82 lines
2.3 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2010-2082",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-05-26T19:30:01.517",
"lastModified": "2010-05-27T04:00:00.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The web interface on the Cisco Scientific Atlanta WebSTAR DPC2100R2 cable modem with firmware 2.0.2r1256-060303 has a default administrative password (aka SAPassword) of W2402, which makes it easier for remote attackers to obtain privileged access."
},
{
"lang": "es",
"value": "La interfaz web en el cable modem Cisco Scientific Atlanta WebSTAR DPC2100R2 tiene por defecto un password de administraci\u00f3n (como SAPassword) de W2402, que hace que sea facil para atacantes remotos obtener privilegios de acceso. \r\n"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-255"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:cisco:scientific_atlanta_webstar_dpc2100r2:2.0.2r1256-060303:*:*:*:*:*:*:*",
"matchCriteriaId": "81CAE5FA-2676-4D86-8DBE-8675B2D87E00"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0322.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}