mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 09:41:31 +00:00
111 lines
3.2 KiB
JSON
111 lines
3.2 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2008-1113",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2008-03-03T18:44:00.000",
|
||
|
"lastModified": "2008-09-05T21:36:50.757",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Cisco Unified Wireless IP Phone 7921, when using Protected Extensible Authentication Protocol (PEAP), does not validate server certificates, which allows remote wireless access points to steal hashed passwords and conduct man-in-the-middle (MITM) attacks."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Cisco Unified Wireless IP Phone 7921, cuando utiliza Protected Extensible Authentication Protocol (PEAP), no valida certificados de servidor, lo cual permite a los puntos de acceso inal\u00e1mbricos remotos robar el resumen digital (hash) de contase\u00f1as y dirigir ataques man-in-the-middle (MITM)."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "COMPLETE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 7.8
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 10.0,
|
||
|
"impactScore": 6.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-200"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:7921_wireless_ip_phone:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "BB60B368-94E0-4A32-86B2-46BA076ADF3E"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:vocera_communications:vocera_communications_badge:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3A5DD0E9-3ECC-443C-9EA3-077D0CFF5358"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://blogs.zdnet.com/security/?p=896",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://blogs.zdnet.com/security/?p=901",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://seclists.org/fulldisclosure/2008/Feb/0402.html",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://seclists.org/fulldisclosure/2008/Feb/0449.html",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://securitytracker.com/id?1019494",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/27935",
|
||
|
"source": "cve@mitre.org"
|
||
|
}
|
||
|
]
|
||
|
}
|