René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

152 lines
4.3 KiB
JSON

{
"id": "CVE-2018-16705",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-09-10T17:29:00.727",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "FURUNO FELCOM 250 and 500 devices allow unauthenticated access to the xml/permission.xml file containing all of the system's usernames and passwords. This includes the Admin and Service user accounts and their unsalted MD5 hashes, as well as the SMS server password in cleartext."
},
{
"lang": "es",
"value": "Los dispositivos FURUNO FELCOM 250 y 500 permiten el acceso no autenticado al archivo xml/permission.xml que contiene todos los nombres de usuario y contrase\u00f1as del sistema. Esto incluye las cuentas de usuario Admin y Service y sus hashes MD5 sin sal, as\u00ed como la contrase\u00f1a del servidor SMS en texto claro"
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:furuno:felcom_250_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD42A27-9335-4502-9BF6-5FE54BB132DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:furuno:felcom_250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2619C51-C890-451A-8BEA-FC50C675440E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:furuno:felcom_500_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1523424-F39D-4107-A6AC-53C3CDD6778B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:furuno:felcom_500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D815085-EBBB-4341-AE0A-9C97CC7407B5"
}
]
}
]
}
],
"references": [
{
"url": "https://cyberskr.com/blog/furuno-felcom.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/CyberSKR/c00eabd6b1d5603d724b615ab358ff31",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}