2025-01-26 03:03:52 +00:00

139 lines
4.0 KiB
JSON

{
"id": "CVE-2015-4202",
"sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-20T14:59:01.947",
"lastModified": "2024-11-21T02:30:37.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS 12.2SCH on uBR10000 router Cable Modem Termination Systems (CMTS) does not properly restrict access to the IP Detail Record (IPDR) service, which allows remote attackers to obtain potentially sensitive MAC address and network-utilization information via crafted IPDR packets, aka Bug ID CSCua39203."
},
{
"lang": "es",
"value": "Cisco IOS 12.2SCH en Cable Modem Termination Systems (CMTS) de los routers uBR10000 no restringe correctamente el acceso al servicio IP Detail Record (IPDR), lo que permite a atacantes remotos obtener informaci\u00f3n potencialmente sensible de direcciones MAC y utilizaci\u00f3n de red a trav\u00e9s de paquetes IPDR manipulados, tambi\u00e9n conocido como Bug ID CSCua39203."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sch:*:*:*:*:*:*:*",
"matchCriteriaId": "4B0B3338-E4D5-4095-8974-71E53C331994"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2sch:*:*:*:*:*:*:*",
"matchCriteriaId": "B4036869-5126-4C78-9F5E-3159F8FC62EB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ubr10000_cable_modem_termination_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D71FF316-A3D6-4B5B-BF23-45FCFF0ADE76"
}
]
}
]
}
],
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39432",
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75321",
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1032678",
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39432",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75321",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1032678",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}