mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
959 lines
27 KiB
JSON
959 lines
27 KiB
JSON
{
|
|
"id": "CVE-2017-7852",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2017-04-24T10:59:00.160",
|
|
"lastModified": "2021-11-09T20:06:45.340",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "D-Link DCS cameras have a weak/insecure CrossDomain.XML file that allows sites hosting malicious Flash objects to access and/or change the device's settings via a CSRF attack. This is because of the 'allow-access-from domain' child element set to *, thus accepting requests from any domain. If a victim logged into the camera's web console visits a malicious site hosting a malicious Flash file from another Browser tab, the malicious Flash file then can send requests to the victim's DCS series Camera without knowing the credentials. An attacker can host a malicious Flash file that can retrieve Live Feeds or information from the victim's DCS series Camera, add new admin users, or make other changes to the device. Known affected devices are DCS-933L with firmware before 1.13.05, DCS-5030L, DCS-5020L, DCS-2530L, DCS-2630L, DCS-930L, DCS-932L, and DCS-932LB1."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Las c\u00e1maras DCS de D-Link tienen un archivo CrossDomain.XML d\u00e9bil/inseguro que permite a los sitios que alojan objetos Flash maliciosos acceder y/o cambiar la configuraci\u00f3n del dispositivo a trav\u00e9s de un ataque CSRF. Esto se debe a que el elemento secundario 'allow-access-from domain' se establece en *, aceptando as\u00ed peticiones de cualquier dominio. Si una v\u00edctima conectada a la consola web de la c\u00e1mara visita un sitio malicioso que aloja un archivo Flash malicioso desde otra pesta\u00f1a Navegador, el archivo Flash malicioso puede enviar solicitudes a la Camera de la serie DCS de la v\u00edctima sin conocer las credenciales. Un atacante puede alojar un archivo Flash malicioso que puede recuperar Live Feeds o informaci\u00f3n de la Camera de la serie DCS de la v\u00edctima, a\u00f1adir nuevos usuarios de administraci\u00f3n o realizar otros cambios en el dispositivo. Los dispositivos afectados conocidos son DCS-933L con firmware en versiones anteriores a 1.13.05, DCS-5030L, DCS-5020L, DCS-2530L, DCS-2630L, DCS-930L, DCS-932L y DCS-932LB1."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-352"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-2230l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.03.01",
|
|
"matchCriteriaId": "9D68419F-BCE0-481C-A3E3-4D4A763B0402"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-2230l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CCC40D1C-CC3A-4A26-AE33-018B6F0A6642"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-2310l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.08.01",
|
|
"matchCriteriaId": "9925EC60-08A0-45D7-974A-5774E0FD7255"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-2310l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "60A7C832-2F88-4B9B-87C5-2BE36D5DE2CA"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-2332l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.08.01",
|
|
"matchCriteriaId": "C12F4966-75A5-4AE2-A2A9-192D155DD4A2"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-2332l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "209EA4D5-3C79-4A6A-BE0D-554B9E597794"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-6010l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.15.01",
|
|
"matchCriteriaId": "12BDC94F-F3EC-4E0C-B72D-320C370C3E1F"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-6010l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5B853EF1-E3BF-44E5-8DB9-C63E88220DD6"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-7010l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.08.01",
|
|
"matchCriteriaId": "F63FCF01-05FE-4664-B42F-3618C5A93125"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-7010l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "467C65BC-FFED-4DA3-9780-2ED408429B52"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-2530l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.00.21",
|
|
"matchCriteriaId": "47E83BEF-9741-4AA0-9F6E-8F6B92435E62"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-2530l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC420CF5-A8D2-4D6D-8750-D86E22D867A5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-930l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.15.04",
|
|
"matchCriteriaId": "C9768182-DDF9-4C5C-81F2-CB2755CA2228"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-930l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E52950BE-9567-43BA-8750-0F0CC17A93A5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-930l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.13.15",
|
|
"matchCriteriaId": "C0258EF7-0FAB-447C-811B-1D5DD434120A"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-930l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E52950BE-9567-43BA-8750-0F0CC17A93A5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-932l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.13.04",
|
|
"matchCriteriaId": "0933574B-5501-4DD7-9E98-FC78B21574F6"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-932l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ACC679B1-1754-483D-9C56-2AB37A45EEAC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-932l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.13.15",
|
|
"matchCriteriaId": "EB70852D-06EB-4BB6-9AA6-C5770087D8F1"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-932l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ACC679B1-1754-483D-9C56-2AB37A45EEAC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-934l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.04.15",
|
|
"matchCriteriaId": "65A666A2-7E95-43D7-8A0A-193C7F202751"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-934l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "95D3377F-66F8-48C5-9999-4E5B04409BBC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-942l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.27",
|
|
"matchCriteriaId": "EF5D9672-91DA-48CE-A207-13AA292CAB0B"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-942l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FAE0F0F-D526-4FCC-B2B9-CCB441ED0324"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-942l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.11.03",
|
|
"matchCriteriaId": "CFBA4C6C-6C8D-4147-BBAE-0AA112F81170"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-942l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FAE0F0F-D526-4FCC-B2B9-CCB441ED0324"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-931l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.13.05",
|
|
"matchCriteriaId": "81FB3C21-B327-45DD-BC5E-250512700927"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-931l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "21754B72-3FBA-46D0-9696-399B1415A76F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-933l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.13.05",
|
|
"matchCriteriaId": "F4E2BD72-F5E5-449A-9F5B-9D0255E86409"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-933l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2996576-1C8D-4122-B1ED-48D44890C29F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-5009l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.07.05",
|
|
"matchCriteriaId": "160C9429-0A77-43B4-97CE-16097C4F94CF"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-5009l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9407559F-6855-4356-9BBC-4FA5D19A097C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-5010l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.13.05",
|
|
"matchCriteriaId": "B52C8EAB-1DBB-4DC9-B655-9592211D2625"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-5010l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "01CCD287-F35C-4248-AB86-5CD7567E6FE5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-5020l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.13.05",
|
|
"matchCriteriaId": "7347D2D0-DD4A-4289-B72C-78A02D92B60B"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-5020l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "820C5633-9FC9-414D-9DD1-E6DA93274631"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-5000l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.02.02",
|
|
"matchCriteriaId": "2328A308-5A89-48EA-9BFB-7013BFD427D5"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-5000l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E68ED02-A9F6-443B-A59E-3AB0DBC8EBD2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-5025l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.02.10",
|
|
"matchCriteriaId": "BEA4D2B6-44E8-460D-9560-DD1DF6661856"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-5025l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80713C1E-B706-4295-91DE-22949393D529"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-5030l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.01.06",
|
|
"matchCriteriaId": "5351D54A-CFF5-41EE-B5FD-C01951C3B316"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-5030l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "45794921-EB06-481C-8EED-DE5773253CE7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-2210l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.03.01",
|
|
"matchCriteriaId": "17D90394-9344-4D90-837A-7157E1BB5272"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-2210l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "05DD5A7F-AA37-436E-AB56-4AB1F7899E16"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-2136l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.04.01",
|
|
"matchCriteriaId": "27018688-5749-4F33-B0CA-6D422AB46D1E"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-2136l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5440DD14-B4E7-43E4-9C9F-3E56A60E5586"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-2132l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.08.01",
|
|
"matchCriteriaId": "341A3B36-F186-44B9-9964-0156A6FDB185"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-2132l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6EE6E329-4FF7-47FC-9F18-20316ECD066C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-7000l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.04.00",
|
|
"matchCriteriaId": "DE68EB21-B4A0-41F4-8A18-48EC872477E1"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-7000l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9AB218ED-9235-43E8-8785-5C6A0F2C3F80"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-6212l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.00.12",
|
|
"matchCriteriaId": "6D0935FB-7BCD-49F2-A9E5-6B16EFBC7CFE"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-6212l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD7C434E-B4FE-42AF-B936-EC9672C0C732"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-5029l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.12.00",
|
|
"matchCriteriaId": "7E4CCB15-3308-4D98-B6F2-5274FCCEAF0A"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-5029l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2483B20-575A-40A2-8CE5-0E06EDC004FD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-2310l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.03.00",
|
|
"matchCriteriaId": "68885EDE-1FC6-4D49-B71B-F9C02FE02945"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-2310l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "60A7C832-2F88-4B9B-87C5-2BE36D5DE2CA"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-2330l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.13.00",
|
|
"matchCriteriaId": "DA60CD5C-F183-426A-89E1-E18797DB2B89"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-2330l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE8FF774-1EFE-45B2-ADE9-038EE6C87B56"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:d-link:dcs-2132l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.12.00",
|
|
"matchCriteriaId": "60870C6F-C8F8-40AB-9599-4755729F65C4"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:d-link:dcs-2132l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6EE6E329-4FF7-47FC-9F18-20316ECD066C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:dlink:dcs-5222l_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.12.00",
|
|
"matchCriteriaId": "AED5E89C-1745-4C93-A891-F6C819C9E7B7"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:dlink:dcs-5222l:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97C4B9CD-6029-4B92-8785-1349292EDD69"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.qualys.com/2017/02/22/qsa-2017-02-22/qsa-2017-02-22.pdf",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Mitigation",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |