2024-09-30 10:03:19 +00:00
{
"id" : "CVE-2024-8459" ,
"sourceIdentifier" : "twcert@cert.org.tw" ,
"published" : "2024-09-30T08:15:05.460" ,
2024-10-04 16:03:17 +00:00
"lastModified" : "2024-10-04T14:42:35.297" ,
"vulnStatus" : "Analyzed" ,
2024-09-30 10:03:19 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Certain switch models from PLANET Technology store SNMPv3 users' passwords in plaintext within the configuration files, allowing remote attackers with administrator privileges to read the file and obtain the credentials."
2024-09-30 14:03:19 +00:00
} ,
{
"lang" : "es" ,
"value" : "Ciertos modelos de conmutadores de PLANET Technology almacenan las contrase\u00f1as de los usuarios de SNMPv3 en texto plano dentro de los archivos de configuraci\u00f3n, lo que permite a atacantes remotos con privilegios de administrador leer el archivo y obtener las credenciales."
2024-09-30 10:03:19 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-12-08 03:06:42 +00:00
"source" : "twcert@cert.org.tw" ,
"type" : "Secondary" ,
2024-10-04 16:03:17 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.2 ,
"baseSeverity" : "HIGH" ,
2024-10-04 16:03:17 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
2024-10-04 16:03:17 +00:00
} ,
"exploitabilityScore" : 1.2 ,
2024-12-08 03:06:42 +00:00
"impactScore" : 5.9
2024-10-04 16:03:17 +00:00
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-09-30 10:03:19 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" ,
"baseScore" : 4.9 ,
"baseSeverity" : "MEDIUM" ,
2024-09-30 10:03:19 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE"
2024-09-30 10:03:19 +00:00
} ,
"exploitabilityScore" : 1.2 ,
2024-12-08 03:06:42 +00:00
"impactScore" : 3.6
2024-09-30 10:03:19 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "twcert@cert.org.tw" ,
2024-12-15 03:03:56 +00:00
"type" : "Primary" ,
2024-09-30 10:03:19 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-312"
}
]
}
] ,
2024-10-04 16:03:17 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:planet:gs-4210-24p2s_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.305b240802" ,
"matchCriteriaId" : "89C0B4AA-848F-4AAC-8C51-8C10AEF0630A"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:planet:gs-4210-24p2s:3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A30964B-E6B8-4B8A-BE2E-882C0F3D8298"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:planet:gs-4210-24pl4c_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.305b240719" ,
"matchCriteriaId" : "0E17E272-4418-4CE7-8E59-44953D19D659"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:planet:gs-4210-24pl4c:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8029517-8FAB-4130-81F3-98BB09F4814E"
}
]
}
]
}
] ,
2024-09-30 10:03:19 +00:00
"references" : [
{
"url" : "https://www.twcert.org.tw/en/cp-139-8068-8aaa5-2.html" ,
2024-10-04 16:03:17 +00:00
"source" : "twcert@cert.org.tw" ,
"tags" : [
"Third Party Advisory"
]
2024-09-30 10:03:19 +00:00
} ,
{
"url" : "https://www.twcert.org.tw/tw/cp-132-8067-2fc50-1.html" ,
2024-10-04 16:03:17 +00:00
"source" : "twcert@cert.org.tw" ,
"tags" : [
"Third Party Advisory"
]
2024-09-30 10:03:19 +00:00
}
]
}