mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
119 lines
4.3 KiB
JSON
119 lines
4.3 KiB
JSON
{
|
|
"id": "CVE-2014-0694",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2014-03-14T10:55:05.723",
|
|
"lastModified": "2014-03-14T17:56:47.767",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Intelligent Automation for Cloud (IAC) in Cisco Cloud Portal 9.4.1 and earlier includes a cryptographic key in binary files, which makes it easier for remote attackers to obtain cleartext data from an arbitrary IAC installation by leveraging knowledge of this key, aka Bug IDs CSCui34764, CSCui34772, CSCui34776, CSCui34798, CSCui34800, CSCui34805, CSCui34809, CSCui34810, CSCui34813, CSCui34814, and CSCui34818."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Intelligent Automation para Cloud (IAC) en Cisco Cloud Portal 9.4.1 y anteriores incluye una clave criptogr\u00e1fica en archivos binarios, lo que facilita a atacantes remotos obtener datos en texto claro de una instalaci\u00f3n de IAC arbitraria mediante el aprovechamiento de esta clave, tambi\u00e9n conocido como Bug IDs CSCui34764, CSCui34772, CSCui34776, CSCui34798, CSCui34800, CSCui34805, CSCui34809, CSCui34810, CSCui34813, CSCui34814 y CSCui34818."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-255"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cloud_portal:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "9.4.1",
|
|
"matchCriteriaId": "26D4A390-4F2E-4978-B2EE-D69315C19D94"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cloud_portal:9.1:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B42A12C4-FBA7-4A24-BD71-652DB9329766"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cloud_portal:9.1:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "257939F1-2806-48FC-A553-FBB8F974D041"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cloud_portal:9.1:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D064F97D-C82A-4834-B331-320FC769EBBF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cloud_portal:9.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "687EF522-0EDA-4572-B41C-5BEC96B93948"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cloud_portal:9.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C79C4C7F-A148-41CB-A80F-285CAFD9599E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cloud_portal:9.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5D66F9DC-FDBB-471B-8453-5452A7C5D124"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:cloud_portal:9.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EB10A254-3C6F-45B5-BBE8-9970366CEE9E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0694",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33336",
|
|
"source": "ykramarz@cisco.com"
|
|
}
|
|
]
|
|
} |