mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
101 lines
3.2 KiB
JSON
101 lines
3.2 KiB
JSON
{
|
|
"id": "CVE-2015-0768",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2015-06-12T14:59:00.067",
|
|
"lastModified": "2017-01-04T16:03:14.727",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Device Work Center (DWC) component in Cisco Prime Network Control System (NCS) 2.1(0.0.85), 2.2(0.0.58), and 2.2(0.0.69) does not properly implement AAA roles, which allows remote authenticated users to bypass intended access restrictions and execute commands via a login session, aka Bug ID CSCur27371."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El componente Device Work Center (DWC) en Cisco Prime Network Control System (NCS) 2.1(0.0.85), 2.2(0.0.58), y 2.2(0.0.69) no implementa correctamente los roles AAA, lo que permite a usuarios remotos autenticados evadir las restricciones de acceso y ejecutar comandos a trav\u00e9s de una sesi\u00f3n de inicio de sesi\u00f3n, tambi\u00e9n conocido como Bug ID CSCur27371."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.5
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:prime_network_control_system:2.1\\(0.0.85\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "351DCD00-92F5-4012-A845-2EAF3EA112CB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:prime_network_control_system:2.2\\(0.0.58\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E79C1A40-8AA3-482C-9B5E-072A7A25EF52"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:prime_network_control_system:2.2\\(0.0.69\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "828A121A-0D18-45A5-8E84-CD01CCA7C555"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39192",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1032541",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
}
|
|
]
|
|
} |