{"dataType":"CVE_RECORD","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-14871","assignerOrgId":"43595867-4340-4103-b7a2-9a5208d29a85","assignerShortName":"oracle","dateUpdated":"2025-10-21T23:35:34.957Z","dateReserved":"2020-06-19T00:00:00.000Z","datePublished":"2020-10-21T14:04:29.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"43595867-4340-4103-b7a2-9a5208d29a85","shortName":"oracle","dateUpdated":"2024-07-03T09:06:08.127Z"},"descriptions":[{"lang":"en","value":"Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. Note: This CVE is not exploitable for Solaris 11.1 and later releases, and ZFSSA 8.7 and later releases, thus the CVSS Base Score is 0.0. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)."}],"affected":[{"vendor":"Oracle Corporation","product":"Solaris Operating System","versions":[{"version":"10","status":"affected"},{"version":"11","status":"affected"}]}],"references":[{"url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"url":"http://packetstormsecurity.com/files/159961/SunSSH-Solaris-10-x86-Remote-Root.html"},{"url":"http://packetstormsecurity.com/files/160510/Solaris-SunSSH-11.0-x86-libpam-Remote-Root.html"},{"url":"http://packetstormsecurity.com/files/160609/Oracle-Solaris-SunSSH-PAM-parse_user_name-Buffer-Overflow.html"},{"name":"[oss-security] 20210302 Announce: OpenSSH 8.5 released","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2021/03/03/1"},{"url":"http://packetstormsecurity.com/files/163232/Solaris-SunSSH-11.0-Remote-Root.html"},{"name":"[oss-security] 20240703 Re: CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2024/07/03/3"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris.  While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in takeover of Oracle Solaris."}]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2020-14871","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-07-17T13:40:20.140887Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2021-11-03","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-14871"}}}],"affected":[{"cpes":["cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"],"vendor":"oracle","product":"solaris","versions":[{"status":"affected","version":"10"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*"],"vendor":"oracle","product":"solaris","versions":[{"status":"affected","version":"11"}],"defaultStatus":"unknown"}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-14871","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write"}]}],"timeline":[{"time":"2021-11-03T00:00:00.000Z","lang":"en","value":"CVE-2020-14871 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:35:34.957Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T13:00:51.576Z"},"title":"CVE Program Container","references":[{"url":"https://www.oracle.com/security-alerts/cpuoct2020.html","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/159961/SunSSH-Solaris-10-x86-Remote-Root.html","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/160510/Solaris-SunSSH-11.0-x86-libpam-Remote-Root.html","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/160609/Oracle-Solaris-SunSSH-PAM-parse_user_name-Buffer-Overflow.html","tags":["x_transferred"]},{"name":"[oss-security] 20210302 Announce: OpenSSH 8.5 released","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2021/03/03/1"},{"url":"http://packetstormsecurity.com/files/163232/Solaris-SunSSH-11.0-Remote-Root.html","tags":["x_transferred"]},{"name":"[oss-security] 20240703 Re: CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/03/3"}]}]},"dataVersion":"5.1"}