- Synchronized data.

This commit is contained in:
CVE Team 2018-10-08 11:05:45 -04:00
parent b4f1cd945b
commit 8939bc3947
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
19 changed files with 1062 additions and 608 deletions

View File

@ -1 +1,70 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-10-05T22:22:07.607365", "DATE_REQUESTED": "2018-09-27T19:54:51", "ID": "CVE-2018-1000803", "REQUESTER": "cezar97@protonmail.com" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Gitea", "version": { "version_data": [ { "version_value": "prior to version 1.5.1" } ] } } ] }, "vendor_name": "Gitea" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Gitea version prior to version 1.5.1 contains a CWE-200 vulnerability that can result in Exposure of users private email addresses. This attack appear to be exploitable via Watch a repository to receive email notifications. Emails received contain the other recipients even if they have the email set as private. This vulnerability appears to have been fixed in 1.5.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "url": "https://github.com/go-gitea/gitea/pull/4664" }, { "url": "https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57" } ] } }
{
"CVE_data_meta" : {
"ASSIGNER" : "kurt@seifried.org",
"DATE_ASSIGNED" : "2018-10-05T22:22:07.607365",
"DATE_REQUESTED" : "2018-09-27T19:54:51",
"ID" : "CVE-2018-1000803",
"REQUESTER" : "cezar97@protonmail.com",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Gitea",
"version" : {
"version_data" : [
{
"version_value" : "prior to version 1.5.1"
}
]
}
}
]
},
"vendor_name" : "Gitea"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Gitea version prior to version 1.5.1 contains a CWE-200 vulnerability that can result in Exposure of users private email addresses. This attack appear to be exploitable via Watch a repository to receive email notifications. Emails received contain the other recipients even if they have the email set as private. This vulnerability appears to have been fixed in 1.5.1."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "CWE-200"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://github.com/go-gitea/gitea/pull/4664",
"refsource" : "CONFIRM",
"url" : "https://github.com/go-gitea/gitea/pull/4664"
},
{
"name" : "https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57",
"refsource" : "CONFIRM",
"url" : "https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57"
}
]
}
}

View File

@ -1 +1,70 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-10-05T22:22:07.609207", "DATE_REQUESTED": "2018-09-07T13:28:01", "ID": "CVE-2018-1000804", "REQUESTER": "cve.reporting@gmail.com" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "contiki-ng", "version": { "version_data": [ { "version_value": "4" } ] } } ] }, "vendor_name": "contiki-ng" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "contiki-ng version 4 contains a Buffer Overflow vulnerability in AQL (Antelope Query Language) database engine that can result in Attacker can perform Remote Code Execution on device using Contiki-NG operating system. This attack appear to be exploitable via Attacker must be able to run malicious AQL code (e.g. via SQL-like Injection attack)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "url": "https://github.com/contiki-ng/contiki-ng/issues/594" }, { "url": "https://github.com/contiki-ng/contiki-ng/pull/624" } ] } }
{
"CVE_data_meta" : {
"ASSIGNER" : "kurt@seifried.org",
"DATE_ASSIGNED" : "2018-10-05T22:22:07.609207",
"DATE_REQUESTED" : "2018-09-07T13:28:01",
"ID" : "CVE-2018-1000804",
"REQUESTER" : "cve.reporting@gmail.com",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "contiki-ng",
"version" : {
"version_data" : [
{
"version_value" : "4"
}
]
}
}
]
},
"vendor_name" : "contiki-ng"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "contiki-ng version 4 contains a Buffer Overflow vulnerability in AQL (Antelope Query Language) database engine that can result in Attacker can perform Remote Code Execution on device using Contiki-NG operating system. This attack appear to be exploitable via Attacker must be able to run malicious AQL code (e.g. via SQL-like Injection attack)."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Buffer Overflow"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://github.com/contiki-ng/contiki-ng/issues/594",
"refsource" : "CONFIRM",
"url" : "https://github.com/contiki-ng/contiki-ng/issues/594"
},
{
"name" : "https://github.com/contiki-ng/contiki-ng/pull/624",
"refsource" : "CONFIRM",
"url" : "https://github.com/contiki-ng/contiki-ng/pull/624"
}
]
}
}

View File

@ -1 +1,65 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-10-05T22:22:07.610251", "DATE_REQUESTED": "2018-09-10T10:57:20", "ID": "CVE-2018-1000805", "REQUESTER": "responsible-disclosure@usd.de" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Paramiko", "version": { "version_data": [ { "version_value": "2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6" } ] } } ] }, "vendor_name": "Paramiko" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Access Control" } ] } ] }, "references": { "reference_data": [ { "url": "https://github.com/paramiko/paramiko/issues/1283" } ] } }
{
"CVE_data_meta" : {
"ASSIGNER" : "kurt@seifried.org",
"DATE_ASSIGNED" : "2018-10-05T22:22:07.610251",
"DATE_REQUESTED" : "2018-09-10T10:57:20",
"ID" : "CVE-2018-1000805",
"REQUESTER" : "responsible-disclosure@usd.de",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Paramiko",
"version" : {
"version_data" : [
{
"version_value" : "2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6"
}
]
}
}
]
},
"vendor_name" : "Paramiko"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Incorrect Access Control"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://github.com/paramiko/paramiko/issues/1283",
"refsource" : "CONFIRM",
"url" : "https://github.com/paramiko/paramiko/issues/1283"
}
]
}
}

