mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
93 lines
3.4 KiB
JSON
93 lines
3.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
|
"DATE_PUBLIC": "2018-07-19T00:00:00",
|
|
"ID": "CVE-2018-10627",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "SmartServer 1",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "all versions"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "SmartServer 2",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "all versions prior to release 4.11.007"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "i.LON 100",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "all versions"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "i.LON 600",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "all versions"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Echelon"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. An attacker can use the SOAP API to retrieve and change sensitive configuration items such as the usernames and passwords for the Web and FTP servers. This vulnerability does not affect the i.LON 600 product."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "INFORMATION EXPOSURE CWE-200"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03",
|
|
"refsource": "MISC",
|
|
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03"
|
|
}
|
|
]
|
|
}
|
|
} |