2024-12-08 03:06:42 +00:00

98 lines
3.3 KiB
JSON

{
"id": "CVE-2010-2025",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-05-26T19:30:01.390",
"lastModified": "2024-11-21T01:15:44.267",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web interface on the Cisco Scientific Atlanta WebSTAR DPC2100R2 cable modem with firmware 2.0.2r1256-060303 allow remote attackers to hijack the authentication of administrators for requests that (1) reset the modem, (2) erase the firmware, (3) change the administrative password, (4) install modified firmware, or (5) change the access level, as demonstrated by a request to goform/_aslvl."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en la interfaz web en el cable modem Cisco Scientific Atlanta WebSTAR DPC2100R2 con firmware 2.0.2r1256-060303 permite a atacantes remotos secuestrar la autenticaci\u00f3n de adminsitradores para peticiones que (1) resetean el modem, (2) borran el firmware, (3) change the administrative password, (4) instala firmware modificado, or (5) cambia los niveles de acceso, como se demostr\u00f3 con una petici\u00f3n goform/_aslvl."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:cisco:scientific_atlanta_webstar_dpc2100r2:2.0.2r1256-060303:*:*:*:*:*:*:*",
"matchCriteriaId": "81CAE5FA-2676-4D86-8DBE-8675B2D87E00"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0322.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/40346",
"source": "cve@mitre.org"
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0322.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/40346",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}