mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
256 lines
8.1 KiB
JSON
256 lines
8.1 KiB
JSON
{
|
|
"id": "CVE-2016-8209",
|
|
"sourceIdentifier": "sirt@brocade.com",
|
|
"published": "2017-05-08T18:29:00.247",
|
|
"lastModified": "2017-07-08T01:29:02.457",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Comprobaci\u00f3n err\u00f3nea de condiciones inusuales o excepcionales en Brocade NetIron 05.8.00 y versiones posteriores hasta la versi\u00f3n 06.1.00 inclusive. Cuando el m\u00f3dulo de gesti\u00f3n se escanea continuamente en el puerto 22, puede permitir a los atacantes provocar una denegaci\u00f3n de servicio (bloqueo y reinicio) del m\u00f3dulo de gesti\u00f3n."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-754"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:brocade:netiron_mlx_series_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "74935A30-8065-4F87-99FB-DD8B39C8FE92"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_mlxe-16:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CF909A9A-69E1-4BEC-B16C-16EE7652D858"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_mlxe-32:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0E751734-9855-4525-8056-53A12AE1C15D"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_mlxe-4:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "045DF755-C804-449F-A452-578592788D39"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_mlxe-8:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "56EA291A-4D1D-48ED-A8AF-76F1A2BECD13"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:brocade:netiron_cer_series_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "613E20A7-07B6-4771-8F09-4ED9FA197BEE"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_cer_2024c-4x-rt:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "739A02DA-84DD-462F-B0A1-FE22653C4A9C"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_cer_2024f-4x-rt:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE4D8757-F3E5-4AC1-9F6B-85687B70CB41"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_cer_2024f-rt:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1FF952A7-E730-4D90-B4B6-84729A0A9E04"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_cer_2048fx-rt:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "76479441-A6B4-47DA-B857-2FEC94FF236E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:brocade:netiron_ces_series_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0687B3C5-FF7E-4B60-A295-4B616005939C"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_ces_2024c-4x:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D54CE6AC-8574-48BA-B01A-9347DB4AB2A2"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_ces_2024f-4x:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7C42F0A-7BF3-4B7C-B6D7-344B3F2C7774"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_ces_2048fx:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D0305844-4A09-41A7-84FB-00E51F732C95"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:brocade:netiron_xmr_series_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F5E9BB53-74D3-40E2-B4C1-A8FBFC5BB6AF"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_xmr_16000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7DF476B2-7DA0-4D15-9E2C-013DB97C2814"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_xmr_32000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C098C5F9-617A-4528-A8BE-0EAC37127400"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_xmr_4000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6DBD4820-B983-4A77-8C83-BFA6D63F6FE6"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:brocade:netiron_xmr_8000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F3C81BAD-D528-401F-98BC-1E6F9BA80846"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1038402",
|
|
"source": "sirt@brocade.com"
|
|
},
|
|
{
|
|
"url": "https://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-315.htm",
|
|
"source": "sirt@brocade.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |