René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

130 lines
5.2 KiB
JSON

{
"id": "CVE-2017-6730",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2017-07-10T20:29:00.593",
"lastModified": "2017-07-16T23:31:33.153",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based GUI of Cisco Wide Area Application Services (WAAS) Central Manager could allow an unauthenticated, remote attacker to retrieve completed reports from an affected system, aka Information Disclosure. This vulnerability affects the following products if they are running an affected release of Cisco Wide Area Application Services (WAAS) Software and are configured to use the Central Manager function: Cisco Virtual Wide Area Application Services (vWAAS), Cisco Wide Area Application Services (WAAS) Appliances, Cisco Wide Area Application Services (WAAS) Modules. Only Cisco WAAS products that are configured with the Central Manager role are affected by this vulnerability. More Information: CSCvd87574. Known Affected Releases: 4.4(7) 6.2(1) 6.2(3). Known Fixed Releases: 6.3(0.228) 6.3(0.226) 6.2(3d)8 5.5(7b)17."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz gr\u00e1fica de usuario web de Cisco Wide Area Application Services (WAAS) Central Manager podr\u00eda permitir que un atacante remoto no autenticado recupere informes completos de un sistema afectado. Esto tambi\u00e9n se conoce como divulgaci\u00f3n de informaci\u00f3n. Esta vulnerabilidad afecta a los siguientes productos si est\u00e1n ejecutando una versi\u00f3n afectada de Cisco Wide Area Application Services (WAAS) Software y est\u00e1n configurados para emplear la funci\u00f3n Central Manager: Cisco Virtual Wide Area Application Services (vWAAS), Cisco Wide Area Application Services (WAAS) Appliances, Cisco Wide Area Application Services (WAAS) Modules. Solo los productos Cisco WAAS que est\u00e1n configurados con el rol Central Manager se han visto afectados por esta vulnerabilidad.\nM\u00e1s informaci\u00f3n: CSCvd87574. Versiones afectadas conocidas: 4.4(7) 6.2(1) 6.2(3). Versiones corregidas conocidas: 6.3(0.228) 6.3(0.226) 6.2(3d)8 5.5(7b)17."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:wide_area_application_services:4.4\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FACB0E71-4EE9-4B8C-971F-8C0AAC299E78"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:wide_area_application_services:6.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1FB7741B-037F-480F-B90A-CB60055C1EDC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:wide_area_application_services:6.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8A5BB7A1-FB47-4BB7-AC5A-199345BADC84"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/99481",
"source": "ykramarz@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1038825",
"source": "ykramarz@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-waas1",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}