{"vulnerability": "CVE-2020-1579", "sightings": [{"uuid": "3535429b-544f-4fb3-aa37-3dfe0e2ff8d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15799", "type": "seen", "source": "https://t.me/cibsecurity/22054", "content": "\u203c CVE-2020-15799 \u203c\n\nA vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions). The vulnerability could allow an unauthenticated attacker to reboot the device over the network by using special urls from integrated web server of the affected products.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-13T00:47:14.000000Z"}, {"uuid": "7d5b3824-9247-4b4c-9e20-4f6df7237b0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15796", "type": "seen", "source": "https://t.me/cibsecurity/20780", "content": "\u203c CVE-2020-15796 \u203c\n\nA vulnerability has been identified in SIMATIC ET 200SP Open Controller (incl. SIPLUS variants) (V20.8), SIMATIC S7-1500 Software Controller (V20.8). The web server of the affected products contains a vulnerability that could allow a remote attacker to trigger a denial-of-service condition by sending a specially crafted HTTP request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-15T00:39:24.000000Z"}, {"uuid": "d99b3539-2d4a-4e5b-8ceb-ae7c2b2551b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15797", "type": "seen", "source": "https://t.me/VulnerabilityNews/17591", "content": "A vulnerability has been identified in DCA Vantage Analyzer (All versions &lt; V4.5 are affected by CVE-2020-7590. In addition, serial numbers &lt; 40000 running software V4.4.0 are also affected by CVE-2020-15797). Improper Access Control could allow an unauthenticated attacker to escape from the restricted environment (\u00e2\u20ac&oelig;kiosk mode\u00e2\u20ac\ufffd) and access the underlying operating system. Successful exploitation requires direct physical access to the system.\nPublished at: October 13, 2020 at 06:15PM\nView on website", "creation_timestamp": "2020-10-13T20:46:13.000000Z"}]}