{"api_version":"1","generated_at":"2026-05-06T14:43:15+00:00","cve":"CVE-2020-17388","urls":{"html":"https://cve.report/CVE-2020-17388","api":"https://cve.report/api/cve/CVE-2020-17388.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-17388","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-17388"},"summary":{"title":"CVE-2020-17388","description":"This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Tomcat configuration file. The issue results from the lack of proper restriction to the Tomcat admin console. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10799.","state":"PUBLIC","assigner":"zdi-disclosures@trendmicro.com","published_at":"2020-08-25 21:15:00","updated_at":"2020-08-28 17:20:00"},"problem_types":["CWE-749"],"metrics":[],"references":[{"url":"https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf","name":"https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf","refsource":"MISC","tags":["Vendor Advisory"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-20-975/","name":"https://www.zerodayinitiative.com/advisories/ZDI-20-975/","refsource":"MISC","tags":["Third Party Advisory","VDB Entry"],"title":"ZDI-20-975 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-17388","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-17388","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"17388","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"marvell","cpe5":"qconvergeconsole","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"17388","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"marvell","cpe5":"qconvergeconsole","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"zdi-disclosures@trendmicro.com","ID":"CVE-2020-17388","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"QConvergeConsole","version":{"version_data":[{"version_value":"5.5.0.64"}]}}]},"vendor_name":"Marvell"}]}},"credit":"Sivathmican Sivakumaran of Trend Micro Zero Day Initiative","data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Tomcat configuration file. The issue results from the lack of proper restriction to the Tomcat admin console. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10799."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-749: Exposed Dangerous Method or Function"}]}]},"references":{"reference_data":[{"url":"https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf","refsource":"MISC","name":"https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-20-975/","refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-20-975/"}]},"impact":{"cvss":{"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.0"}}},"nvd":{"publishedDate":"2020-08-25 21:15:00","lastModifiedDate":"2020-08-28 17:20:00","problem_types":["CWE-749"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9},"severity":"HIGH","exploitabilityScore":8,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:marvell:qconvergeconsole:*:*:*:*:*:*:*:*","versionEndExcluding":"5.5.00.73","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"17388","Ordinal":"178797","Title":"CVE-2020-17388","CVE":"CVE-2020-17388","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"17388","Ordinal":"1","NoteData":"This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Tomcat configuration file. The issue results from the lack of proper restriction to the Tomcat admin console. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10799.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"17388","Ordinal":"2","NoteData":"2020-08-25","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"17388","Ordinal":"3","NoteData":"2020-08-25","Type":"Other","Title":"Modified"}]}}}