René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

148 lines
4.6 KiB
JSON

{
"id": "CVE-2022-29082",
"sourceIdentifier": "security_alert@emc.com",
"published": "2022-05-26T16:15:08.313",
"lastModified": "2022-06-08T15:25:47.373",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Dell EMC NetWorker versions 19.1.x, 19.1.0.x, 19.1.1.x, 19.2.x, 19.2.0.x, 19.2.1.x 19.3.x, 19.3.0.x, 19.4.x, 19.4.0.x, 19.5.x,19.5.0.x, 19.6 and 19.6.0.1 and 19.6.0.2 contain an Improper Validation of Certificate with Host Mismatch vulnerability in Rabbitmq port 5671 which could allow remote attackers to spoof certificates."
},
{
"lang": "es",
"value": "Dell EMC NetWorker versiones 19.1.x, 19.1.0.x, 19.1.1.x, 19.2.x, 19.2.0.x, 19.2.1.x 19.3.x, 19.3.0.x, 19.4.x, 19.4.0.x, 19.5.x,19.5.0.x, 19.6 y 19.6.0.1 y 19. 6.0.2, contienen una vulnerabilidad de comprobaci\u00f3n inapropiada de certificado con desajuste de host en el puerto 5671 de Rabbitmq que podr\u00eda permitir a atacantes remotos falsificar certificados"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 2.5
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.9
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-297"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:emc_networker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "19.1.1.0",
"versionEndExcluding": "19.5.0.7",
"matchCriteriaId": "50809EA5-5FD4-4EA9-8B16-5B989C3148C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:emc_networker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "19.6.0",
"versionEndExcluding": "19.6.0.3",
"matchCriteriaId": "F023FC70-23F2-41DA-8C65-08E158202A68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:emc_networker:19.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ABFB4AAA-A491-4B6E-91F2-79AA0D44EB1F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/000198987",
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}