René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

117 lines
3.4 KiB
JSON

{
"id": "CVE-2018-13115",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-10-22T20:29:00.393",
"lastModified": "2019-01-29T16:09:43.287",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Lack of an authentication mechanism in KERUI Wifi Endoscope Camera (YPC99) allows an attacker to watch or block the camera stream. The RTSP server on port 7070 accepts the command STOP to stop streaming, and the command SETSSID to disconnect a user."
},
{
"lang": "es",
"value": "La falta de un mecanismo de autenticaci\u00f3n en KERUI Wifi Endoscope Camera (YPC99) permite que un atacante vea o bloquee la transmisi\u00f3n de la c\u00e1mara. El servidor RTSP en el puerto 7070 acepta el comando STOP para detener la transmisi\u00f3n y el comando SETSSID para desconectar a un usuario."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 6.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:keruigroup:ypc99_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A648BF89-A0F2-41C9-BFED-3A7CC6618E93"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:keruigroup:ypc99:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CCDD63D-DB5C-49A3-BAF3-362E09CCAE80"
}
]
}
]
}
],
"references": [
{
"url": "https://utkusen.com/blog/multiple-vulnerabilities-on-kerui-endoscope-camera.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}