View File

@ -15,4 +15,4 @@
}
]
}
}
}

View File

@ -1 +1,65 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-10-05T22:22:07.611739", "DATE_REQUESTED": "2018-09-20T17:00:49", "ID": "CVE-2018-1000807", "REQUESTER": "secure@veritas.com" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pyopenssl", "version": { "version_data": [ { "version_value": "prior to version 17.5.0" } ] } } ] }, "vendor_name": "Python Cryptographic Authority " } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-416: Use After Free vulnerability in X509 object handling that can result in Use after free can lead to possible denial of service or remote code execution.. This attack appear to be exploitable via Depends on the calling application and if it retains a reference to the memory.. This vulnerability appears to have been fixed in 17.5.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416: Use After Free" } ] } ] }, "references": { "reference_data": [ { "url": "https://github.com/pyca/pyopenssl/pull/723" } ] } }
{
"CVE_data_meta" : {
"ASSIGNER" : "kurt@seifried.org",
"DATE_ASSIGNED" : "2018-10-05T22:22:07.611739",
"DATE_REQUESTED" : "2018-09-20T17:00:49",
"ID" : "CVE-2018-1000807",
"REQUESTER" : "secure@veritas.com",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "pyopenssl",
"version" : {
"version_data" : [
{
"version_value" : "prior to version 17.5.0"
}
]
}
}
]
},
"vendor_name" : "Python Cryptographic Authority "
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-416: Use After Free vulnerability in X509 object handling that can result in Use after free can lead to possible denial of service or remote code execution.. This attack appear to be exploitable via Depends on the calling application and if it retains a reference to the memory.. This vulnerability appears to have been fixed in 17.5.0."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "CWE-416: Use After Free"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://github.com/pyca/pyopenssl/pull/723",
"refsource" : "CONFIRM",
"url" : "https://github.com/pyca/pyopenssl/pull/723"
}
]
}
}

View File

@ -1 +1,65 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-10-05T22:22:07.612676", "DATE_REQUESTED": "2018-09-20T17:05:57", "ID": "CVE-2018-1000808", "REQUESTER": "secure@veritas.com" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pyopenssl", "version": { "version_data": [ { "version_value": "Before 17.5.0" } ] } } ] }, "vendor_name": "Python Cryptographic Authority " } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to Release Memory Before Removing Last Reference vulnerability in PKCS #12 Store that can result in Denial of service if memory runs low or is exhausted. This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection. Anything that would cause the calling application to reload certificates from a PKCS #12 store.. This vulnerability appears to have been fixed in 17.5.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE - 401 : Failure to Release Memory Before Removing Last Reference" } ] } ] }, "references": { "reference_data": [ { "url": "https://github.com/pyca/pyopenssl/pull/723" } ] } }
{
"CVE_data_meta" : {
"ASSIGNER" : "kurt@seifried.org",
"DATE_ASSIGNED" : "2018-10-05T22:22:07.612676",
"DATE_REQUESTED" : "2018-09-20T17:05:57",
"ID" : "CVE-2018-1000808",
"REQUESTER" : "secure@veritas.com",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "pyopenssl",
"version" : {
"version_data" : [
{
"version_value" : "Before 17.5.0"
}
]
}
}
]
},
"vendor_name" : "Python Cryptographic Authority "
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to Release Memory Before Removing Last Reference vulnerability in PKCS #12 Store that can result in Denial of service if memory runs low or is exhausted. This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection. Anything that would cause the calling application to reload certificates from a PKCS #12 store.. This vulnerability appears to have been fixed in 17.5.0."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "CWE - 401 : Failure to Release Memory Before Removing Last Reference"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://github.com/pyca/pyopenssl/pull/723",
"refsource" : "CONFIRM",
"url" : "https://github.com/pyca/pyopenssl/pull/723"
}
]
}
}

View File

@ -1 +1,70 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-10-05T22:22:07.613372", "DATE_REQUESTED": "2018-09-07T14:08:33", "ID": "CVE-2018-1000809", "REQUESTER": "security@hr.nl" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "privacyIDEA", "version": { "version_data": [ { "version_value": "2.23.1 and earlier" } ] } } ] }, "vendor_name": "privacyIDEA" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "privacyIDEA version 2.23.1 and earlier contains a Improper Input Validation vulnerability in token validation api that can result in Denial-of-Service. This attack appear to be exploitable via http request with user=<space>&pass= to /validate/check url. This vulnerability appears to have been fixed in 2.23.2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "url": "https://github.com/privacyidea/privacyidea/issues/1227" }, { "url": "https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751" } ] } }
{
"CVE_data_meta" : {
"ASSIGNER" : "kurt@seifried.org",
"DATE_ASSIGNED" : "2018-10-05T22:22:07.613372",
"DATE_REQUESTED" : "2018-09-07T14:08:33",
"ID" : "CVE-2018-1000809",
"REQUESTER" : "security@hr.nl",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "privacyIDEA",
"version" : {
"version_data" : [
{
"version_value" : "2.23.1 and earlier"
}
]
}
}
]
},
"vendor_name" : "privacyIDEA"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "privacyIDEA version 2.23.1 and earlier contains a Improper Input Validation vulnerability in token validation api that can result in Denial-of-Service. This attack appear to be exploitable via http request with user=<space>&pass= to /validate/check url. This vulnerability appears to have been fixed in 2.23.2."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper Input Validation"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751",
"refsource" : "CONFIRM",
"url" : "https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751"
},
{
"name" : "https://github.com/privacyidea/privacyidea/issues/1227",
"refsource" : "CONFIRM",
"url" : "https://github.com/privacyidea/privacyidea/issues/1227"
}
]
}
}

View File

@ -1 +1,70 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-10-05T22:22:07.614036", "DATE_REQUESTED": "2018-09-21T20:41:05", "ID": "CVE-2018-1000810", "REQUESTER": "steve@steveklabnik.com" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Standard Library", "version": { "version_data": [ { "version_value": "1.29.0, 1.28.0, 1.27.2, 1.27.1, 127.0, 126.2, 126.1, 126.0" } ] } } ] }, "vendor_name": "The Rust Programming Language" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Rust Programming Language Standard Library version 1.29.0, 1.28.0, 1.27.2, 1.27.1, 127.0, 126.2, 126.1, 126.0 contains a CWE-680: Integer Overflow to Buffer Overflow vulnerability in standard library that can result in buffer overflow. This attack appear to be exploitable via str::repeat, passed a large number, can overflow an internal buffer. This vulnerability appears to have been fixed in 1.29.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-680: Integer Overflow to Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "url": "https://groups.google.com/forum/#!topic/rustlang-security-announcements/CmSuTm-SaU0" }, { "url": "https://blog.rust-lang.org/2018/09/21/Security-advisory-for-std.html" } ] } }
{
"CVE_data_meta" : {
"ASSIGNER" : "kurt@seifried.org",
"DATE_ASSIGNED" : "2018-10-05T22:22:07.614036",
"DATE_REQUESTED" : "2018-09-21T20:41:05",
"ID" : "CVE-2018-1000810",
"REQUESTER" : "steve@steveklabnik.com",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Standard Library",
"version" : {
"version_data" : [
{
"version_value" : "1.29.0, 1.28.0, 1.27.2, 1.27.1, 127.0, 126.2, 126.1, 126.0"
}
]
}
}
]
},
"vendor_name" : "The Rust Programming Language"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The Rust Programming Language Standard Library version 1.29.0, 1.28.0, 1.27.2, 1.27.1, 127.0, 126.2, 126.1, 126.0 contains a CWE-680: Integer Overflow to Buffer Overflow vulnerability in standard library that can result in buffer overflow. This attack appear to be exploitable via str::repeat, passed a large number, can overflow an internal buffer. This vulnerability appears to have been fixed in 1.29.1."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "CWE-680: Integer Overflow to Buffer Overflow"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://blog.rust-lang.org/2018/09/21/Security-advisory-for-std.html",
"refsource" : "CONFIRM",
"url" : "https://blog.rust-lang.org/2018/09/21/Security-advisory-for-std.html"
},
{
"name" : "https://groups.google.com/forum/#!topic/rustlang-security-announcements/CmSuTm-SaU0",
"refsource" : "CONFIRM",
"url" : "https://groups.google.com/forum/#!topic/rustlang-security-announcements/CmSuTm-SaU0"
}
]
}
}

View File

@ -1,17 +1,10 @@
{
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Obtain Information",
"lang" : "eng"
}
]
}
]
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-10-04T00:00:00",
"ID" : "CVE-2018-1723",
"STATE" : "PUBLIC"
},
"data_format" : "MITRE",
"affects" : {
"vendor" : {
"vendor_data" : [
@ -19,6 +12,7 @@
"product" : {
"product_data" : [
{
"product_name" : "Spectrum Scale",
"version" : {
"version_data" : [
{
@ -40,8 +34,7 @@
"version_value" : "4.1.1.20"
}
]
},
"product_name" : "Spectrum Scale"
}
}
]
},
@ -50,19 +43,29 @@
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM Spectrum Scale 4.1.1.0, 4.1.1.20, 4.2.0.0, 4.2.3.10, 5.0.0 and 5.0.1.2 could allow an unprivileged, authenticated user with access to a GPFS node to read arbitrary files available on this node. IBM X-Force ID: 147373."
}
]
},
"impact" : {
"cvssv3" : {
"BM" : {
"A" : "N",
"PR" : "N",
"I" : "N",
"S" : "U",
"AV" : "L",
"UI" : "N",
"SCORE" : "6.200",
"AC" : "L",
"C" : "H"
"AV" : "L",
"C" : "H",
"I" : "N",
"PR" : "N",
"S" : "U",
"SCORE" : "6.200",
"UI" : "N"
},
"TM" : {
"E" : "U",
@ -71,33 +74,28 @@
}
}
},
"description" : {
"description_data" : [
"problemtype" : {
"problemtype_data" : [
{
"value" : "IBM Spectrum Scale 4.1.1.0, 4.1.1.20, 4.2.0.0, 4.2.3.10, 5.0.0 and 5.0.1.2 could allow an unprivileged, authenticated user with access to a GPFS node to read arbitrary files available on this node. IBM X-Force ID: 147373.",
"lang" : "eng"
"description" : [
{
"lang" : "eng",
"value" : "Obtain Information"
}
]
}
]
},
"CVE_data_meta" : {
"ID" : "CVE-2018-1723",
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-10-04T00:00:00",
"STATE" : "PUBLIC"
},
"data_version" : "4.0",
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"name" : "https://www.ibm.com/support/docview.wss?uid=ibm10732713",
"title" : "IBM Security Bulletin 732713 (Spectrum Scale)",
"refsource" : "CONFIRM",
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10732713"
},
{
"title" : "X-Force Vulnerability Report",
"name" : "ibm-spectrum-cve20181723-info-disc(147373)",
"refsource" : "XF",
"name" : "ibm-spectrum-cve20181723-info-disc (147373)",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/147373"
}
]

View File

@ -1,18 +1,10 @@
{
"data_type" : "CVE",
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Denial of Service"
}
]
}
]
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-10-04T00:00:00",
"ID" : "CVE-2018-1741",
"STATE" : "PUBLIC"
},
"data_format" : "MITRE",
"affects" : {
"vendor" : {
"vendor_data" : [
@ -20,6 +12,7 @@
"product" : {
"product_data" : [
{
"product_name" : "Security Key Lifecycle Manager",
"version" : {
"version_data" : [
{
@ -32,8 +25,7 @@
"version_value" : "3.0"
}
]
},
"product_name" : "Security Key Lifecycle Manager"
}
}
]
},
@ -42,19 +34,14 @@
]
}
},
"references" : {
"reference_data" : [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"title" : "IBM Security Bulletin 733425 (Security Key Lifecycle Manager)",
"refsource" : "CONFIRM",
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10733425",
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10733425"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148420",
"name" : "ibm-tivoli-cve20181741-dos (148420)",
"refsource" : "XF",
"title" : "X-Force Vulnerability Report"
"lang" : "eng",
"value" : "IBM Tivoli Key Lifecycle Manager 2.6, 2.7, and 3.0 does not properly limit the number or frequency of interaction which could be used to cause a denial of service, compromise program logic or other consequences. IBM X-Force ID: 148420."
}
]
},
@ -62,35 +49,46 @@
"cvssv3" : {
"BM" : {
"A" : "L",
"PR" : "N",
"I" : "L",
"S" : "U",
"AV" : "N",
"UI" : "N",
"SCORE" : "6.500",
"AC" : "L",
"C" : "N"
"AV" : "N",
"C" : "N",
"I" : "L",
"PR" : "N",
"S" : "U",
"SCORE" : "6.500",
"UI" : "N"
},
"TM" : {
"RL" : "O",
"E" : "U",
"RC" : "C",
"E" : "U"
"RL" : "O"
}
}
},
"description" : {
"description_data" : [
"problemtype" : {
"problemtype_data" : [
{
"value" : "IBM Tivoli Key Lifecycle Manager 2.6, 2.7, and 3.0 does not properly limit the number or frequency of interaction which could be used to cause a denial of service, compromise program logic or other consequences. IBM X-Force ID: 148420.",
"lang" : "eng"
"description" : [
{
"lang" : "eng",
"value" : "Denial of Service"
}
]
}
]
},
"data_version" : "4.0",
"CVE_data_meta" : {
"DATE_PUBLIC" : "2018-10-04T00:00:00",
"STATE" : "PUBLIC",
"ID" : "CVE-2018-1741",
"ASSIGNER" : "psirt@us.ibm.com"
"references" : {
"reference_data" : [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10733425",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10733425"
},
{
"name" : "ibm-tivoli-cve20181741-dos(148420)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148420"
}
]
}
}

View File

@ -1,12 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-10-05T00:00:00",
"ID" : "CVE-2018-1742",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "IBM",
"product" : {
"product_data" : [
{
"product_name" : "Security Key Lifecycle Manager",
"version" : {
"version_data" : [
{
@ -19,15 +25,46 @@
"version_value" : "3.0"
}
]
},
"product_name" : "Security Key Lifecycle Manager"
}
}
]
}
},
"vendor_name" : "IBM"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM Tivoli Key Lifecycle Manager 2.6, 2.7, and 3.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 148421."
}
]
},
"impact" : {
"cvssv3" : {
"BM" : {
"A" : "N",
"AC" : "H",
"AV" : "L",
"C" : "H",
"I" : "N",
"PR" : "N",
"S" : "C",
"SCORE" : "5.900",
"UI" : "N"
},
"TM" : {
"E" : "U",
"RC" : "C",
"RL" : "O"
}
}
},
"problemtype" : {
"problemtype_data" : [
{
@ -40,55 +77,16 @@
}
]
},
"data_format" : "MITRE",
"data_type" : "CVE",
"CVE_data_meta" : {
"ID" : "CVE-2018-1742",
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-10-05T00:00:00",
"STATE" : "PUBLIC"
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM Tivoli Key Lifecycle Manager 2.6, 2.7, and 3.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 148421."
}
]
},
"data_version" : "4.0",
"impact" : {
"cvssv3" : {
"BM" : {
"SCORE" : "5.900",
"UI" : "N",
"AV" : "L",
"S" : "C",
"I" : "N",
"PR" : "N",
"A" : "N",
"C" : "H",
"AC" : "H"
},
"TM" : {
"E" : "U",
"RC" : "C",
"RL" : "O"
}
}
},
"references" : {
"reference_data" : [
{
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10733419",
"title" : "IBM Security Bulletin 733419 (Security Key Lifecycle Manager)",
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10733419",
"refsource" : "CONFIRM",
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10733419"
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10733419"
},
{
"name" : "ibm-tivoli-cve20181742-info-disc(148421)",
"refsource" : "XF",
"name" : "ibm-tivoli-cve20181742-info-disc (148421)",
"title" : "X-Force Vulnerability Report",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148421"
}
]

View File

@ -1,4 +1,10 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-10-04T00:00:00",
"ID" : "CVE-2018-1743",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
@ -28,68 +34,60 @@
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM Tivoli Key Lifecycle Manager 2.6, 2.7, and 3.0 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 148422."
}
]
},
"impact" : {
"cvssv3" : {
"BM" : {
"A" : "N",
"AC" : "L",
"AV" : "N",
"C" : "L",
"I" : "N",
"PR" : "N",
"S" : "U",
"SCORE" : "5.300",
"UI" : "N"
},
"TM" : {
"E" : "U",
"RC" : "C",
"RL" : "O"
}
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Obtain Information",
"lang" : "eng"
"lang" : "eng",
"value" : "Obtain Information"
}
]
}
]
},
"data_format" : "MITRE",
"data_type" : "CVE",
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"ID" : "CVE-2018-1743",
"STATE" : "PUBLIC",
"DATE_PUBLIC" : "2018-10-04T00:00:00"
},
"description" : {
"description_data" : [
{
"value" : "IBM Tivoli Key Lifecycle Manager 2.6, 2.7, and 3.0 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 148422.",
"lang" : "eng"
}
]
},
"data_version" : "4.0",
"impact" : {
"cvssv3" : {
"TM" : {
"E" : "U",
"RL" : "O",
"RC" : "C"
},
"BM" : {
"C" : "L",
"AC" : "L",
"S" : "U",
"AV" : "N",
"A" : "N",
"PR" : "N",
"I" : "N",
"UI" : "N",
"SCORE" : "5.300"
}
}
},
"references" : {
"reference_data" : [
{
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10733351",
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10733351",
"refsource" : "CONFIRM",
"title" : "IBM Security Bulletin 733351 (Security Key Lifecycle Manager)"
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10733351"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148422",
"name" : "ibm-tivoli-cve20181743-info-disc (148422)",
"name" : "ibm-tivoli-cve20181743-info-disc(148422)",
"refsource" : "XF",
"title" : "X-Force Vulnerability Report"
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148422"
}
]
}

View File

@ -1,22 +1,14 @@
{
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Bypass Security"
}
]
}
]
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-10-04T00:00:00",
"ID" : "CVE-2018-1749",
"STATE" : "PUBLIC"
},
"data_format" : "MITRE",
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "IBM",
"product" : {
"product_data" : [
{
@ -36,60 +28,66 @@
}
}
]
}
},
"vendor_name" : "IBM"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"impact" : {
"cvssv3" : {
"TM" : {
"RL" : "O",
"RC" : "C",
"E" : "U"
},
"BM" : {
"I" : "L",
"PR" : "L",
"A" : "N",
"AV" : "N",
"S" : "U",
"SCORE" : "4.300",
"UI" : "N",
"AC" : "L",
"C" : "N"
}
}
},
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM Tivoli Key Lifecycle Manager 2.6, 2.7, and 3.0 uses incomplete blacklisting for input validation which allows attackers to bypass application controls resulting in direct impact to the system and data integrity. IBM X-Force ID: 148484."
"value" : "IBM Tivoli Key Lifecycle Manager 2.6, 2.7, and 3.0 uses incomplete blacklisting for input validation which allows attackers to bypass application controls resulting in direct impact to the system and data integrity. IBM X-Force ID: 148484."
}
]
},
"data_version" : "4.0",
"CVE_data_meta" : {
"STATE" : "PUBLIC",
"DATE_PUBLIC" : "2018-10-04T00:00:00",
"ASSIGNER" : "psirt@us.ibm.com",
"ID" : "CVE-2018-1749"
"impact" : {
"cvssv3" : {
"BM" : {
"A" : "N",
"AC" : "L",
"AV" : "N",
"C" : "N",
"I" : "L",
"PR" : "L",
"S" : "U",
"SCORE" : "4.300",
"UI" : "N"
},
"TM" : {
"E" : "U",
"RC" : "C",
"RL" : "O"
}
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Bypass Security"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"title" : "IBM Security Bulletin 733303 (Security Key Lifecycle Manager)",
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10733303",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10733303"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148484",
"title" : "X-Force Vulnerability Report",
"name" : "ibm-tivoli-cve20181749-sec-bypass(148484)",
"refsource" : "XF",
"name" : "ibm-tivoli-cve20181749-sec-bypass (148484)"
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148484"
}
]
}

View File

@ -1,4 +1,10 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-10-04T00:00:00",
"ID" : "CVE-2018-1750",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
@ -22,68 +28,60 @@
]
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Gain Access",
"lang" : "eng"
}
]
}
]
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"value" : "IBM Security Key Lifecycle Manager 3.0 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 148511.",
"lang" : "eng"
"lang" : "eng",
"value" : "IBM Security Key Lifecycle Manager 3.0 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 148511."
}
]
},
"CVE_data_meta" : {
"DATE_PUBLIC" : "2018-10-04T00:00:00",
"STATE" : "PUBLIC",
"ID" : "CVE-2018-1750",
"ASSIGNER" : "psirt@us.ibm.com"
},
"impact" : {
"cvssv3" : {
"TM" : {
"RL" : "O",
"RC" : "C",
"E" : "U"
},
"BM" : {
"UI" : "N",
"SCORE" : "4.200",
"S" : "U",
"AV" : "N",
"A" : "N",
"PR" : "L",
"I" : "L",
"AC" : "H",
"AV" : "N",
"C" : "L",
"AC" : "H"
"I" : "L",
"PR" : "L",
"S" : "U",
"SCORE" : "4.200",
"UI" : "N"
},
"TM" : {
"E" : "U",
"RC" : "C",
"RL" : "O"
}
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Gain Access"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10733311",
"title" : "IBM Security Bulletin 733311 (Security Key Lifecycle Manager)",
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10733311",
"refsource" : "CONFIRM"
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10733311"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148511",
"title" : "X-Force Vulnerability Report",
"name" : "ibm-tivoli-cve20181750-incorrect-perms (148511)",
"refsource" : "XF"
"name" : "ibm-tivoli-cve20181750-incorrect-perms(148511)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148511"
}
]
}

View File

@ -1,76 +1,18 @@
{
"impact" : {
"cvssv3" : {
"TM" : {
"RL" : "O",
"RC" : "C",
"E" : "U"
},
"BM" : {
"UI" : "N",
"SCORE" : "4.300",
"A" : "N",
"PR" : "L",
"I" : "N",
"S" : "U",
"AV" : "N",
"AC" : "L",
"C" : "L"
}
}
},
"description" : {
"description_data" : [
{
"value" : "IBM Tivoli Key Lifecycle Manager 2.6, 2.7, and 3.0 generates an error message that includes sensitive information about its environment, users, or associated data. IBM X-Force ID: 148514.",
"lang" : "eng"
}
]
},
"data_version" : "4.0",
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-10-04T00:00:00",
"ID" : "CVE-2018-1753",
"STATE" : "PUBLIC",
"DATE_PUBLIC" : "2018-10-04T00:00:00"
"STATE" : "PUBLIC"
},
"references" : {
"reference_data" : [
{
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10733359",
"refsource" : "CONFIRM",
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10733359",
"title" : "IBM Security Bulletin 733359 (Security Key Lifecycle Manager)"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148514",
"refsource" : "XF",
"name" : "ibm-tivoli-cve20181753-info-disc (148514)",
"title" : "X-Force Vulnerability Report"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Obtain Information",
"lang" : "eng"
}
]
}
]
},
"data_format" : "MITRE",
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "IBM",
"product" : {
"product_data" : [
{
"product_name" : "Security Key Lifecycle Manager",
"version" : {
"version_data" : [
{
@ -83,14 +25,70 @@
"version_value" : "3.0"
}
]
},
"product_name" : "Security Key Lifecycle Manager"
}
}
]
}
},
"vendor_name" : "IBM"
}
]
}
},
"data_type" : "CVE"
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM Tivoli Key Lifecycle Manager 2.6, 2.7, and 3.0 generates an error message that includes sensitive information about its environment, users, or associated data. IBM X-Force ID: 148514."
}
]
},
"impact" : {
"cvssv3" : {
"BM" : {
"A" : "N",
"AC" : "L",
"AV" : "N",
"C" : "L",
"I" : "N",
"PR" : "L",
"S" : "U",
"SCORE" : "4.300",
"UI" : "N"
},
"TM" : {
"E" : "U",
"RC" : "C",
"RL" : "O"
}
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Obtain Information"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10733359",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10733359"
},
{
"name" : "ibm-tivoli-cve20181753-info-disc(148514)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148514"
}
]
}
}

View File

@ -1,117 +1,117 @@
{
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"DATE_PUBLIC": "2018-10-01T04:00:00.000Z",
"ID": "CVE-2018-5399",
"STATE": "PUBLIC",
"TITLE": "The Auto-Maskin DCU 210E firmware contains an undocumented Dropbear SSH server, v2015.55, configured to listen on Port 22 while the DCU is running and is configured with a hard-coded credentials"
"CVE_data_meta" : {
"ASSIGNER" : "cert@cert.org",
"DATE_PUBLIC" : "2018-10-01T04:00:00.000Z",
"ID" : "CVE-2018-5399",
"STATE" : "PUBLIC",
"TITLE" : "The Auto-Maskin DCU 210E firmware contains an undocumented Dropbear SSH server, v2015.55, configured to listen on Port 22 while the DCU is running and is configured with a hard-coded credentials"
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "DCU-210E ",
"version": {
"version_data": [
"product_name" : "DCU-210E ",
"version" : {
"version_data" : [
{
"affected": "<",
"platform": "ARMv7",
"version_name": "3.7",
"version_value": "3.7"
"affected" : "<",
"platform" : "ARMv7",
"version_name" : "3.7",
"version_value" : "3.7"
}
]
}
},
{
"product_name": "RP-210E",
"version": {
"version_data": [
"product_name" : "RP-210E",
"version" : {
"version_data" : [
{
"affected": "<",
"platform": "ARMv7",
"version_name": "3.7",
"version_value": "3.7"
"affected" : "<",
"platform" : "ARMv7",
"version_name" : "3.7",
"version_value" : "3.7"
}
]
}
}
]
},
"vendor_name": "Auto-Maskin"
"vendor_name" : "Auto-Maskin"
}
]
}
},
"credit": [
"credit" : [
{
"lang": "eng",
"value": "Reporters: Brian Satira, Brian Olson, Organization: Project Gunsway"
"lang" : "eng",
"value" : "Reporters: Brian Satira, Brian Olson, Organization: Project Gunsway"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "The Auto-Maskin DCU 210E firmware contains an undocumented Dropbear SSH server, v2015.55, configured to listen on Port 22 while the DCU is running. The Dropbear server is configured with a hard-coded user name and password combination of root / amroot. The server is configured to use password only authentication not cryptographic keys, however the firmware image contains an RSA host-key for the server. An attacker can exploit this vulnerability to gain root access to the Angstrom Linux operating system and modify any binaries or configuration files in the firmware.\nAffected releases are Auto-Maskin DCU-210E RP-210E:\nVersions prior to 3.7 on ARMv7."
"lang" : "eng",
"value" : "The Auto-Maskin DCU 210E firmware contains an undocumented Dropbear SSH server, v2015.55, configured to listen on Port 22 while the DCU is running. The Dropbear server is configured with a hard-coded user name and password combination of root / amroot. The server is configured to use password only authentication not cryptographic keys, however the firmware image contains an RSA host-key for the server. An attacker can exploit this vulnerability to gain root access to the Angstrom Linux operating system and modify any binaries or configuration files in the firmware. Affected releases are Auto-Maskin DCU-210E RP-210E: Versions prior to 3.7 on ARMv7."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.0"
"impact" : {
"cvss" : {
"attackComplexity" : "LOW",
"attackVector" : "NETWORK",
"availabilityImpact" : "HIGH",
"baseScore" : 9.4,
"baseSeverity" : "CRITICAL",
"confidentialityImpact" : "LOW",
"integrityImpact" : "HIGH",
"privilegesRequired" : "NONE",
"scope" : "UNCHANGED",
"userInteraction" : "NONE",
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version" : "3.0"
}
},
"problemtype": {
"problemtype_data": [
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "CWE-798: Use of Hard-coded Credentials"
"lang" : "eng",
"value" : "CWE-798: Use of Hard-coded Credentials"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"name": "VU#176301",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/176301"
"name" : "VU#176301",
"refsource" : "CERT-VN",
"url" : "https://www.kb.cert.org/vuls/id/176301"
}
]
},
"solution": [
"solution" : [
{
"lang": "eng",
"value": "End-users should log-in via the SSH server and remove it as a service, or change the hard-coded password to SP 800-63B standards."
"lang" : "eng",
"value" : "End-users should log-in via the SSH server and remove it as a service, or change the hard-coded password to SP 800-63B standards."
}
],
"source": {
"discovery": "EXTERNAL"
"source" : {
"discovery" : "EXTERNAL"
},
"work_around": [
"work_around" : [
{
"lang": "eng",
"value": "End-users should log-in via the SSH server and remove it as a service, or change the hard-coded password to SP 800-63B standards.\n"
"lang" : "eng",
"value" : "End-users should log-in via the SSH server and remove it as a service, or change the hard-coded password to SP 800-63B standards.\n"
}
]
}
}

