mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
148 lines
4.7 KiB
JSON
148 lines
4.7 KiB
JSON
{
|
|
"id": "CVE-2014-2940",
|
|
"sourceIdentifier": "cret@cert.org",
|
|
"published": "2014-08-15T11:15:42.950",
|
|
"lastModified": "2014-08-15T17:21:16.587",
|
|
"vulnStatus": "Analyzed",
|
|
"evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/798.html\">CWE-798: Use of Hard-coded Credentials</a>",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cobham Sailor 900 and 6000 satellite terminals with firmware 1.08 MFHF and 2.11 VHF have hardcoded credentials for the administrator account, which allows attackers to obtain administrative control by leveraging physical access or terminal access."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los terminales de sat\u00e9lite Cobham Sailor 900 y 6000 con firmware 1.08 MFHF y 2.11 VHF tienen las credenciales embebidas para la cuenta del administrador, lo que permite a atacantes obtener el control administrativo mediante el aprovechamiento del acceso f\u00edsico o acceso al terminal."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cobham:sailor_900_firmware:1.08_mfhf:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "63D4B0A2-4B55-4262-A505-1FA798BD83AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cobham:sailor_900_firmware:2.11_vhf:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "89C816D4-46C7-4E22-A01C-EB3F0B5AA0E3"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cobham:sailor_900_vsat:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7704EFE7-FCF8-4109-AE65-B162604E0025"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cobham:sailor_6000_series_firmware:1.08_mfhf:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E1A7D4EA-0BAB-446D-BDF9-88432B3504EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cobham:sailor_6000_series_firmware:2.11_vhf:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "12E7C8AE-0F1F-4EC1-8D27-52DDBC60E609"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cobham:ailor_6110_mini-c_gmdss:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DEA4C870-472D-4CE8-BAF7-B489DA48AC4E"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cobham:sailor_6006_message_terminal:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D85C2D45-B835-4374-B3AB-B3DE311BBFFA"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cobham:sailor_6222_vhf:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C6CDFC3D-35A7-4530-A253-62E5DF82F3CD"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cobham:sailor_6300_mf_\\/_hf:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0328B479-A9BA-49A9-B352-70D8816F4463"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/460687",
|
|
"source": "cret@cert.org",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
}
|
|
]
|
|
} |