René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

116 lines
3.8 KiB
JSON

{
"id": "CVE-2018-6312",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-03-10T22:29:00.350",
"lastModified": "2021-09-09T13:35:06.243",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A privileged account with a weak default password on the Foxconn femtocell FEMTO AP-FC4064-T version AP_GT_B38_5.8.3lb15-W47 LTE Build 15 can be used to turn on the TELNET service via the web interface, which allows root login without any password. This vulnerability will lead to full system compromise and disclosure of user communications. The foxconn account with an 8-character lowercase alphabetic password can be used."
},
{
"lang": "es",
"value": "Una cuenta privilegiada con una contrase\u00f1a d\u00e9bil por defecto en Foxconn femtocell FEMTO AP-FC4064-T, versi\u00f3n AP_GT_B38_5.8.3lb15-W47 LTE Build 15, puede emplearse para activar el servicio TELNET mediante la interfaz web. Esto permite el inicio de sesi\u00f3n como root sin contrase\u00f1a. La vulnerabilidad conducir\u00e1 al compromiso total del sistema y a la revelaci\u00f3n de comunicaciones de usuario. Se puede emplear la cuenta de foxconn con una contrase\u00f1a de 8 caracteres alfanum\u00e9ricos en min\u00fascula."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-521"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:foxconn:ap-fc4064-t_firmware:ap_gt_b38_5.8.3lb15-w47_lte:*:*:*:*:*:*:*",
"matchCriteriaId": "D1996692-932A-4397-8DB9-C55C4D362FB5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:foxconn:ap-fc4064-t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BCB6BAB-3889-48DB-8C47-0E525338E69A"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/DrmnSamoLiu/cd1d6fa59501f161616686296aa4a6c8",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}