CVE-2020-5847

Critical
|9.8
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to run their own code on an Unraid server, potentially taking full control of the system. It requires the attacker to have network access to the server, making it critical for users to secure their networks.

Technical Description

Unraid through 6.8.0 allows Remote Code Execution.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade FPatched in 2191 days

Quick Information

Published

Mar 16, 2020

about 6 years ago

Last Modified

Mar 17, 2026

22 days ago

Vendor

unraid

Product

unraid