mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
98 lines
3.5 KiB
JSON
98 lines
3.5 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "secure@dell.com",
|
|
"DATE_PUBLIC" : "2019-02-06T06:00:00.000Z",
|
|
"ID" : "CVE-2018-15781",
|
|
"STATE" : "PUBLIC",
|
|
"TITLE" : "DSA-2019-022: Dell Wyse Password Encoder Hard-coded Cryptographic Key Vulnerability"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "Wyse Password Encoder",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"affected" : "<",
|
|
"version_name" : "ThinLinux2 ",
|
|
"version_value" : "2.1.0.01"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "Dell"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"credit" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Dell would like to thank Andrew Tierney at Pen Test Partners for reporting this vulnerability."
|
|
}
|
|
],
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "The Dell Wyse Password Encoder in ThinLinux2 versions prior to 2.1.0.01 contain a Hard-coded Cryptographic Key vulnerability. An unauthenticated remote attacker could reverse engineer the cryptographic system used in the Dell Wyse Password Encoder to discover the hard coded private key and decrypt locally stored cipher text."
|
|
}
|
|
]
|
|
},
|
|
"impact" : {
|
|
"cvss" : {
|
|
"attackComplexity" : "HIGH",
|
|
"attackVector" : "ADJACENT_NETWORK",
|
|
"availabilityImpact" : "HIGH",
|
|
"baseScore" : 7.9,
|
|
"baseSeverity" : "HIGH",
|
|
"confidentialityImpact" : "HIGH",
|
|
"integrityImpact" : "HIGH",
|
|
"privilegesRequired" : "NONE",
|
|
"scope" : "CHANGED",
|
|
"userInteraction" : "REQUIRED",
|
|
"vectorString" : "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
|
"version" : "3.0"
|
|
}
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Hard-coded Cryptographic Key vulnerability"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://www.dell.com/support/article/SLN316104",
|
|
"refsource" : "MISC",
|
|
"url" : "https://www.dell.com/support/article/SLN316104"
|
|
}
|
|
]
|
|
},
|
|
"solution" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "The following Dell ThinLinux2 release contains a resolution to the vulnerability:\n\nDell ThinLinux2 versions 2.1.0.01 and later\nDell recommends all customers upgrade at the earliest opportunity. For more information, refer to Dell Knowledge Base article Drivers and Downloads FAQs.\n\nLink to remedies:\n\nCustomers can download software from\n\nhttps://www.dell.com/support/home/us/en/19/drivers/driversdetails?driverId=C4JH3&osCode=THNLX&productCode=wyse-3040-thin-client\n\nhttps://www.dell.com/support/home/in/en/indhs1/drivers/driversdetails?driverId=3CKT3&osCode=THNLX&productCode=wyse-5070-thin-client"
|
|
}
|
|
],
|
|
"source" : {
|
|
"discovery" : "UNKNOWN"
|
|
}
|
|
}
|