mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
100 lines
3.1 KiB
JSON
100 lines
3.1 KiB
JSON
{
|
|
"id": "CVE-2013-5535",
|
|
"sourceIdentifier": "psirt@cisco.com",
|
|
"published": "2013-10-16T10:52:45.307",
|
|
"lastModified": "2024-11-21T01:57:39.517",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The analytics page on Cisco Video Surveillance 4000 IP cameras has hardcoded credentials, which allows remote attackers to watch the video feed by leveraging knowledge of the password, aka Bug IDs CSCuj70402 and CSCuj70419."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La p\u00e1gina de anal\u00edticas en c\u00e1maras IP Cisco Video Surveillance 4000 tiene credenciales embebidas en el c\u00f3digo, lo que permite a atacantes remotos ver el streaming de video aprovechando el conocimiento de la contrase\u00f1a, tambien conocido como Bug ID SCuj70402 y CSCuj70419."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
|
"baseScore": 6.4,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-255"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:video_surveillance_4000_ip_camera:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7725752F-91EE-4BDA-83A7-3830ED6D0791"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:video_surveillance_4300e_ip_camera:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ABE86502-7BBF-43C5-BFF2-0BF4E2D3C0C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:video_surveillance_4500e_ip_camera:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A0F88241-1468-4C3C-A4AF-513B7FAE85B0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5535",
|
|
"source": "psirt@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5535",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |