2024-12-08 03:06:42 +00:00

133 lines
4.4 KiB
JSON

{
"id": "CVE-2010-4302",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-11-22T20:00:04.057",
"lastModified": "2024-11-21T01:20:38.767",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "/opt/rv/Versions/CurrentVersion/Mcu/Config/Mcu.val in Cisco Unified Videoconferencing (UVC) System 5110 and 5115, when the Linux operating system is used, uses a weak hashing algorithm for the (1) administrator and (2) operator passwords, which makes it easier for local users to obtain sensitive information by recovering the cleartext values, aka Bug ID CSCti54010."
},
{
"lang": "es",
"value": "/opt/rv/Versions/CurrentVersion/Mcu/Config/Mcu.val en Cisco Unified Videoconferencing (UVC) System 5110 y 5115, cuando se usa Linux, utiliza un algoritmo d\u00e9bil de para calcular el resumen (hash) de las contrase\u00f1as de (1) administrador y (2) operador, lo que facilita a usuarios locales obtener informaci\u00f3n sensible recuperando valores en texto claro, tambi\u00e9n conocido como error ID CSCti54010."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"baseScore": 4.9,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-310"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_videoconferencing_system_5110_firmware:7.0.1.13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FCDF0DD6-EF3E-4758-A715-1814EA7D603D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_videoconferencing_system_5115_firmware:7.0.1.13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "619E7A89-B6B3-4E3B-BB63-5B142920984B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:cisco:unified_videoconferencing_system_5110:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45DF769C-376D-4D65-B36E-E0F19BD7C8D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:cisco:unified_videoconferencing_system_5115:*:*:*:*:*:*:*:*",
"matchCriteriaId": "615E1C8A-DC4D-40B4-BF9F-E218469E9749"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2010/Nov/167",
"source": "cve@mitre.org"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_response09186a0080b56d0d.html",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.trustmatta.com/advisories/MATTA-2010-001.txt",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2010/Nov/167",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_response09186a0080b56d0d.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.trustmatta.com/advisories/MATTA-2010-001.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}