mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
224 lines
11 KiB
JSON
224 lines
11 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-2005",
|
|
"ASSIGNER": "psirt@ciena.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "\nIn Blue Planet\u00ae products through 22.12, a misconfiguration in the SAML implementation allows for privilege escalation. Only products using SAML authentication are affected.\n\nBlue Planet\u00ae has released software updates that address this vulnerability for the affected products. Customers are advised to upgrade their Blue Planet products to the latest software version as soon as possible. The software updates can be downloaded from the Ciena Support Portal.\n\n"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-269 Improper Privilege Management",
|
|
"cweId": "CWE-269"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Blue Planet",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Inventory (BPI)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"versions": [
|
|
{
|
|
"lessThanOrEqual": " 22.12",
|
|
"status": "affected",
|
|
"version": " early versions ",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"status": "unaffected",
|
|
"version": " 21.10 MR11"
|
|
},
|
|
{
|
|
"status": "unaffected",
|
|
"version": " 22.02 MR5"
|
|
},
|
|
{
|
|
"status": "unaffected",
|
|
"version": " 22.08 MR4"
|
|
}
|
|
],
|
|
"defaultStatus": "unaffected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Orchestration (BPO)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"versions": [
|
|
{
|
|
"lessThanOrEqual": " 22.12",
|
|
"status": "affected",
|
|
"version": " early versions ",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"status": "unaffected",
|
|
"version": " 22.02.03"
|
|
},
|
|
{
|
|
"status": "unaffected",
|
|
"version": " 22.08.05"
|
|
},
|
|
{
|
|
"status": "unaffected",
|
|
"version": " 22.12.02"
|
|
}
|
|
],
|
|
"defaultStatus": "unaffected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Route Optimization and Analysis (ROA)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"versions": [
|
|
{
|
|
"lessThanOrEqual": " 22.12",
|
|
"status": "affected",
|
|
"version": " early versions ",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"status": "unaffected",
|
|
"version": " 22.02.P01.11-R"
|
|
},
|
|
{
|
|
"status": "unaffected",
|
|
"version": " 22.08.P01.1-R"
|
|
},
|
|
{
|
|
"status": "unaffected",
|
|
"version": " 22.12.P01.2.1-R"
|
|
}
|
|
],
|
|
"defaultStatus": "unaffected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Unified Assurance and Analytics (UAA) ",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"versions": [
|
|
{
|
|
"lessThanOrEqual": " 22.12",
|
|
"status": "affected",
|
|
"version": " early versions ",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"status": "unaffected",
|
|
"version": " 22.02 MR5"
|
|
},
|
|
{
|
|
"status": "unaffected",
|
|
"version": " 22.12 MR2"
|
|
}
|
|
],
|
|
"defaultStatus": "unaffected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://www.ciena.com/product-security",
|
|
"refsource": "MISC",
|
|
"name": "https://www.ciena.com/product-security"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.1.0-dev"
|
|
},
|
|
"source": {
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "\n\nSoftware patch to be applied<br>"
|
|
}
|
|
],
|
|
"value": "\nSoftware patch to be applied\n"
|
|
}
|
|
],
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Discovered by Prerit Chandok at Comcast"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9,
|
|
"baseSeverity": "CRITICAL",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "REQUIRED",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |