{ "id": "CVE-2001-1039", "sourceIdentifier": "cve@mitre.org", "published": "2001-08-31T04:00:00.000", "lastModified": "2008-09-05T20:25:32.080", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The JetAdmin web interface for HP JetDirect does not set a password for the telnet interface when the admin password is changed, which allows remote attackers to gain access to the printer." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:hp:jetadmin:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "565A8753-31CC-4D4D-BF71-EB4C08A2D47E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hp:jetadmin:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "30AAEB5E-184F-4DB4-B0A6-D770D3832B77" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hp:jetadmin:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "012B7A13-0A21-4FCD-8B32-7302545885A9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hp:jetadmin:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "30DA33FB-AFA3-4720-8108-E279D97BADC5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hp:jetadmin:5.5.177:*:*:*:*:*:*:*", "matchCriteriaId": "8F6E0862-A565-4099-9EB7-D02AD6081811" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hp:jetadmin:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "BE4F960E-F153-45DF-812F-47AA31C33E55" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hp:jetadmin:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "17A6954A-D8E0-4ADF-BB64-329D7589F38A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hp:jetadmin:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A5E2537-1E27-4962-BFC3-488FF3C2D305" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hp:jetadmin:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "467A92C4-1067-4158-8BA1-367495B1845C" } ] } ] } ], "references": [ { "url": "http://www.securityfocus.com/archive/1/201160", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/3132", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] } ] }