mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
276 lines
10 KiB
JSON
276 lines
10 KiB
JSON
{
|
|
"id": "CVE-2015-1388",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2015-03-24T17:59:05.523",
|
|
"lastModified": "2024-11-21T02:25:19.483",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The \"RAP console\" feature in ArubaOS 5.x through 6.2.x, 6.3.x before 6.3.1.15, and 6.4.x before 6.4.2.4 on Aruba access points in Remote Access Point (AP) mode allows remote attackers to execute arbitrary commands via unspecified vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La caracter\u00edstica 'RAP console' en ArubaOS 5.x hasta 6.2.x, 6.3.x anterior a 6.3.1.15, y 6.4.x anterior a 6.4.2.4 en los puntos de acceso de Aruba en el modo Remote Access Point (AP) permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de vectores no especificados."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"baseScore": 7.2,
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-78"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "6.2.3.9",
|
|
"matchCriteriaId": "226C7777-ECCC-49D2-8EB1-DD9EF57C90CC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C9792484-1C9D-4A94-8BC0-F3389388037A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "83D0BE40-36C1-4177-A545-BC1F7435C1BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E6A8B524-49C4-4069-9F08-795EE3ABEFEC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB28256E-588F-4FB4-896A-15AF51F96992"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2652D8B-C361-4349-B7FC-3C40BF0A3F43"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "22013B3A-82E6-4960-9D6D-0BEF991153F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "923BCFD5-15F0-4088-9E24-7CA5626AAB5B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F73767C4-E464-430D-AE4D-80544CDD5023"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "772E90DA-9454-4E4A-9E8E-82D9F6CCAFC6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "779FF186-DBB8-4299-862F-81BAF411AF62"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6CFA43C9-68E3-4F6B-ACAD-38BB7E1CDB42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5F76952D-23C9-44BD-A93B-4EA5E934F481"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E4E3800-202E-4599-8F9C-FA59A36006EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "56CC06B0-0A1E-48CB-8C0E-77F287D7089F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "01B03A21-2068-4D87-BB91-23A2248450ED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5F679BAD-2DD2-4C68-9972-719B00E1B985"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A7E1847B-18D8-48B5-96AB-289B634D4E5A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1043AAAB-7552-445A-ACDA-D09CDCC1CBC8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "28014EEA-14CC-4BC7-8762-D40E5C4BA9B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B9240A24-DDAD-4796-81DA-C884F6816628"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "448B58B9-6693-4CF5-8E2A-686E62C6751A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D56FECAA-0C24-4F05-8782-08D9344BD177"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "76414368-D5D8-4A72-8314-2FF4B393763E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7A40A06-AF71-4D9A-B2D5-4B0B3E29C602"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C405B24F-ED7E-45C6-9752-0970B62BFE14"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51A1AACA-EACF-4E7B-A03D-7BD5875F421E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "43D8D27F-7B6E-4444-950D-00EE3C739BF7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "33DE6F99-3E4E-4F54-90D3-FB542818C821"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A183A679-A166-43A6-B087-42E836CB7F40"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "74B79D94-3A33-4FEB-A335-CE6E8A4C7DCC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "280CDEE1-4B4B-45B1-8D3F-0E115050F1EF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "48D60A7F-143A-4A99-8ABD-77C6EC60392D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CEA14349-BACC-4A0C-A5AD-0EAA17E1F544"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F4E02C8F-5161-4331-A2E7-1333AF9A0EEB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.4.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "90646603-434E-498B-A4DF-4ABC8666CE4D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.4.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE3AFA15-9EAF-4833-BE89-F9EB7E9C9B86"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.4.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6184E5F6-A647-4A0C-9A96-F666D18F4053"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-004.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-004.txt",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |