2025-04-09 02:05:49 +00:00

180 lines
5.8 KiB
JSON

{
"id": "CVE-2007-2282",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-04-26T19:19:00.000",
"lastModified": "2025-04-09T00:30:58.490",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Network Services (CNS) NetFlow Collection Engine (NFC) before 6.0 has an nfcuser account with the default password nfcuser, which allows remote attackers to modify the product configuration and, when installed on Linux, obtain login access to the host operating system."
},
{
"lang": "es",
"value": "Cisco Network Services (CNS) NetFlow Collection Engine (NFC) anterior a 6.0 tiene una cuenta nfcuser con la contrase\u00f1a por defecto nfcuser, lo cual permite a atacantes remotos modificar la configuraci\u00f3n del producto y, cuando se instala sobre Linux, obtener acceso de login en el sistema operativo host."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:netflow_collection_engine:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1807D723-161A-46FD-9AD7-F7C69D0A8413"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:netflow_collection_engine:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6B221905-FA88-42E4-AD14-46C898BD2F28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:netflow_collection_engine:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D8E52AEC-B8E0-42F3-B856-C1057E7C45F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:netflow_collection_engine:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B886D5FF-14E2-49BB-9E7A-CA4A4856012B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:netflow_collection_engine:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "98F41DD9-70BA-443F-8A77-5DADC03E03D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:netflow_collection_engine:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4853160D-497B-48CA-AA86-CA58C9893D0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:netflow_collection_engine:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3BB06510-5A6C-4360-9362-62F1EAA52C94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:netflow_collection_engine:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CC215FF5-586D-483E-A53A-D2057AA7A18B"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1017960",
"source": "cve@mitre.org"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008082c520.shtml",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/127545",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.osvdb.org/35524",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/23647",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/1545",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33861",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1017960",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008082c520.shtml",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/127545",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.osvdb.org/35524",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/23647",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2007/1545",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33861",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
],
"evaluatorSolution": "The vendor has addressed this issue through the update 6.0.0 of the NetFlow Collection Engine."
}