All the vulnerabilites related to Microsoft - Java SDK
cve-2018-8119
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104070 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:46:13.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119" }, { "name": "104070", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104070" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "C# SDK", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "Azure IoT" } ] }, { "product": "C SDK", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "Azure IoT" } ] }, { "product": "Java SDK", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "Azure IoT" } ] } ], "datePublic": "2018-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A spoofing vulnerability exists when the Azure IoT Device Provisioning AMQP Transport library improperly validates certificates over the AMQP protocol, aka \"Azure IoT SDK Spoofing Vulnerability.\" This affects C# SDK, C SDK, Java SDK." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-10T09:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119" }, { "name": "104070", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104070" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2018-8119", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "C# SDK", "version": { "version_data": [ { "version_value": "Azure IoT" } ] } }, { "product_name": "C SDK", "version": { "version_data": [ { "version_value": "Azure IoT" } ] } }, { "product_name": "Java SDK", "version": { "version_data": [ { "version_value": "Azure IoT" } ] } } ] }, "vendor_name": "Microsoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A spoofing vulnerability exists when the Azure IoT Device Provisioning AMQP Transport library improperly validates certificates over the AMQP protocol, aka \"Azure IoT SDK Spoofing Vulnerability.\" This affects C# SDK, C SDK, Java SDK." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119" }, { "name": "104070", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104070" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2018-8119", "datePublished": "2018-05-09T19:00:00", "dateReserved": "2018-03-14T00:00:00", "dateUpdated": "2024-08-05T06:46:13.225Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201805-1058
Vulnerability from variot
A spoofing vulnerability exists when the Azure IoT Device Provisioning AMQP Transport library improperly validates certificates over the AMQP protocol, aka "Azure IoT SDK Spoofing Vulnerability." This affects C# SDK, C SDK, Java SDK. Microsoft C #, C, and Java SDK for Azure IoT are software development kits for Microsoft Azure (Microsoft) based on C #, C, and Java languages for developing Azure IoT (Internet of Things Platform) applications, respectively. An attacker could use this vulnerability to impersonate a server. Multiple Microsoft Azure IoT SDKs are prone to a security vulnerability that may allow attackers to conduct spoofing attacks. A man-in-the-middle attacker can exploit this issue to conduct spoofing attacks and perform unauthorized actions; other attacks are also possible
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201805-1058", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "csharp software development kit", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "*" }, { "model": "c software development kit", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "*" }, { "model": "java software development kit", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "*" }, { "model": "c# sdk for azure iot", "scope": "eq", "trust": 0.9, "vendor": "microsoft", "version": "0" }, { "model": "java sdk for azure iot", "scope": "eq", "trust": 0.9, "vendor": "microsoft", "version": "0" }, { "model": "c sdk", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for azure iot" }, { "model": "c# sdk", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for azure iot" }, { "model": "java sdk", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for azure iot" }, { "model": "c sdk for azure iot no", "scope": null, "trust": 0.6, "vendor": "microsoft", "version": null }, { "model": "csharp software development kit", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "azure_internet_of_things" }, { "model": "java software development kit", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "azure_internet_of_things" }, { "model": "c software development kit", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "azure_internet_of_things" }, { "model": "c sdk for azure iot", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-11134" }, { "db": "BID", "id": "104070" }, { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "NVD", "id": "CVE-2018-8119" }, { "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:c_software_development_kit:*:*:*:*:*:azure_internet_of_things:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:csharp_software_development_kit:*:*:*:*:*:azure_internet_of_things:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:java_software_development_kit:*:*:*:*:*:azure_internet_of_things:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-8119" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cristian