2024-12-08 03:06:42 +00:00

169 lines
4.7 KiB
JSON

{
"id": "CVE-2018-16591",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-09-10T17:29:00.587",
"lastModified": "2024-11-21T03:53:00.707",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FURUNO FELCOM 250 and 500 devices allow unauthenticated users to change the password for the Admin, Log and Service accounts, as well as the password for the protected \"SMS\" panel via /cgi-bin/sm_changepassword.cgi and /cgi-bin/sm_sms_changepasswd.cgi."
},
{
"lang": "es",
"value": "Los dispositivos FURUNO FELCOM 250 y 500 permiten que usuarios no autenticados cambien la contrase\u00f1a para las cuentas Admin, Log y Service, as\u00ed como la contrase\u00f1a para el panel \"SMS\" protegido mediante /cgi-bin/sm_changepassword.cgi y /cgi-bin/sm_sms_changepasswd.cgi"
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:furuno:felcom_250_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD42A27-9335-4502-9BF6-5FE54BB132DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:furuno:felcom_250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2619C51-C890-451A-8BEA-FC50C675440E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:furuno:felcom_500_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1523424-F39D-4107-A6AC-53C3CDD6778B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:furuno:felcom_500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D815085-EBBB-4341-AE0A-9C97CC7407B5"
}
]
}
]
}
],
"references": [
{
"url": "https://cyberskr.com/blog/furuno-felcom.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/CyberSKR/2c30d964d48b5e1518ded88bd953b710",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cyberskr.com/blog/furuno-felcom.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/CyberSKR/2c30d964d48b5e1518ded88bd953b710",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}