View File

@ -1,123 +1,123 @@
{
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"DATE_PUBLIC": "2018-10-01T04:00:00.000Z",
"ID": "CVE-2018-5400",
"STATE": "PUBLIC",
"TITLE": "The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App utilize an undocumented custom protocol to set up Modbus communications with other devices without validating those devices, resulting in an origin validation error"
"CVE_data_meta" : {
"ASSIGNER" : "cert@cert.org",
"DATE_PUBLIC" : "2018-10-01T04:00:00.000Z",
"ID" : "CVE-2018-5400",
"STATE" : "PUBLIC",
"TITLE" : "The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App utilize an undocumented custom protocol to set up Modbus communications with other devices without validating those devices, resulting in an origin validation error"
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "DCU-210E ",
"version": {
"version_data": [
"product_name" : "DCU-210E ",
"version" : {
"version_data" : [
{
"affected": "<",
"platform": "ARMv7",
"version_name": "3.7",
"version_value": "3.7"
"affected" : "<",
"platform" : "ARMv7",
"version_name" : "3.7",
"version_value" : "3.7"
}
]
}
},
{
"product_name": "RP-210E",
"version": {
"version_data": [
"product_name" : "RP-210E",
"version" : {
"version_data" : [
{
"affected": "<",
"platform": "ARMv7",
"version_name": "3.7",
"version_value": "3.7"
"affected" : "<",
"platform" : "ARMv7",
"version_name" : "3.7",
"version_value" : "3.7"
}
]
}
},
{
"product_name": "Marine Pro Observer Android App",
"version": {
"version_data": [
"product_name" : "Marine Pro Observer Android App",
"version" : {
"version_data" : [
{
"affected": "?",
"platform": "android",
"version_value": "0.1"
"affected" : "?",
"platform" : "android",
"version_value" : "0.1"
}
]
}
}
]
},
"vendor_name": "Auto-Maskin"
"vendor_name" : "Auto-Maskin"
}
]
}
},
"credit": [
"credit" : [
{
"lang": "eng",
"value": "Reporters: Brian Satira, Brian Olson, Organization: Project Gunsway"
"lang" : "eng",
"value" : "Reporters: Brian Satira, Brian Olson, Organization: Project Gunsway"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "The Auto-Maskin products utilize an undocumented custom protocol to set up Modbus communications with other devices without validating those devices. The originating device sends a message in plaintext, 48:65:6c:6c:6f:20:57:6f:72:6c:64, “Hello World” over UDP ports 44444-44446 to the broadcast address for the LAN. Without verification devices respond to any of these broadcast messages on the LAN with a plaintext reply over UDP containing the device model and firmware version. Following this exchange the devices allow Modbus transmissions between the two devices on the standard Modbus port 502 TCP.\nImpact: An attacker can exploit this vulnerability to send arbitrary messages to any DCU or RP device through spoofing or replay attacks as long as they have access to the network.\n\nAffected releases are Auto-Maskin DCU-210E RP-210E:\nVersions prior to 3.7 on ARMv7."
"lang" : "eng",
"value" : "The Auto-Maskin products utilize an undocumented custom protocol to set up Modbus communications with other devices without validating those devices. The originating device sends a message in plaintext, 48:65:6c:6c:6f:20:57:6f:72:6c:64, \"Hello World\" over UDP ports 44444-44446 to the broadcast address for the LAN. Without verification devices respond to any of these broadcast messages on the LAN with a plaintext reply over UDP containing the device model and firmware version. Following this exchange the devices allow Modbus transmissions between the two devices on the standard Modbus port 502 TCP. Impact: An attacker can exploit this vulnerability to send arbitrary messages to any DCU or RP device through spoofing or replay attacks as long as they have access to the network. Affected releases are Auto-Maskin DCU-210E RP-210E: Versions prior to 3.7 on ARMv7."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
"impact" : {
"cvss" : {
"attackComplexity" : "LOW",
"attackVector" : "NETWORK",
"availabilityImpact" : "NONE",
"baseScore" : 9.1,
"baseSeverity" : "CRITICAL",
"confidentialityImpact" : "HIGH",
"integrityImpact" : "HIGH",
"privilegesRequired" : "NONE",
"scope" : "UNCHANGED",
"userInteraction" : "NONE",
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version" : "3.0"
}
},
"problemtype": {
"problemtype_data": [
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "CWE-346: Origin Validation Error"
"lang" : "eng",
"value" : "CWE-346: Origin Validation Error"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"name": "VU#176301",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/176301"
"name" : "VU#176301",
"refsource" : "CERT-VN",
"url" : "https://www.kb.cert.org/vuls/id/176301"
}
]
},
"solution": [
"solution" : [
{
"lang": "eng",
"value": "The devices should implement Modbus TCP Security Protocol (v21, 2018) per Modbus specifications over port 802 TCP, for Modbus TCP with encryption and authentication. \n"
"lang" : "eng",
"value" : "The devices should implement Modbus TCP Security Protocol (v21, 2018) per Modbus specifications over port 802 TCP, for Modbus TCP with encryption and authentication. \n"
}
],
"source": {
"discovery": "EXTERNAL"
"source" : {
"discovery" : "EXTERNAL"
}
}
}

View File

@ -1,123 +1,123 @@
{
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"DATE_PUBLIC": "2018-10-01T04:00:00.000Z",
"ID": "CVE-2018-5401",
"STATE": "PUBLIC",
"TITLE": "The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App transmit sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors"
"CVE_data_meta" : {
"ASSIGNER" : "cert@cert.org",
"DATE_PUBLIC" : "2018-10-01T04:00:00.000Z",
"ID" : "CVE-2018-5401",
"STATE" : "PUBLIC",
"TITLE" : "The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App transmit sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors"
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "DCU-210E ",
"version": {
"version_data": [
"product_name" : "DCU-210E ",
"version" : {
"version_data" : [
{
"affected": "<",
"platform": "ARMv7",
"version_name": "3.7",
"version_value": "3.7"
"affected" : "<",
"platform" : "ARMv7",
"version_name" : "3.7",
"version_value" : "3.7"
}
]
}
},
{
"product_name": "RP-210E",
"version": {
"version_data": [
"product_name" : "RP-210E",
"version" : {
"version_data" : [
{
"affected": "<",
"platform": "ARMv7",
"version_name": "3.7",
"version_value": "3.7"
"affected" : "<",
"platform" : "ARMv7",
"version_name" : "3.7",
"version_value" : "3.7"
}
]
}
},
{
"product_name": "Marine Pro Observer Android App",
"version": {
"version_data": [
"product_name" : "Marine Pro Observer Android App",
"version" : {
"version_data" : [
{
"affected": "?",
"platform": "android",
"version_value": "0.1"
"affected" : "?",
"platform" : "android",
"version_value" : "0.1"
}
]
}
}
]
},
"vendor_name": "Auto-Maskin"
"vendor_name" : "Auto-Maskin"
}
]
}
},
"credit": [
"credit" : [
{
"lang": "eng",
"value": "Reporters: Brian Satira, Brian Olson, Organization: Project Gunsway"
"lang" : "eng",
"value" : "Reporters: Brian Satira, Brian Olson, Organization: Project Gunsway"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App transmit sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. The devices transmit process control information via unencrypted Modbus communications.\nImpact: An attacker can exploit this vulnerability to observe information about configurations, settings, what sensors are present and in use, and other information to aid in crafting spoofed messages. Requires access to the network.\n\n\nAffected releases are Auto-Maskin DCU-210E, RP-210E, and Marine Pro Observer Android App. \nVersions prior to 3.7 on ARMv7."
"lang" : "eng",
"value" : "The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App transmit sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. The devices transmit process control information via unencrypted Modbus communications. Impact: An attacker can exploit this vulnerability to observe information about configurations, settings, what sensors are present and in use, and other information to aid in crafting spoofed messages. Requires access to the network. Affected releases are Auto-Maskin DCU-210E, RP-210E, and Marine Pro Observer Android App. Versions prior to 3.7 on ARMv7."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
"impact" : {
"cvss" : {
"attackComplexity" : "LOW",
"attackVector" : "NETWORK",
"availabilityImpact" : "NONE",
"baseScore" : 9.1,
"baseSeverity" : "CRITICAL",
"confidentialityImpact" : "HIGH",
"integrityImpact" : "HIGH",
"privilegesRequired" : "NONE",
"scope" : "UNCHANGED",
"userInteraction" : "NONE",
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version" : "3.0"
}
},
"problemtype": {
"problemtype_data": [
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "CWE-319: Cleartext Transmission of Sensitive Information"
"lang" : "eng",
"value" : "CWE-319: Cleartext Transmission of Sensitive Information"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"name": "VU#176301",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/176301"
"name" : "VU#176301",
"refsource" : "CERT-VN",
"url" : "https://www.kb.cert.org/vuls/id/176301"
}
]
},
"solution": [
"solution" : [
{
"lang": "eng",
"value": "The devices should implement Modbus TCP Security Protocol (v21, 2018) per Modbus specifications over port 802 TCP, for Modbus TCP with encryption and authentication. \n"
"lang" : "eng",
"value" : "The devices should implement Modbus TCP Security Protocol (v21, 2018) per Modbus specifications over port 802 TCP, for Modbus TCP with encryption and authentication. \n"
}
],
"source": {
"discovery": "EXTERNAL"
"source" : {
"discovery" : "EXTERNAL"
}
}
}

View File

@ -1,111 +1,111 @@
{
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"DATE_PUBLIC": "2018-10-01T04:00:00.000Z",
"ID": "CVE-2018-5402",
"STATE": "PUBLIC",
"TITLE": "The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App use an embedded webserver that uses unencrypted plaintext for the transmission of the administrator PIN"
"CVE_data_meta" : {
"ASSIGNER" : "cert@cert.org",
"DATE_PUBLIC" : "2018-10-01T04:00:00.000Z",
"ID" : "CVE-2018-5402",
"STATE" : "PUBLIC",
"TITLE" : "The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App use an embedded webserver that uses unencrypted plaintext for the transmission of the administrator PIN"
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "DCU-210E ",
"version": {
"version_data": [
"product_name" : "DCU-210E ",
"version" : {
"version_data" : [
{
"affected": "<",
"platform": "ARMv7",
"version_name": "3.7",
"version_value": "3.7"
"affected" : "<",
"platform" : "ARMv7",
"version_name" : "3.7",
"version_value" : "3.7"
}
]
}
},
{
"product_name": "RP-210E",
"version": {
"version_data": [
"product_name" : "RP-210E",
"version" : {
"version_data" : [
{
"affected": "<",
"platform": "ARMv7",
"version_name": "3.7",
"version_value": "3.7"
"affected" : "<",
"platform" : "ARMv7",
"version_name" : "3.7",
"version_value" : "3.7"
}
]
}
}
]
},
"vendor_name": "Auto-Maskin"
"vendor_name" : "Auto-Maskin"
}
]
}
},
"credit": [
"credit" : [
{
"lang": "eng",
"value": "Reporters: Brian Satira, Brian Olson, Organization: Project Gunsway"
"lang" : "eng",
"value" : "Reporters: Brian Satira, Brian Olson, Organization: Project Gunsway"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App use an embedded webserver that uses unencrypted plaintext for the transmission of the administrator PIN\nImpact: An attacker once authenticated can change configurations, upload new configuration files, and upload executable code via file upload for firmware updates. Requires access to the network.\n\n\nAffected releases are Auto-Maskin DCU-210E, RP-210E, and the Marine Pro Observer Android App. \nVersions prior to 3.7 on ARMv7."
"lang" : "eng",
"value" : "The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App use an embedded webserver that uses unencrypted plaintext for the transmission of the administrator PIN Impact: An attacker once authenticated can change configurations, upload new configuration files, and upload executable code via file upload for firmware updates. Requires access to the network. Affected releases are Auto-Maskin DCU-210E, RP-210E, and the Marine Pro Observer Android App. Versions prior to 3.7 on ARMv7."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
"impact" : {
"cvss" : {
"attackComplexity" : "LOW",
"attackVector" : "NETWORK",
"availabilityImpact" : "NONE",
"baseScore" : 9.1,
"baseSeverity" : "CRITICAL",
"confidentialityImpact" : "HIGH",
"integrityImpact" : "HIGH",
"privilegesRequired" : "NONE",
"scope" : "UNCHANGED",
"userInteraction" : "NONE",
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version" : "3.0"
}
},
"problemtype": {
"problemtype_data": [
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "CWE-319: Cleartext Transmission of Sensitive Information"
"lang" : "eng",
"value" : "CWE-319: Cleartext Transmission of Sensitive Information"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"name": "VU#176301",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/176301"
"name" : "VU#176301",
"refsource" : "CERT-VN",
"url" : "https://www.kb.cert.org/vuls/id/176301"
}
]
},
"solution": [
"solution" : [
{
"lang": "eng",
"value": "The devices should implement TLS for authentication to administrator functions via embedded webserver.\n"
"lang" : "eng",
"value" : "The devices should implement TLS for authentication to administrator functions via embedded webserver.\n"
}
],
"source": {
"discovery": "EXTERNAL"
"source" : {
"discovery" : "EXTERNAL"
}
}
}