Pop, Rajeev Vokkarne, John Spaith, and Tim Taylor of Azure IoT", "sources": [ { "db": "BID", "id": "104070" } ], "trust": 0.3 }, "cve": "CVE-2018-8119", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2018-8119", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-11134", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.2, "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2018-8119", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-8119", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-11134", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201805-291", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-11134" }, { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "NVD", "id": "CVE-2018-8119" }, { "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A spoofing vulnerability exists when the Azure IoT Device Provisioning AMQP Transport library improperly validates certificates over the AMQP protocol, aka \"Azure IoT SDK Spoofing Vulnerability.\" This affects C# SDK, C SDK, Java SDK. Microsoft C #, C, and Java SDK for Azure IoT are software development kits for Microsoft Azure (Microsoft) based on C #, C, and Java languages for developing Azure IoT (Internet of Things Platform) applications, respectively. An attacker could use this vulnerability to impersonate a server. Multiple Microsoft Azure IoT SDKs are prone to a security vulnerability that may allow attackers to conduct spoofing attacks. \nA man-in-the-middle attacker can exploit this issue to conduct spoofing attacks and perform unauthorized actions; other attacks are also possible", "sources": [ { "db": "NVD", "id": "CVE-2018-8119" }, { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "CNVD", "id": "CNVD-2018-11134" }, { "db": "CNNVD", "id": "CNNVD-201805-291" }, { "db": "BID", "id": "104070" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-8119", "trust": 3.3 }, { "db": "BID", "id": "104070", "trust": 1.9 }, { "db": "JVNDB", "id": "JVNDB-2018-005095", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-11134", "trust": 0.6 }, { "db": "NSFOCUS", "id": "39660", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201805-291", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-11134" }, { "db": "BID", "id": "104070" }, { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "NVD", "id": "CVE-2018-8119" }, { "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "id": "VAR-201805-1058", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-11134" } ], "trust": 1.2805555533333333 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-11134" } ] }, "last_update_date": "2023-12-18T12:36:46.134000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2018-8119 | Azure IoT SDK Spoofing Vulnerability", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8119" }, { "title": "CVE-2018-8119 | Azure IoT SDK \u306e\u306a\u308a\u3059\u307e\u3057\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/cve-2018-8119" }, { "title": "Patch for Microsoft Azure IoT SDK man-in-the-middle spoofing vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/131505" }, { "title": "Microsoft C# , C and Java SDK for Azure IoT Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=79969" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-11134" }, { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-295", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "NVD", "id": "CVE-2018-8119" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8119" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/104070" }, { "trust": 1.0, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=57754\u0026vs_f=alert%20rss\u0026vs_cat=security%20intelligence\u0026vs_type=rss\u0026vs_p=microsoft%20azure%20iot%20sdk%20amqp%20transport%20library%20spoofing%20vulnerability\u0026vs_k=1" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8119" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20180509-ms.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2018/at180021.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8119" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/39660" }, { "trust": 0.3, "url": "http://www.microsoft.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-11134" }, { "db": "BID", "id": "104070" }, { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "NVD", "id": "CVE-2018-8119" }, { "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-11134" }, { "db": "BID", "id": "104070" }, { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "NVD", "id": "CVE-2018-8119" }, { "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-08T00:00:00", "db": "CNVD", "id": "CNVD-2018-11134" }, { "date": "2018-05-08T00:00:00", "db": "BID", "id": "104070" }, { "date": "2018-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "date": "2018-05-09T19:29:01.230000", "db": "NVD", "id": "CVE-2018-8119" }, { "date": "2018-05-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-08T00:00:00", "db": "CNVD", "id": "CNVD-2018-11134" }, { "date": "2018-05-08T00:00:00", "db": "BID", "id": "104070" }, { "date": "2018-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "date": "2018-06-18T16:39:22.387000", "db": "NVD", "id": "CVE-2018-8119" }, { "date": "2018-05-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201805-291" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Azure IoT SDK Impersonation vulnerability in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-005095" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201805-291" } ], "trust": 0.6 } }
