mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
117 lines
3.8 KiB
JSON
117 lines
3.8 KiB
JSON
{
|
|
"id": "CVE-2016-8006",
|
|
"sourceIdentifier": "secure@intel.com",
|
|
"published": "2017-01-05T22:59:00.250",
|
|
"lastModified": "2017-01-18T02:59:12.657",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Authentication bypass vulnerability in Enterprise Security Manager (ESM) and License Manager (LM) in Intel Security McAfee Security Information and Event Management (SIEM) 9.6.0 MR3 allows an administrator to make changes to other SIEM users' information including user passwords without supplying the current administrator password a second time via the GUI or GUI terminal commands."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de elusi\u00f3n de autenticaci\u00f3n en Enterprise Security Manager (ESM) y License Manager (LM) en Intel Security McAfee Security Information and Event Management (SIEM) 9.6.0 MR3 permite a un administrador hacer cambios en la informaci\u00f3n de otros usuarios SIEM incluyendo contrase\u00f1as de usuario sin aportar al administrador actual una contrase\u00f1a por segunda vez a trav\u00e9s de comandos de terminal GUI o GUI."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.4,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 0.8,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:S/C:N/I:P/A:N",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 1.7
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.1,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mcafee:security_information_and_event_management:*:mr3:*:*:*:*:*:*",
|
|
"versionEndIncluding": "9.6.0",
|
|
"matchCriteriaId": "D9BCB33D-5381-44D0-B0B9-F46D6CAB8CB2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.quantumleap.it/mcafee-siem-esm-esmrec-authentication-bypass-vulnerability/",
|
|
"source": "secure@intel.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/95313",
|
|
"source": "secure@intel.com"
|
|
},
|
|
{
|
|
"url": "https://kc.mcafee.com/corporate/index?page=content&id=KB87744",
|
|
"source": "secure@intel.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.narthar.it/DOC/McAfee_SIEM_9.6_Authentication_bypass_vulnerability.html",
|
|
"source": "secure@intel.com"
|
|
}
|
|
]
|
|
} |