{ "id": "CVE-2016-8209", "sourceIdentifier": "sirt@brocade.com", "published": "2017-05-08T18:29:00.247", "lastModified": "2017-07-08T01:29:02.457", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module." }, { "lang": "es", "value": "Comprobaci\u00f3n err\u00f3nea de condiciones inusuales o excepcionales en Brocade NetIron 05.8.00 y versiones posteriores hasta la versi\u00f3n 06.1.00 inclusive. Cuando el m\u00f3dulo de gesti\u00f3n se escanea continuamente en el puerto 22, puede permitir a los atacantes provocar una denegaci\u00f3n de servicio (bloqueo y reinicio) del m\u00f3dulo de gesti\u00f3n." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-754" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:brocade:netiron_mlx_series_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "74935A30-8065-4F87-99FB-DD8B39C8FE92" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_mlxe-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF909A9A-69E1-4BEC-B16C-16EE7652D858" }, { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_mlxe-32:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E751734-9855-4525-8056-53A12AE1C15D" }, { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_mlxe-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "045DF755-C804-449F-A452-578592788D39" }, { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_mlxe-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "56EA291A-4D1D-48ED-A8AF-76F1A2BECD13" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:brocade:netiron_cer_series_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "613E20A7-07B6-4771-8F09-4ED9FA197BEE" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_cer_2024c-4x-rt:-:*:*:*:*:*:*:*", "matchCriteriaId": "739A02DA-84DD-462F-B0A1-FE22653C4A9C" }, { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_cer_2024f-4x-rt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4D8757-F3E5-4AC1-9F6B-85687B70CB41" }, { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_cer_2024f-rt:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FF952A7-E730-4D90-B4B6-84729A0A9E04" }, { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_cer_2048fx-rt:-:*:*:*:*:*:*:*", "matchCriteriaId": "76479441-A6B4-47DA-B857-2FEC94FF236E" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:brocade:netiron_ces_series_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0687B3C5-FF7E-4B60-A295-4B616005939C" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_ces_2024c-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D54CE6AC-8574-48BA-B01A-9347DB4AB2A2" }, { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_ces_2024f-4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7C42F0A-7BF3-4B7C-B6D7-344B3F2C7774" }, { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_ces_2048fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0305844-4A09-41A7-84FB-00E51F732C95" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:brocade:netiron_xmr_series_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5E9BB53-74D3-40E2-B4C1-A8FBFC5BB6AF" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_xmr_16000:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DF476B2-7DA0-4D15-9E2C-013DB97C2814" }, { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_xmr_32000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C098C5F9-617A-4528-A8BE-0EAC37127400" }, { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_xmr_4000:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DBD4820-B983-4A77-8C83-BFA6D63F6FE6" }, { "vulnerable": false, "criteria": "cpe:2.3:h:brocade:netiron_xmr_8000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3C81BAD-D528-401F-98BC-1E6F9BA80846" } ] } ] } ], "references": [ { "url": "http://www.securitytracker.com/id/1038402", "source": "sirt@brocade.com" }, { "url": "https://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-315.htm", "source": "sirt@brocade.com", "tags": [ "Vendor Advisory" ] } ] }