var-201903-1269
Vulnerability from variot
An information disclosure vulnerability exists in the way Azure IoT Java SDK logs sensitive information, aka 'Azure IoT Java SDK Information Disclosure Vulnerability'. A remote attacker could use this vulnerability to obtain information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201903-1269", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "java software development kit", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "java sdk", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for azure iot" }, { "model": "java sdk for azure iot", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" } ], "sources": [ { "db": "BID", "id": "106971" }, { "db": "JVNDB", "id": "JVNDB-2019-002330" }, { "db": "NVD", "id": "CVE-2019-0741" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:java_software_development_kit:-:*:*:*:*:azure_internet_of_things:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0741" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Microsoft", "sources": [ { "db": "BID", "id": "106971" }, { "db": "CNNVD", "id": "CNNVD-201902-409" } ], "trust": 0.9 }, "cve": "CVE-2019-0741", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-0741", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-0741", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0741", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201902-409", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-0741", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-0741" }, { "db": "JVNDB", "id": "JVNDB-2019-002330" }, { "db": "CNNVD", "id": "CNNVD-201902-409" }, { "db": "NVD", "id": "CVE-2019-0741" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An information disclosure vulnerability exists in the way Azure IoT Java SDK logs sensitive information, aka \u0027Azure IoT Java SDK Information Disclosure Vulnerability\u0027. A remote attacker could use this vulnerability to obtain information", "sources": [ { "db": "NVD", "id": "CVE-2019-0741" }, { "db": "JVNDB", "id": "JVNDB-2019-002330" }, { "db": "CNNVD", "id": "CNNVD-201902-409" }, { "db": "BID", "id": "106971" }, { "db": "VULMON", "id": "CVE-2019-0741" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0741", "trust": 2.8 }, { "db": "BID", "id": "106971", "trust": 1.9 }, { "db": "JVNDB", "id": "JVNDB-2019-002330", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201902-409", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2019-0741", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-0741" }, { "db": "BID", "id": "106971" }, { "db": "JVNDB", "id": "JVNDB-2019-002330" }, { "db": "CNNVD", "id": "CNNVD-201902-409" }, { "db": "NVD", "id": "CVE-2019-0741" } ] }, "id": "VAR-201903-1269", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.29166666 }, "last_update_date": "2024-02-20T02:20:23.008000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2019-0741 | Azure IoT Java SDK Information Disclosure Vulnerability\\", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0741" }, { "title": "CVE-2019-0741 | Azure IoT Java SDK \u306e\u60c5\u5831\u6f0f\u3048\u3044\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/cve-2019-0741" }, { "title": "Microsoft Azure IoT Java SDK Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=89223" }, { "title": "Description\nContent\nInstall\nUsage\nAutomation\nExamples", "trust": 0.1, "url": "https://github.com/eeenvik1/scripts_for_youtrack " } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-0741" }, { "db": "JVNDB", "id": "JVNDB-2019-002330" }, { "db": "CNNVD", "id": "CNNVD-201902-409" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-532", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-002330" }, { "db": "NVD", "id": "CVE-2019-0741" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0741" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/106971" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0741" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0741" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20190213-ms.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2019/at190006.html" }, { "trust": 0.3, "url": "http://www.microsoft.com" } ], "sources": [ { "db": "BID", "id": "106971" }, { "db": "JVNDB", "id": "JVNDB-2019-002330" }, { "db": "CNNVD", "id": "CNNVD-201902-409" }, { "db": "NVD", "id": "CVE-2019-0741" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2019-0741" }, { "db": "BID", "id": "106971" }, { "db": "JVNDB", "id": "JVNDB-2019-002330" }, { "db": "CNNVD", "id": "CNNVD-201902-409" }, { "db": "NVD", "id": "CVE-2019-0741" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-03-05T00:00:00", "db": "VULMON", "id": "CVE-2019-0741" }, { "date": "2019-02-12T00:00:00", "db": "BID", "id": "106971" }, { "date": "2019-04-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-002330" }, { "date": "2019-02-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201902-409" }, { "date": "2019-03-05T23:29:02.770000", "db": "NVD", "id": "CVE-2019-0741" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-03-08T00:00:00", "db": "VULMON", "id": "CVE-2019-0741" }, { "date": "2019-02-12T00:00:00", "db": "BID", "id": "106971" }, { "date": "2019-04-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-002330" }, { "date": "2019-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201902-409" }, { "date": "2019-03-08T17:40:14.690000", "db": "NVD", "id": "CVE-2019-0741" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201902-409" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Azure IoT Java SDK Vulnerability in which information is disclosed", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-002330" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201902-409" } ], "trust": 0.6 } }
var-201903-1268
Vulnerability from variot
An Elevation of Privilege vulnerability exists in the way Azure IoT Java SDK generates symmetric keys for encryption, allowing an attacker to predict the randomness of the key, aka 'Azure IoT Java SDK Elevation of Privilege Vulnerability'. Attackers can use this vulnerability to predict the randomness of keys, obtain keys, and access users' IoT centers. An attacker may exploit this issue to gain elevated privileges. Successful exploits may aid in further attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201903-1268", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "java software development kit", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "java sdk", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for azure iot" }, { "model": "java sdk for azure iot", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" } ], "sources": [ { "db": "BID", "id": "106966" }, { "db": "JVNDB", "id": "JVNDB-2019-002479" }, { "db": "NVD", "id": "CVE-2019-0729" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:java_software_development_kit:-:*:*:*:*:azure_internet_of_things:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0729" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "106966" }, { "db": "CNNVD", "id": "CNNVD-201902-508" } ], "trust": 0.9 }, "cve": "CVE-2019-0729", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-0729", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-0729", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0729", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-201902-508", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2019-0729", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-0729" }, { "db": "JVNDB", "id": "JVNDB-2019-002479" }, { "db": "NVD", "id": "CVE-2019-0729" }, { "db": "CNNVD", "id": "CNNVD-201902-508" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An Elevation of Privilege vulnerability exists in the way Azure IoT Java SDK generates symmetric keys for encryption, allowing an attacker to predict the randomness of the key, aka \u0027Azure IoT Java SDK Elevation of Privilege Vulnerability\u0027. Attackers can use this vulnerability to predict the randomness of keys, obtain keys, and access users\u0027 IoT centers. \nAn attacker may exploit this issue to gain elevated privileges. Successful exploits may aid in further attacks", "sources": [ { "db": "NVD", "id": "CVE-2019-0729" }, { "db": "JVNDB", "id": "JVNDB-2019-002479" }, { "db": "CNNVD", "id": "CNNVD-201902-508" }, { "db": "BID", "id": "106966" }, { "db": "VULMON", "id": "CVE-2019-0729" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0729", "trust": 2.8 }, { "db": "BID", "id": "106966", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2019-002479", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201902-508", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2019-0729", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-0729" }, { "db": "BID", "id": "106966" }, { "db": "JVNDB", "id": "JVNDB-2019-002479" }, { "db": "NVD", "id": "CVE-2019-0729" }, { "db": "CNNVD", "id": "CNNVD-201902-508" } ] }, "id": "VAR-201903-1268", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.29166666 }, "last_update_date": "2023-12-18T13:08:07.077000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2019-0729 | Azure IoT Java SDK Elevation of Privilege Vulnerability", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0729" }, { "title": "CVE-2019-0729 | Azure IoT Java SDK \u306e\u7279\u6a29\u306e\u6607\u683c\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/cve-2019-0729" }, { "title": "Microsoft Azure IoT Java SDK Fixes for permission permissions and access control vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=89319" }, { "title": "Symantec Threat Intelligence Blog", "trust": 0.1, "url": "https://www.symantec.com/blogs/threat-intelligence/microsoft-patch-tuesday-february-2019" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-0729" }, { "db": "JVNDB", "id": "JVNDB-2019-002479" }, { "db": "CNNVD", "id": "CNNVD-201902-508" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-330", "trust": 1.0 }, { "problemtype": "CWE-332", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-002479" }, { "db": "NVD", "id": "CVE-2019-0729" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.securityfocus.com/bid/106966" }, { "trust": 2.0, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0729" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0729" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0729" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20190213-ms.