119 lines
3.6 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2015-6237",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-12-27T19:29:00.223",
"lastModified": "2018-10-09T19:57:48.003",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The RPC service in Tripwire (formerly nCircle) IP360 VnE Manager 7.2.2 before 7.2.6 allows remote attackers to bypass authentication and (1) enumerate users, (2) reset passwords, or (3) manipulate IP filter restrictions via crafted \"privileged commands.\""
},
{
"lang": "es",
"value": "El servicio RPC en Tripwire (anteriormente conocido como nCircle) IP360 VnE Manager, en versiones 7.2.2 anteriores a la 7.2.6 permite que atacantes remotos omitan la autenticaci\u00f3n y (1) enumeren usuarios, (2) restablezcan contrase\u00f1as o (3) manipulen las restricciones de filtros IP mediante \"comandos privilegiados\" manipulados."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tripwire:ip360:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1F140F9C-0FDB-42F1-9AB3-06B670D1FD20"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tripwire:ip360:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C21FA217-0202-4885-955B-C4DDF8B0FEE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tripwire:ip360:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9C9AA1C3-B17E-4F12-A587-767D7A25B048"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2015/Oct/20",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/536609/100/0/threaded",
"source": "cve@mitre.org"
}
]
}