René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

103 lines
3.7 KiB
JSON

{
"id": "CVE-2011-2741",
"sourceIdentifier": "security_alert@emc.com",
"published": "2011-12-14T11:55:06.480",
"lastModified": "2012-01-24T04:00:47.377",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "EMC RSA Adaptive Authentication On-Premise (AAOP) 6.0.2.1 SP1 Patch 2, SP1 Patch 3, SP2, SP2 Patch 1, and SP3 does not properly implement Device Recovery and Device Identification, which might allow remote attackers to bypass intended security restrictions on a (1) previously non-registered device or (2) registered device by sending unspecified \"data elements.\""
},
{
"lang": "es",
"value": "EMC RSA Adaptive Authentication On-Premise (AAOP) v6.0.2.1 SP1 Patch 2, SP1 Patch 3, SP2, SP2 Patch 1, y SP3, no aplican correctamente la recuperaci\u00f3n de dispositivos y la identificaci\u00f3n de dispositivos, lo que podr\u00eda permitir a atacantes remotos evitar las restricciones de seguridad en un (1) dispositivo no registrado previamente o (2) dispositivo registrado mediante el env\u00edo no especificado de \"elementos de datos.\""
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:rsa_adaptive_authentication_on-premise:6.0.2.1:sp1_patch2:*:*:*:*:*:*",
"matchCriteriaId": "F97E490D-12E8-420C-990E-2BB4B97D86D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:rsa_adaptive_authentication_on-premise:6.0.2.1:sp1_patch3:*:*:*:*:*:*",
"matchCriteriaId": "7E18C647-3264-46A0-8411-4DB02E470217"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:rsa_adaptive_authentication_on-premise:6.0.2.1:sp2:*:*:*:*:*:*",
"matchCriteriaId": "30CE0F82-18A5-4E1F-B096-8A85AF85F4C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:rsa_adaptive_authentication_on-premise:6.0.2.1:sp2_patch1:*:*:*:*:*:*",
"matchCriteriaId": "250D48AB-3B67-402F-AE85-DF8B12E10D32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:rsa_adaptive_authentication_on-premise:6.0.2.1:sp3:*:*:*:*:*:*",
"matchCriteriaId": "504CA1D2-9915-4ABF-9D08-C8ED5F86F34A"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/archive/1/520850",
"source": "security_alert@emc.com"
},
{
"url": "http://www.securitytracker.com/id?1026420",
"source": "security_alert@emc.com"
}
]
}