René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

116 lines
3.4 KiB
JSON

{
"id": "CVE-2019-10972",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2019-07-26T00:15:11.277",
"lastModified": "2020-10-02T13:59:13.277",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Mitsubishi Electric FR Configurator2, Version 1.16S and prior. This vulnerability can be triggered when an attacker provides the target with a rogue project file (.frc2). Once a user opens the rogue project, CPU exhaustion occurs, which causes the software to quit responding until the application is restarted."
},
{
"lang": "es",
"value": "FR Configurator2 de Mitsubishi Electric, versi\u00f3n 1.16S y anteriores. Esta vulnerabilidad puede ser activada cuando un atacante proporciona a la victima un archivo de proyecto no autorizado (.frc2). Una vez que un usuario abre el proyecto no autorizado, ocurre un agotamiento de la CPU, lo que causa que el software deje de responder hasta que se reinicie la aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitsubishielectric:electric_fr_configurator2:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.16s",
"matchCriteriaId": "7B582A19-3A57-41C4-AC41-1D6154106044"
}
]
}
]
}
],
"references": [
{
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-204-01",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}