{"api_version":"1","generated_at":"2026-04-23T09:36:55+00:00","cve":"CVE-2020-6865","urls":{"html":"https://cve.report/CVE-2020-6865","api":"https://cve.report/api/cve/CVE-2020-6865.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-6865","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-6865"},"summary":{"title":"CVE-2020-6865","description":"ZTE SDN controller platform is impacted by an information leakage vulnerability. Due to the program's failure to optimize the response of failure to the request, the caller can directly view the internal error code location of the component. Attackers could exploit this vulnerability to obtain sensitive information. This affects: OSCP versions V16.19.10 and V16.19.20.","state":"PUBLIC","assigner":"psirt@zte.com.cn","published_at":"2020-04-30 22:15:00","updated_at":"2020-05-05 21:12:00"},"problem_types":["CWE-200"],"metrics":[],"references":[{"url":"http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1012782","name":"http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1012782","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"Security Bulletin Details","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-6865","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6865","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"6865","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zte","cpe5":"oscp","cpe6":"16.19.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"6865","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zte","cpe5":"oscp","cpe6":"16.19.20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"6865","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zte","cpe5":"oscp","cpe6":"16.19.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"6865","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zte","cpe5":"oscp","cpe6":"16.19.20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-6865","ASSIGNER":"psirt@zte.com.cn","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"OSCP","version":{"version_data":[{"version_value":"V16.19.10"},{"version_value":"V16.19.20"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"information leakage"}]}]},"references":{"reference_data":[{"refsource":"CONFIRM","name":"http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1012782","url":"http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1012782"}]},"description":{"description_data":[{"lang":"eng","value":"ZTE SDN controller platform is impacted by an information leakage vulnerability. Due to the program's failure to optimize the response of failure to the request, the caller can directly view the internal error code location of the component. Attackers could exploit this vulnerability to obtain sensitive information. This affects: OSCP versions V16.19.10 and V16.19.20."}]}},"nvd":{"publishedDate":"2020-04-30 22:15:00","lastModifiedDate":"2020-05-05 21:12:00","problem_types":["CWE-200"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zte:oscp:16.19.20:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zte:oscp:16.19.10:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"6865","Ordinal":"167136","Title":"CVE-2020-6865","CVE":"CVE-2020-6865","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"6865","Ordinal":"1","NoteData":"ZTE SDN controller platform is impacted by an information leakage vulnerability. Due to the program's failure to optimize the response of failure to the request, the caller can directly view the internal error code location of the component. Attackers could exploit this vulnerability to obtain sensitive information. This affects: OSCP versions V16.19.10 and V16.19.20.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"6865","Ordinal":"2","NoteData":"2020-04-30","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"6865","Ordinal":"3","NoteData":"2020-04-30","Type":"Other","Title":"Modified"}]}}}