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2019/at190006.html" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/330.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/106966" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-0729" }, { "db": "BID", "id": "106966" }, { "db": "JVNDB", "id": "JVNDB-2019-002479" }, { "db": "NVD", "id": "CVE-2019-0729" }, { "db": "CNNVD", "id": "CNNVD-201902-508" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2019-0729" }, { "db": "BID", "id": "106966" }, { "db": "JVNDB", "id": "JVNDB-2019-002479" }, { "db": "NVD", "id": "CVE-2019-0729" }, { "db": "CNNVD", "id": "CNNVD-201902-508" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-03-05T00:00:00", "db": "VULMON", "id": "CVE-2019-0729" }, { "date": "2019-02-12T00:00:00", "db": "BID", "id": "106966" }, { "date": "2019-04-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-002479" }, { "date": "2019-03-05T23:29:02.740000", "db": "NVD", "id": "CVE-2019-0729" }, { "date": "2019-02-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201902-508" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-21T00:00:00", "db": "VULMON", "id": "CVE-2019-0729" }, { "date": "2019-02-12T00:00:00", "db": "BID", "id": "106966" }, { "date": "2019-04-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-002479" }, { "date": "2021-07-21T11:39:23.747000", "db": "NVD", "id": "CVE-2019-0729" }, { "date": "2021-07-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201902-508" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201902-508" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Azure IoT Java SDK Vulnerability in which privileges are elevated", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-002479" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201902-508" } ], "trust": 0.6 } }
var-201809-1004
Vulnerability from variot
A spoofing vulnerability exists for the Azure IoT Device Provisioning for the C SDK library using the HTTP protocol on Windows platform, aka "Azure IoT SDK Spoofing Vulnerability." This affects C SDK. Microsoft Windows is a series of operating systems released by Microsoft Corporation of the United States. Microsoft Azure Active Directory Connect is a service provided by Microsoft Corporation of the United States that provides identity and access management in the cloud. An attacker could exploit this vulnerability to forge a server by performing a man-in-the-middle attack
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-1004", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "c software development kit", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "*" }, { "model": "java software development kit", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "*" }, { "model": "c sdk", "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": "java sdk", "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": "azure iot sdk", "scope": null, "trust": 0.6, "vendor": "microsoft", "version": null }, { "model": "java software development kit", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "azure_internet_of_things" }, { "model": "c software development kit", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "azure_internet_of_things" }, { "model": "c sdk for azure iot", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-00355" }, { "db": "BID", "id": "105323" }, { "db": "JVNDB", "id": "JVNDB-2018-011873" }, { "db": "NVD", "id": "CVE-2018-8479" }, { "db": "CNNVD", "id": "CNNVD-201809-478" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:c_software_development_kit:*:*:*:*:*:azure_internet_of_things:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:java_software_development_kit:*:*:*:*:*:azure_internet_of_things:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-8479" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Microsoft", "sources": [ { "db": "BID", "id": "105323" }, { "db": "CNNVD", "id": "CNNVD-201809-478" } ], "trust": 0.9 }, "cve": "CVE-2018-8479", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2018-8479", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2019-00355", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.2, "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2018-8479", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-8479", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-00355", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201809-478", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-8479", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-00355" }, { "db": "VULMON", "id": "CVE-2018-8479" }, { "db": "JVNDB", "id": "JVNDB-2018-011873" }, { "db": "NVD", "id": "CVE-2018-8479" }, { "db": "CNNVD", "id": "CNNVD-201809-478" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A spoofing vulnerability exists for the Azure IoT Device Provisioning for the C SDK library using the HTTP protocol on Windows platform, aka \"Azure IoT SDK Spoofing Vulnerability.