133 lines
4.3 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2015-1448",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-02-02T15:59:08.317",
"lastModified": "2015-02-04T05:27:01.120",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The integrated management service on Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.4624.35, WIN52xx devices with firmware before SS4.4.4624.35, WIN70xx devices with firmware before BS4.4.4621.32, and WIN72xx devices with firmware before BS4.4.4621.32 allows remote attackers to bypass authentication and perform administrative actions via unspecified vectors."
},
{
"lang": "es",
"value": "El servicio de la gesti\u00f3n integrada en los dispositivos Siemens Ruggedcom WIN51xx con firmware anterior a SS4.4.4624.35, los dispositivos WIN52xx con firmware anterior a SS4.4.4624.35, los dispositivos WIN70xx con firmware anterior a BS4.4.4621.32, y los dispositivos WIN72xx con firmware anterior a BS4.4.4621.32 permite a atacantes remotos evadir la autenticaci\u00f3n y realizar acciones administrativas a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:ruggedcom_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "bs4.4.4621.31",
"matchCriteriaId": "E51B0A74-0ABC-4F11-8AF4-760E24B99ED0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:ruggedcom_win7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD6F6C12-9373-48F2-B576-C9AC7A287B53"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:ruggedcom_win7200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7146409-09B7-499C-9544-361B234E952D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:ruggedcom_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "ss4.4.4624.34",
"matchCriteriaId": "3D3E7749-1A38-4D61-A24E-A44E02A06012"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:ruggedcom_win5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D417E312-A686-4FF3-B28B-A92C651D12EA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:ruggedcom_win5200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA88E1E-1EB8-46B1-9273-B4D3C1AAC37D"
}
]
}
]
}
],
"references": [
{
"url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-753139.pdf",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}