René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

230 lines
6.4 KiB
JSON

{
"id": "CVE-2018-13109",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-07-06T14:29:01.100",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "All ADB broadband gateways / routers based on the Epicentro platform are affected by an authorization bypass vulnerability where attackers are able to access and manipulate settings within the web interface that are forbidden to end users (e.g., by the ISP). An attacker would be able to enable the TELNET server or other settings as well."
},
{
"lang": "es",
"value": "Todos los gateways/routers ADB basados en la plataforma Epicentro se han visto afectados por una vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n por la que los atacantes pueden acceder y manipular opciones en la interfaz web que le est\u00e1n prohibidas a los usuarios finales (p. ej., por el ISP). Un atacante podr\u00eda ser capaz de habilitar el servidor TELNET u otras opciones."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:adbglobal:dv2210_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A77BB710-A438-4103-9414-053669AE1E5A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:adbglobal:dv2210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C413482-3B9F-43B6-BBEF-6798950BD3F0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:adbglobal:vv2220_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81AE15CE-5C84-42C1-86AD-3DE25D87671C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:adbglobal:vv2220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB5F965B-9757-4AEF-B056-F3EC9CBED5AD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:adbglobal:vv5522_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E590FB-1395-4A3F-AFE5-9BA7FB06D791"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:adbglobal:vv5522:-:*:*:*:*:*:*:*",
"matchCriteriaId": "359E299D-7BD3-4D4C-B9E6-D3922F96EF0E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:adbglobal:prg_av4202n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F838B4CD-0B34-45B7-A074-AEF007415D1D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:adbglobal:prg_av4202n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57088CE6-970A-477F-93B4-A39498685358"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/148429/ADB-Authorization-Bypass.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2018/Jul/18",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/542119/100/0/threaded",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/44982/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sec-consult.com/en/blog/advisories/authorization-bypass-in-all-adb-broadband-gateways-routers/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}