2025-01-26 03:03:52 +00:00

125 lines
4.2 KiB
JSON

{
"id": "CVE-2016-6449",
"sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:01.610",
"lastModified": "2024-11-21T02:56:09.337",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the system management of certain FireAMP system processes in Cisco FireAMP Connector Endpoint software could allow an authenticated, local attacker to stop certain protected FireAMP processes without requiring a password. Stopping certain critical processes could cause a denial of service (DoS) condition, and certain security features could no longer be available. More Information: CSCvb40597. Known Affected Releases: 1."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el sistema de administraci\u00f3n de ciertos procesos de sistema FireAMP en el software Cisco FireAMP Connector Endpoint puede permitir a un atacante local no autenticado parar ciertos procesos de protecci\u00f3n FireAMP sin que se requiera una contrase\u00f1a. La parada de ciertos procesos cr\u00edticos pueden provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) y ciertas funciones de seguridad podr\u00edan no estar disponibles M\u00e1s informaci\u00f3n: CSCvb40597. Lanzamientos Afectados Conocidos: 1."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 4.6,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:fireamp_connector_endpoint_software:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "260D02EF-FBD0-4226-AB60-CE39DC0879C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:fireamp_connector_endpoint_software:4.4.2.10200:*:*:*:*:*:*:*",
"matchCriteriaId": "7C9AB74D-5A31-471A-8AB1-4EF767B0B03B"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/94814",
"source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-fireamp",
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/94814",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-fireamp",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}