256 lines
8.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2016-8209",
"sourceIdentifier": "sirt@brocade.com",
"published": "2017-05-08T18:29:00.247",
"lastModified": "2017-07-08T01:29:02.457",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module."
},
{
"lang": "es",
"value": "Comprobaci\u00f3n err\u00f3nea de condiciones inusuales o excepcionales en Brocade NetIron 05.8.00 y versiones posteriores hasta la versi\u00f3n 06.1.00 inclusive. Cuando el m\u00f3dulo de gesti\u00f3n se escanea continuamente en el puerto 22, puede permitir a los atacantes provocar una denegaci\u00f3n de servicio (bloqueo y reinicio) del m\u00f3dulo de gesti\u00f3n."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:brocade:netiron_mlx_series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74935A30-8065-4F87-99FB-DD8B39C8FE92"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_mlxe-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF909A9A-69E1-4BEC-B16C-16EE7652D858"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_mlxe-32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E751734-9855-4525-8056-53A12AE1C15D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_mlxe-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "045DF755-C804-449F-A452-578592788D39"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_mlxe-8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56EA291A-4D1D-48ED-A8AF-76F1A2BECD13"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:brocade:netiron_cer_series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "613E20A7-07B6-4771-8F09-4ED9FA197BEE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_cer_2024c-4x-rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "739A02DA-84DD-462F-B0A1-FE22653C4A9C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_cer_2024f-4x-rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4D8757-F3E5-4AC1-9F6B-85687B70CB41"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_cer_2024f-rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FF952A7-E730-4D90-B4B6-84729A0A9E04"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_cer_2048fx-rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76479441-A6B4-47DA-B857-2FEC94FF236E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:brocade:netiron_ces_series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0687B3C5-FF7E-4B60-A295-4B616005939C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_ces_2024c-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D54CE6AC-8574-48BA-B01A-9347DB4AB2A2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_ces_2024f-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C42F0A-7BF3-4B7C-B6D7-344B3F2C7774"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_ces_2048fx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0305844-4A09-41A7-84FB-00E51F732C95"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:brocade:netiron_xmr_series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5E9BB53-74D3-40E2-B4C1-A8FBFC5BB6AF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_xmr_16000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DF476B2-7DA0-4D15-9E2C-013DB97C2814"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_xmr_32000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C098C5F9-617A-4528-A8BE-0EAC37127400"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_xmr_4000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DBD4820-B983-4A77-8C83-BFA6D63F6FE6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_xmr_8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3C81BAD-D528-401F-98BC-1E6F9BA80846"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securitytracker.com/id/1038402",
"source": "sirt@brocade.com"
},
{
"url": "https://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-315.htm",
"source": "sirt@brocade.com",
"tags": [
"Vendor Advisory"
]
}
]
}