\" This affects C SDK. Microsoft Windows is a series of operating systems released by Microsoft Corporation of the United States. Microsoft Azure Active Directory Connect is a service provided by Microsoft Corporation of the United States that provides identity and access management in the cloud. An attacker could exploit this vulnerability to forge a server by performing a man-in-the-middle attack", "sources": [ { "db": "NVD", "id": "CVE-2018-8479" }, { "db": "JVNDB", "id": "JVNDB-2018-011873" }, { "db": "CNVD", "id": "CNVD-2019-00355" }, { "db": "CNNVD", "id": "CNNVD-201809-478" }, { "db": "BID", "id": "105323" }, { "db": "VULMON", "id": "CVE-2018-8479" } ], "trust": 3.06 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-8479", "trust": 3.4 }, { "db": "BID", "id": "105323", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2018-011873", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2019-00355", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201809-478", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2018-8479", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-00355" }, { "db": "VULMON", "id": "CVE-2018-8479" }, { "db": "BID", "id": "105323" }, { "db": "JVNDB", "id": "JVNDB-2018-011873" }, { "db": "NVD", "id": "CVE-2018-8479" }, { "db": "CNNVD", "id": "CNNVD-201809-478" } ] }, "id": "VAR-201809-1004", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-00355" } ], "trust": 1.35 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-00355" } ] }, "last_update_date": "2023-12-18T12:28:44.927000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2018-8479 | Azure IoT SDK Spoofing Vulnerability", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8479" }, { "title": "CVE-2018-8479 | Azure IoT SDK \u306e\u306a\u308a\u3059\u307e\u3057\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/cve-2018-8479" }, { "title": "Patch for Microsoft Azure IoT SDK spoofing vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/148857" }, { "title": "Microsoft Azure IoT SDK Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=84749" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/09/11/patch_tuesday_september/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-00355" }, { "db": "VULMON", "id": "CVE-2018-8479" }, { "db": "JVNDB", "id": "JVNDB-2018-011873" }, { "db": "CNNVD", "id": "CNNVD-201809-478" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-295", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-011873" }, { "db": "NVD", "id": "CVE-2018-8479" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.securityfocus.com/bid/105323" }, { "trust": 2.0, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8479" }, { "trust": 1.4, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8479" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20180912-ms.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2018/at180038.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8479" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/295.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/105323" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-00355" }, { "db": "VULMON", "id": "CVE-2018-8479" }, { "db": "BID", "id": "105323" }, { "db": "JVNDB", "id": "JVNDB-2018-011873" }, { "db": "NVD", "id": "CVE-2018-8479" }, { "db": "CNNVD", "id": "CNNVD-201809-478" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-00355" }, { "db": "VULMON", "id": "CVE-2018-8479" }, { "db": "BID", "id": "105323" }, { "db": "JVNDB", "id": "JVNDB-2018-011873" }, { "db": "NVD", "id": "CVE-2018-8479" }, { "db": "CNNVD", "id": "CNNVD-201809-478" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-01-04T00:00:00", "db": "CNVD", "id": "CNVD-2019-00355" }, { "date": "2018-09-13T00:00:00", "db": "VULMON", "id": "CVE-2018-8479" }, { "date": "2018-09-11T00:00:00", "db": "BID", "id": "105323" }, { "date": "2019-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-011873" }, { "date": "2018-09-13T00:29:07.317000", "db": "NVD", "id": "CVE-2018-8479" }, { "date": "2018-09-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-478" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-01-04T00:00:00", "db": "CNVD", "id": "CNVD-2019-00355" }, { "date": "2018-12-12T00:00:00", "db": "VULMON", "id": "CVE-2018-8479" }, { "date": "2018-09-11T00:00:00", "db": "BID", "id": "105323" }, { "date": "2019-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-011873" }, { "date": "2018-12-12T14:50:24.757000", "db": "NVD", "id": "CVE-2018-8479" }, { "date": "2018-09-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-478" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-478" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HTTP Using a protocol C SDK For library Azure IoT Device Provisioning Spoofing vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-011873" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-478" } ], "trust": 0.6 } }