René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

256 lines
8.1 KiB
JSON

{
"id": "CVE-2016-8209",
"sourceIdentifier": "sirt@brocade.com",
"published": "2017-05-08T18:29:00.247",
"lastModified": "2017-07-08T01:29:02.457",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module."
},
{
"lang": "es",
"value": "Comprobaci\u00f3n err\u00f3nea de condiciones inusuales o excepcionales en Brocade NetIron 05.8.00 y versiones posteriores hasta la versi\u00f3n 06.1.00 inclusive. Cuando el m\u00f3dulo de gesti\u00f3n se escanea continuamente en el puerto 22, puede permitir a los atacantes provocar una denegaci\u00f3n de servicio (bloqueo y reinicio) del m\u00f3dulo de gesti\u00f3n."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:brocade:netiron_mlx_series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74935A30-8065-4F87-99FB-DD8B39C8FE92"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_mlxe-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF909A9A-69E1-4BEC-B16C-16EE7652D858"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_mlxe-32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E751734-9855-4525-8056-53A12AE1C15D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_mlxe-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "045DF755-C804-449F-A452-578592788D39"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_mlxe-8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56EA291A-4D1D-48ED-A8AF-76F1A2BECD13"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:brocade:netiron_cer_series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "613E20A7-07B6-4771-8F09-4ED9FA197BEE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_cer_2024c-4x-rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "739A02DA-84DD-462F-B0A1-FE22653C4A9C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_cer_2024f-4x-rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4D8757-F3E5-4AC1-9F6B-85687B70CB41"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_cer_2024f-rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FF952A7-E730-4D90-B4B6-84729A0A9E04"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_cer_2048fx-rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76479441-A6B4-47DA-B857-2FEC94FF236E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:brocade:netiron_ces_series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0687B3C5-FF7E-4B60-A295-4B616005939C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_ces_2024c-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D54CE6AC-8574-48BA-B01A-9347DB4AB2A2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_ces_2024f-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C42F0A-7BF3-4B7C-B6D7-344B3F2C7774"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_ces_2048fx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0305844-4A09-41A7-84FB-00E51F732C95"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:brocade:netiron_xmr_series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5E9BB53-74D3-40E2-B4C1-A8FBFC5BB6AF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_xmr_16000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DF476B2-7DA0-4D15-9E2C-013DB97C2814"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_xmr_32000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C098C5F9-617A-4528-A8BE-0EAC37127400"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_xmr_4000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DBD4820-B983-4A77-8C83-BFA6D63F6FE6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:brocade:netiron_xmr_8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3C81BAD-D528-401F-98BC-1E6F9BA80846"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securitytracker.com/id/1038402",
"source": "sirt@brocade.com"
},
{
"url": "https://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-315.htm",
"source": "sirt@brocade.com",
"tags": [
"Vendor Advisory"
]
}
]
}