen", "source": "https://t.me/thehackernews/811", "content": "Microsoft issues emergency out-of-band security updates for Windows 8.1, RT 8.1, and Server 2012 R2 systems to patch two recently disclosed privilege escalation bugs (CVE-2020-1530 &amp; CVE-2020-1537) affecting Remote Access Service (RAS).\n\nRead: https://thehackernews.com/2020/08/windows-update-download.html", "creation_timestamp": "2020-08-20T19:09:08.000000Z"}, {"uuid": "e16c89e5-cdbf-48ef-ab90-9bf5d089d73f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15378", "type": "published-proof-of-concept", "source": "Telegram/jacPAuFOh5WgYTva-pnTAHF6LOLp_0Vofs5_9AWufWf9aA8", "content": "", "creation_timestamp": "2021-06-09T20:36:38.000000Z"}]}