mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
127 lines
3.8 KiB
JSON
127 lines
3.8 KiB
JSON
{
|
|
"id": "CVE-2022-36308",
|
|
"sourceIdentifier": "cve-assign@fb.com",
|
|
"published": "2022-08-16T01:15:13.480",
|
|
"lastModified": "2024-11-21T07:12:45.077",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Airspan AirVelocity 1500 web management UI displays SNMP credentials in plaintext on software versions older than 15.18.00.2511, and stores SNMPv3 credentials unhashed on the filesystem, enabling anyone with web access to use these credentials to manipulate the eNodeB over SNMP. This issue may affect other AirVelocity and AirSpeed models."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La interfaz de administraci\u00f3n web de Airspan AirVelocity 1500 muestra las credenciales SNMP en texto plano en las versiones de software anteriores a 15.18.00.2511, y almacena las credenciales SNMPv3 sin codificar en el sistema de archivos, lo que permite a cualquier persona con acceso a la web usar estas credenciales para manipular el eNodeB a trav\u00e9s de SNMP. Este problema puede afectar a otros modelos AirVelocity y AirSpeed."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
|
"baseScore": 9.1,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.2
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cve-assign@fb.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-256"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-522"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:airspan:airvelocity_1500_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "9.3.0.01249",
|
|
"versionEndIncluding": "15.18.00.2511",
|
|
"matchCriteriaId": "ECF71DBB-8D4C-4A82-8F4B-3907062C1379"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:airspan:airvelocity_1500:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DB5DBFEA-0C64-4E87-A11E-6C850D4C87CE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-qjgc-rx8m-q58x",
|
|
"source": "cve-assign@fb.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://helpdesk.airspan.com/browse/TRN3-1692",
|
|
"source": "cve-assign@fb.com",
|
|
"tags": [
|
|
"Permissions Required",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-qjgc-rx8m-q58x",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://helpdesk.airspan.com/browse/TRN3-1692",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Permissions Required",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |