All the vulnerabilites related to ABB - PCM600
cve-2016-4511
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:25.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-31T00:00:00", "descriptions": [ { "lang": "en", "value": "ABB PCM600 before 2.7 uses an improper hash algorithm for the main application password, which makes it easier for local users to obtain sensitive cleartext information by leveraging read access to the ACTConfig configuration file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-06-10T01:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-4511", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ABB PCM600 before 2.7 uses an improper hash algorithm for the main application password, which makes it easier for local users to obtain sensitive cleartext information by leveraging read access to the ACTConfig configuration file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-4511", "datePublished": "2016-06-10T01:00:00", "dateReserved": "2016-05-05T00:00:00", "dateUpdated": "2024-08-06T00:32:25.475Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-4524
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:25.885Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-31T00:00:00", "descriptions": [ { "lang": "en", "value": "ABB PCM600 before 2.7 improperly stores OPC Server IEC61850 passwords in unspecified temporary circumstances, which allows local users to obtain sensitive information via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-06-10T01:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-4524", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ABB PCM600 before 2.7 improperly stores OPC Server IEC61850 passwords in unspecified temporary circumstances, which allows local users to obtain sensitive information via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-4524", "datePublished": "2016-06-10T01:00:00", "dateReserved": "2016-05-05T00:00:00", "dateUpdated": "2024-08-06T00:32:25.885Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22278
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ABB | PCM600 |
Version: 2.7 < unspecified Version: unspecified < |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2NGA001142\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000056\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "PCM600", "vendor": "ABB", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "2.7", "versionType": "custom" }, { "lessThanOrEqual": "2.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "PCM600 Update Manager", "vendor": "ABB", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.1.0.4" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "2.2.0.1" }, { "status": "affected", "version": "2.2.0.2" }, { "status": "affected", "version": "2.2.0.23" }, { "status": "affected", "version": "2.3.0.60" }, { "status": "affected", "version": "2.4.20041.1" }, { "status": "affected", "version": "2.4.20119.2" } ] }, { "product": "PCM600", "vendor": "Hitachi Energy", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "2.7", "versionType": "custom" }, { "lessThanOrEqual": "2.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "PCM600 Update Manager", "vendor": "Hitachi Energy", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.1.0.4" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "2.2.0.1" }, { "status": "affected", "version": "2.2.0.2" }, { "status": "affected", "version": "2.2.0.23" }, { "status": "affected", "version": "2.3.0.60" }, { "status": "affected", "version": "2.4.20041.1" }, { "status": "affected", "version": "2.4.20119.2" } ] } ], "credits": [ { "lang": "en", "value": "ABB and Hitachi Energy thank CyTRICS researcher May Chaffin for helping to identify the vulnerabilities and protecting our customers." } ], "datePublic": "2021-10-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A certificate validation vulnerability in PCM600 Update Manager allows attacker to get unwanted software packages to be installed on computer which has PCM600 installed." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:45:58", "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "shortName": "ABB" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2NGA001142\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_refsource_MISC" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000056\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "solutions": [ { "lang": "en", "value": "Install latest PCM600 Update Manager version 2.4.21218.1 or newer." } ], "source": { "discovery": "UNKNOWN" }, "title": "Certificate verification vulnerability in Update Manager of PCM600 Engineering Tool", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@ch.abb.com", "DATE_PUBLIC": "2021-10-19T10:02:00.000Z", "ID": "CVE-2021-22278", "STATE": "PUBLIC", "TITLE": "Certificate verification vulnerability in Update Manager of PCM600 Engineering Tool" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "PCM600", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "2.7" }, { "version_affected": "\u003c=", "version_value": "2.10" } ] } }, { "product_name": "PCM600 Update Manager", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.1" }, { "version_affected": "=", "version_value": "2.1.0.4" }, { "version_affected": "=", "version_value": "2.2" }, { "version_affected": "=", "version_value": "2.2.0.1" }, { "version_affected": "=", "version_value": "2.2.0.2" }, { "version_affected": "=", "version_value": "2.2.0.23" }, { "version_affected": "=", "version_value": "2.3.0.60" }, { "version_affected": "=", "version_value": "2.4.20041.1" }, { "version_affected": "=", "version_value": "2.4.20119.2" } ] } } ] }, "vendor_name": "ABB" }, { "product": { "product_data": [ { "product_name": "PCM600", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "2.7" }, { "version_affected": "\u003c=", "version_value": "2.10" } ] } }, { "product_name": "PCM600 Update Manager", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.1" }, { "version_affected": "=", "version_value": "2.1.0.4" }, { "version_affected": "=", "version_value": "2.2" }, { "version_affected": "=", "version_value": "2.2.0.1" }, { "version_affected": "=", "version_value": "2.2.0.2" }, { "version_affected": "=", "version_value": "2.2.0.23" }, { "version_affected": "=", "version_value": "2.3.0.60" }, { "version_affected": "=", "version_value": "2.4.20041.1" }, { "version_affected": "=", "version_value": "2.4.20119.2" } ] } } ] }, "vendor_name": "Hitachi Energy" } ] } }, "credit": [ { "lang": "eng", "value": "ABB and Hitachi Energy thank CyTRICS researcher May Chaffin for helping to identify the vulnerabilities and protecting our customers." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A certificate validation vulnerability in PCM600 Update Manager allows attacker to get unwanted software packages to be installed on computer which has PCM600 installed." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295 Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://search.abb.com/library/Download.aspx?DocumentID=2NGA001142\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch", "refsource": "MISC", "url": "https://search.abb.com/library/Download.aspx?DocumentID=2NGA001142\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "name": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000056\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch", "refsource": "MISC", "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000056\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ] }, "solution": [ { "lang": "en", "value": "Install latest PCM600 Update Manager version 2.4.21218.1 or newer." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "assignerShortName": "ABB", "cveId": "CVE-2021-22278", "datePublished": "2021-10-28T12:45:58.086957Z", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-09-16T18:23:59.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-4516
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:25.540Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-31T00:00:00", "descriptions": [ { "lang": "en", "value": "ABB PCM600 before 2.7 improperly stores the main application password after a password change, which allows local users to obtain sensitive information via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-06-10T01:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-4516", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ABB PCM600 before 2.7 improperly stores the main application password after a password change, which allows local users to obtain sensitive information via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-4516", "datePublished": "2016-06-10T01:00:00", "dateReserved": "2016-05-05T00:00:00", "dateUpdated": "2024-08-06T00:32:25.540Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-4527
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:25.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-31T00:00:00", "descriptions": [ { "lang": "en", "value": "ABB PCM600 before 2.7 improperly stores PCM600 authentication credentials, which allows local users to obtain sensitive information via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-06-10T01:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-4527", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ABB PCM600 before 2.7 improperly stores PCM600 authentication credentials, which allows local users to obtain sensitive information via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-152-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-4527", "datePublished": "2016-06-10T01:00:00", "dateReserved": "2016-05-05T00:00:00", "dateUpdated": "2024-08-06T00:32:25.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201606-0248
Vulnerability from variot
ABB PCM600 before 2.7 uses an improper hash algorithm for the main application password, which makes it easier for local users to obtain sensitive cleartext information by leveraging read access to the ACTConfig configuration file. ABB PCM600 is a protection and control IED manager for the energy industry. A local attacker could exploit this vulnerability to access affected devices. ABB PCM600 is prone to following security vulnerabilities: 1. An insecure password-hash vulnerability 2. Multiple insecure password storage vulnerabilities Successful attacks can allow a local attacker to gain unauthorized access to the application's users' password information. ABB PCM600 prior to 2.7 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201606-0248", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pcm600", "scope": "eq", "trust": 1.2, "vendor": "abb", "version": "2.6" }, { "model": "pcm600", "scope": "lte", "trust": 1.0, "vendor": "abb", "version": "2.6" }, { "model": "pcm600", "scope": "lt", "trust": 0.8, "vendor": "abb", "version": "2.7" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pcm600", "version": "*" } ], "sources": [ { "db": "IVD", "id": "5719c522-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03750" }, { "db": "JVNDB", "id": "JVNDB-2016-003202" }, { "db": "NVD", "id": "CVE-2016-4511" }, { "db": "CNNVD", "id": "CNNVD-201605-713" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:abb:pcm600:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-4511" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issue.", "sources": [ { "db": "BID", "id": "90966" } ], "trust": 0.3 }, "cve": "CVE-2016-4511", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 1.9, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-4511", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2016-03750", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "5719c522-2351-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "VHN-93330", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.3, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.8, "baseSeverity": "Low", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2016-4511", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-4511", "trust": 1.8, "value": "LOW" }, { "author": "CNVD", "id": "CNVD-2016-03750", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201605-713", "trust": 0.6, "value": "LOW" }, { "author": "IVD", "id": "5719c522-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-93330", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "IVD", "id": "5719c522-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03750" }, { "db": "VULHUB", "id": "VHN-93330" }, { "db": "JVNDB", "id": "JVNDB-2016-003202" }, { "db": "NVD", "id": "CVE-2016-4511" }, { "db": "CNNVD", "id": "CNNVD-201605-713" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ABB PCM600 before 2.7 uses an improper hash algorithm for the main application password, which makes it easier for local users to obtain sensitive cleartext information by leveraging read access to the ACTConfig configuration file. ABB PCM600 is a protection and control IED manager for the energy industry. A local attacker could exploit this vulnerability to access affected devices. ABB PCM600 is prone to following security vulnerabilities:\n1. An insecure password-hash vulnerability\n2. Multiple insecure password storage vulnerabilities\nSuccessful attacks can allow a local attacker to gain unauthorized access to the application\u0027s users\u0027 password information. \nABB PCM600 prior to 2.7 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2016-4511" }, { "db": "JVNDB", "id": "JVNDB-2016-003202" }, { "db": "CNVD", "id": "CNVD-2016-03750" }, { "db": "BID", "id": "90966" }, { "db": "IVD", "id": "5719c522-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-93330" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-4511", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-16-152-02", "trust": 3.1 }, { "db": "CNNVD", "id": "CNNVD-201605-713", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2016-03750", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-003202", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2016.1375", "trust": 0.6 }, { "db": "BID", "id": "90966", "trust": 0.3 }, { "db": "IVD", "id": "5719C522-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-93330", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "5719c522-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03750" }, { "db": "VULHUB", "id": "VHN-93330" }, { "db": "BID", "id": "90966" }, { "db": "JVNDB", "id": "JVNDB-2016-003202" }, { "db": "NVD", "id": "CVE-2016-4511" }, { "db": "CNNVD", "id": "CNNVD-201605-713" } ] }, "id": "VAR-201606-0248", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "5719c522-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03750" }, { "db": "VULHUB", "id": "VHN-93330" } ], "trust": 1.525 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "5719c522-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03750" } ] }, "last_update_date": "2023-12-18T12:20:29.327000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Protection and Control IED Manager PCM600", "trust": 0.8, "url": "https://library.e.abb.com/public/2d9c28adfaa348ab91a041e507d3195b/pcm600_27_csdepl_758440_ena.pdf" }, { "title": "ABB PCM600 password hash vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/76876" }, { "title": "ABB PCM600 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=62021" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03750" }, { "db": "JVNDB", "id": "JVNDB-2016-003202" }, { "db": "CNNVD", "id": "CNNVD-201605-713" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-93330" }, { "db": "JVNDB", "id": "JVNDB-2016-003202" }, { "db": "NVD", "id": "CVE-2016-4511" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-152-02" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4511" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4511" }, { "trust": 0.6, "url": "http://www.auscert.org.au/./render.html?it=35270" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03750" }, { "db": "VULHUB", "id": "VHN-93330" }, { "db": "JVNDB", "id": "JVNDB-2016-003202" }, { "db": "NVD", "id": "CVE-2016-4511" }, { "db": "CNNVD", "id": "CNNVD-201605-713" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "5719c522-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03750" }, { "db": "VULHUB", "id": "VHN-93330" }, { "db": "BID", "id": "90966" }, { "db": "JVNDB", "id": "JVNDB-2016-003202" }, { "db": "NVD", "id": "CVE-2016-4511" }, { "db": "CNNVD", "id": "CNNVD-201605-713" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-06-02T00:00:00", "db": "IVD", "id": "5719c522-2351-11e6-abef-000c29c66e3d" }, { "date": "2016-06-02T00:00:00", "db": "CNVD", "id": "CNVD-2016-03750" }, { "date": "2016-06-10T00:00:00", "db": "VULHUB", "id": "VHN-93330" }, { "date": "2016-05-31T00:00:00", "db": "BID", "id": "90966" }, { "date": "2016-06-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-003202" }, { "date": "2016-06-10T01:59:11.083000", "db": "NVD", "id": "CVE-2016-4511" }, { "date": "2016-05-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-713" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-06-02T00:00:00", "db": "CNVD", "id": "CNVD-2016-03750" }, { "date": "2016-06-17T00:00:00", "db": "VULHUB", "id": "VHN-93330" }, { "date": "2016-05-31T00:00:00", "db": "BID", "id": "90966" }, { "date": "2016-06-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-003202" }, { "date": "2016-06-17T13:00:40.673000", "db": "NVD", "id": "CVE-2016-4511" }, { "date": "2016-06-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-713" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "90966" }, { "db": "CNNVD", "id": "CNNVD-201605-713" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ABB PCM600 Vulnerability in obtaining important plaintext information", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-003202" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-713" } ], "trust": 0.6 } }
var-201606-0257
Vulnerability from variot
ABB PCM600 before 2.7 improperly stores PCM600 authentication credentials, which allows local users to obtain sensitive information via unspecified vectors. ABB PCM600 is a protection and control IED manager for the energy industry. A local attacker could exploit this vulnerability to access affected devices. ABB PCM600 is prone to following security vulnerabilities: 1. An insecure password-hash vulnerability 2. Multiple insecure password storage vulnerabilities Successful attacks can allow a local attacker to gain unauthorized access to the application's users' password information. ABB PCM600 prior to 2.7 are vulnerable. The vulnerability is caused by the program not storing the authentication certificate correctly
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201606-0257", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pcm600", "scope": "eq", "trust": 1.2, "vendor": "abb", "version": "2.6" }, { "model": "pcm600", "scope": "lte", "trust": 1.0, "vendor": "abb", "version": "2.6" }, { "model": "pcm600", "scope": "lt", "trust": 0.8, "vendor": "abb", "version": "2.7" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pcm600", "version": "*" } ], "sources": [ { "db": "IVD", "id": "57220084-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03749" }, { "db": "JVNDB", "id": "JVNDB-2016-003170" }, { "db": "NVD", "id": "CVE-2016-4527" }, { "db": "CNNVD", "id": "CNNVD-201605-716" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:abb:pcm600:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-4527" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issue.", "sources": [ { "db": "BID", "id": "90966" } ], "trust": 0.3 }, "cve": "CVE-2016-4527", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 1.9, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-4527", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2016-03749", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "57220084-2351-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "VHN-93346", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2016-4527", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-4527", "trust": 1.8, "value": "LOW" }, { "author": "CNVD", "id": "CNVD-2016-03749", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201605-716", "trust": 0.6, "value": "LOW" }, { "author": "IVD", "id": "57220084-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-93346", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "IVD", "id": "57220084-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03749" }, { "db": "VULHUB", "id": "VHN-93346" }, { "db": "JVNDB", "id": "JVNDB-2016-003170" }, { "db": "NVD", "id": "CVE-2016-4527" }, { "db": "CNNVD", "id": "CNNVD-201605-716" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ABB PCM600 before 2.7 improperly stores PCM600 authentication credentials, which allows local users to obtain sensitive information via unspecified vectors. ABB PCM600 is a protection and control IED manager for the energy industry. A local attacker could exploit this vulnerability to access affected devices. ABB PCM600 is prone to following security vulnerabilities:\n1. An insecure password-hash vulnerability\n2. Multiple insecure password storage vulnerabilities\nSuccessful attacks can allow a local attacker to gain unauthorized access to the application\u0027s users\u0027 password information. \nABB PCM600 prior to 2.7 are vulnerable. The vulnerability is caused by the program not storing the authentication certificate correctly", "sources": [ { "db": "NVD", "id": "CVE-2016-4527" }, { "db": "JVNDB", "id": "JVNDB-2016-003170" }, { "db": "CNVD", "id": "CNVD-2016-03749" }, { "db": "BID", "id": "90966" }, { "db": "IVD", "id": "57220084-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-93346" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-4527", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-16-152-02", "trust": 3.1 }, { "db": "CNNVD", "id": "CNNVD-201605-716", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2016-03749", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-003170", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2016.1375", "trust": 0.6 }, { "db": "BID", "id": "90966", "trust": 0.3 }, { "db": "IVD", "id": "57220084-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-93346", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "57220084-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03749" }, { "db": "VULHUB", "id": "VHN-93346" }, { "db": "BID", "id": "90966" }, { "db": "JVNDB", "id": "JVNDB-2016-003170" }, { "db": "NVD", "id": "CVE-2016-4527" }, { "db": "CNNVD", "id": "CNNVD-201605-716" } ] }, "id": "VAR-201606-0257", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "57220084-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03749" }, { "db": "VULHUB", "id": "VHN-93346" } ], "trust": 1.525 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "57220084-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03749" } ] }, "last_update_date": "2023-12-18T12:20:29.364000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Protection and Control IED Manager PCM600", "trust": 0.8, "url": "https://library.e.abb.com/public/2d9c28adfaa348ab91a041e507d3195b/pcm600_27_csdepl_758440_ena.pdf" }, { "title": "Patch for ABB PCM600 Credential Protection Vulnerability (CNVD-2016-03749)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/76875" }, { "title": "ABB PCM600 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=62024" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03749" }, { "db": "JVNDB", "id": "JVNDB-2016-003170" }, { "db": "CNNVD", "id": "CNNVD-201605-716" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-255", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-93346" }, { "db": "JVNDB", "id": "JVNDB-2016-003170" }, { "db": "NVD", "id": "CVE-2016-4527" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-152-02" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4527" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4527" }, { "trust": 0.6, "url": "http://www.auscert.org.au/./render.html?it=35270" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03749" }, { "db": "VULHUB", "id": "VHN-93346" }, { "db": "JVNDB", "id": "JVNDB-2016-003170" }, { "db": "NVD", "id": "CVE-2016-4527" }, { "db": "CNNVD", "id": "CNNVD-201605-716" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "57220084-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03749" }, { "db": "VULHUB", "id": "VHN-93346" }, { "db": "BID", "id": "90966" }, { "db": "JVNDB", "id": "JVNDB-2016-003170" }, { "db": "NVD", "id": "CVE-2016-4527" }, { "db": "CNNVD", "id": "CNNVD-201605-716" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-06-02T00:00:00", "db": "IVD", "id": "57220084-2351-11e6-abef-000c29c66e3d" }, { "date": "2016-06-02T00:00:00", "db": "CNVD", "id": "CNVD-2016-03749" }, { "date": "2016-06-10T00:00:00", "db": "VULHUB", "id": "VHN-93346" }, { "date": "2016-05-31T00:00:00", "db": "BID", "id": "90966" }, { "date": "2016-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-003170" }, { "date": "2016-06-10T01:59:14.037000", "db": "NVD", "id": "CVE-2016-4527" }, { "date": "2016-05-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-716" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-06-02T00:00:00", "db": "CNVD", "id": "CNVD-2016-03749" }, { "date": "2016-06-15T00:00:00", "db": "VULHUB", "id": "VHN-93346" }, { "date": "2016-05-31T00:00:00", "db": "BID", "id": "90966" }, { "date": "2016-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-003170" }, { "date": "2016-06-15T18:48:01.247000", "db": "NVD", "id": "CVE-2016-4527" }, { "date": "2016-06-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-716" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "90966" }, { "db": "CNNVD", "id": "CNNVD-201605-716" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ABB PCM600 Vulnerability in which important information is obtained", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-003170" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Trust management", "sources": [ { "db": "IVD", "id": "57220084-2351-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201605-716" } ], "trust": 0.8 } }
var-201606-0251
Vulnerability from variot
ABB PCM600 before 2.7 improperly stores the main application password after a password change, which allows local users to obtain sensitive information via unspecified vectors. ABB PCM600 is a protection and control IED manager for the energy industry. A local attacker could exploit this vulnerability to access affected devices. ABB PCM600 is prone to following security vulnerabilities: 1. An insecure password-hash vulnerability 2. ABB PCM600 prior to 2.7 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201606-0251", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pcm600", "scope": "eq", "trust": 1.2, "vendor": "abb", "version": "2.6" }, { "model": "pcm600", "scope": "lte", "trust": 1.0, "vendor": "abb", "version": "2.6" }, { "model": "pcm600", "scope": "lt", "trust": 0.8, "vendor": "abb", "version": "2.7" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pcm600", "version": "*" } ], "sources": [ { "db": "IVD", "id": "57202516-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03751" }, { "db": "JVNDB", "id": "JVNDB-2016-003168" }, { "db": "NVD", "id": "CVE-2016-4516" }, { "db": "CNNVD", "id": "CNNVD-201605-714" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:abb:pcm600:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-4516" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issue.", "sources": [ { "db": "BID", "id": "90966" } ], "trust": 0.3 }, "cve": "CVE-2016-4516", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-4516", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2016-03751", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "57202516-2351-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-93335", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2016-4516", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-4516", "trust": 1.8, "value": "LOW" }, { "author": "CNVD", "id": "CNVD-2016-03751", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201605-714", "trust": 0.6, "value": "LOW" }, { "author": "IVD", "id": "57202516-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-93335", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "IVD", "id": "57202516-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03751" }, { "db": "VULHUB", "id": "VHN-93335" }, { "db": "JVNDB", "id": "JVNDB-2016-003168" }, { "db": "NVD", "id": "CVE-2016-4516" }, { "db": "CNNVD", "id": "CNNVD-201605-714" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ABB PCM600 before 2.7 improperly stores the main application password after a password change, which allows local users to obtain sensitive information via unspecified vectors. ABB PCM600 is a protection and control IED manager for the energy industry. A local attacker could exploit this vulnerability to access affected devices. ABB PCM600 is prone to following security vulnerabilities:\n1. An insecure password-hash vulnerability\n2. \nABB PCM600 prior to 2.7 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2016-4516" }, { "db": "JVNDB", "id": "JVNDB-2016-003168" }, { "db": "CNVD", "id": "CNVD-2016-03751" }, { "db": "BID", "id": "90966" }, { "db": "IVD", "id": "57202516-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-93335" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-4516", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-16-152-02", "trust": 3.1 }, { "db": "CNNVD", "id": "CNNVD-201605-714", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2016-03751", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-003168", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2016.1375", "trust": 0.6 }, { "db": "BID", "id": "90966", "trust": 0.3 }, { "db": "IVD", "id": "57202516-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-93335", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "57202516-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03751" }, { "db": "VULHUB", "id": "VHN-93335" }, { "db": "BID", "id": "90966" }, { "db": "JVNDB", "id": "JVNDB-2016-003168" }, { "db": "NVD", "id": "CVE-2016-4516" }, { "db": "CNNVD", "id": "CNNVD-201605-714" } ] }, "id": "VAR-201606-0251", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "57202516-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03751" }, { "db": "VULHUB", "id": "VHN-93335" } ], "trust": 1.525 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "57202516-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03751" } ] }, "last_update_date": "2023-12-18T12:20:29.436000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Protection and Control IED Manager PCM600", "trust": 0.8, "url": "https://library.e.abb.com/public/2d9c28adfaa348ab91a041e507d3195b/pcm600_27_csdepl_758440_ena.pdf" }, { "title": "Patch for ABB PCM600 Credential Protection Vulnerability (CNVD-2016-03751)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/76874" }, { "title": "ABB PCM600 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=62022" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03751" }, { "db": "JVNDB", "id": "JVNDB-2016-003168" }, { "db": "CNNVD", "id": "CNNVD-201605-714" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-93335" }, { "db": "JVNDB", "id": "JVNDB-2016-003168" }, { "db": "NVD", "id": "CVE-2016-4516" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-152-02" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4516" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4516" }, { "trust": 0.6, "url": "http://www.auscert.org.au/./render.html?it=35270" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03751" }, { "db": "VULHUB", "id": "VHN-93335" }, { "db": "JVNDB", "id": "JVNDB-2016-003168" }, { "db": "NVD", "id": "CVE-2016-4516" }, { "db": "CNNVD", "id": "CNNVD-201605-714" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "57202516-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03751" }, { "db": "VULHUB", "id": "VHN-93335" }, { "db": "BID", "id": "90966" }, { "db": "JVNDB", "id": "JVNDB-2016-003168" }, { "db": "NVD", "id": "CVE-2016-4516" }, { "db": "CNNVD", "id": "CNNVD-201605-714" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-06-02T00:00:00", "db": "IVD", "id": "57202516-2351-11e6-abef-000c29c66e3d" }, { "date": "2016-06-02T00:00:00", "db": "CNVD", "id": "CNVD-2016-03751" }, { "date": "2016-06-10T00:00:00", "db": "VULHUB", "id": "VHN-93335" }, { "date": "2016-05-31T00:00:00", "db": "BID", "id": "90966" }, { "date": "2016-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-003168" }, { "date": "2016-06-10T01:59:12.083000", "db": "NVD", "id": "CVE-2016-4516" }, { "date": "2016-05-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-714" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-06-02T00:00:00", "db": "CNVD", "id": "CNVD-2016-03751" }, { "date": "2016-06-15T00:00:00", "db": "VULHUB", "id": "VHN-93335" }, { "date": "2016-05-31T00:00:00", "db": "BID", "id": "90966" }, { "date": "2016-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-003168" }, { "date": "2016-06-15T18:41:27.633000", "db": "NVD", "id": "CVE-2016-4516" }, { "date": "2016-06-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-714" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "90966" }, { "db": "CNNVD", "id": "CNNVD-201605-714" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ABB PCM600 Vulnerability in which important information is obtained", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-003168" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-714" } ], "trust": 0.6 } }
var-201606-0255
Vulnerability from variot
ABB PCM600 before 2.7 improperly stores OPC Server IEC61850 passwords in unspecified temporary circumstances, which allows local users to obtain sensitive information via unknown vectors. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlLocal users may get important information. ABB PCM600 is a protection and control IED manager for the energy industry. A local attacker could exploit this vulnerability to access affected devices. ABB PCM600 is prone to following security vulnerabilities: 1. An insecure password-hash vulnerability 2. Multiple insecure password storage vulnerabilities Successful attacks can allow a local attacker to gain unauthorized access to the application's users' password information. ABB PCM600 prior to 2.7 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201606-0255", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pcm600", "scope": "eq", "trust": 1.2, "vendor": "abb", "version": "2.6" }, { "model": "pcm600", "scope": "lte", "trust": 1.0, "vendor": "abb", "version": "2.6" }, { "model": "pcm600", "scope": "lt", "trust": 0.8, "vendor": "abb", "version": "2.7" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pcm600", "version": "*" } ], "sources": [ { "db": "IVD", "id": "57244dda-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03752" }, { "db": "JVNDB", "id": "JVNDB-2016-003169" }, { "db": "NVD", "id": "CVE-2016-4524" }, { "db": "CNNVD", "id": "CNNVD-201605-715" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:abb:pcm600:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-4524" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issue.", "sources": [ { "db": "BID", "id": "90966" } ], "trust": 0.3 }, "cve": "CVE-2016-4524", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-4524", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2016-03752", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "57244dda-2351-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-93343", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-4524", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-4524", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2016-03752", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201605-715", "trust": 0.6, "value": "LOW" }, { "author": "IVD", "id": "57244dda-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-93343", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "IVD", "id": "57244dda-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03752" }, { "db": "VULHUB", "id": "VHN-93343" }, { "db": "JVNDB", "id": "JVNDB-2016-003169" }, { "db": "NVD", "id": "CVE-2016-4524" }, { "db": "CNNVD", "id": "CNNVD-201605-715" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ABB PCM600 before 2.7 improperly stores OPC Server IEC61850 passwords in unspecified temporary circumstances, which allows local users to obtain sensitive information via unknown vectors. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlLocal users may get important information. ABB PCM600 is a protection and control IED manager for the energy industry. A local attacker could exploit this vulnerability to access affected devices. ABB PCM600 is prone to following security vulnerabilities:\n1. An insecure password-hash vulnerability\n2. Multiple insecure password storage vulnerabilities\nSuccessful attacks can allow a local attacker to gain unauthorized access to the application\u0027s users\u0027 password information. \nABB PCM600 prior to 2.7 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2016-4524" }, { "db": "JVNDB", "id": "JVNDB-2016-003169" }, { "db": "CNVD", "id": "CNVD-2016-03752" }, { "db": "BID", "id": "90966" }, { "db": "IVD", "id": "57244dda-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-93343" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-4524", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-16-152-02", "trust": 3.1 }, { "db": "CNNVD", "id": "CNNVD-201605-715", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2016-03752", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-003169", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2016.1375", "trust": 0.6 }, { "db": "BID", "id": "90966", "trust": 0.3 }, { "db": "IVD", "id": "57244DDA-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-93343", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "57244dda-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03752" }, { "db": "VULHUB", "id": "VHN-93343" }, { "db": "BID", "id": "90966" }, { "db": "JVNDB", "id": "JVNDB-2016-003169" }, { "db": "NVD", "id": "CVE-2016-4524" }, { "db": "CNNVD", "id": "CNNVD-201605-715" } ] }, "id": "VAR-201606-0255", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "57244dda-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03752" }, { "db": "VULHUB", "id": "VHN-93343" } ], "trust": 1.525 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "57244dda-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03752" } ] }, "last_update_date": "2023-12-18T12:20:29.400000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Protection and Control IED Manager PCM600", "trust": 0.8, "url": "https://library.e.abb.com/public/2d9c28adfaa348ab91a041e507d3195b/pcm600_27_csdepl_758440_ena.pdf" }, { "title": "Patch for ABB PCM600 Credential Protection Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/76873" }, { "title": "ABB PCM600 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=62023" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03752" }, { "db": "JVNDB", "id": "JVNDB-2016-003169" }, { "db": "CNNVD", "id": "CNNVD-201605-715" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.9 }, { "problemtype": "CWE-284", "trust": 1.1 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-93343" }, { "db": "JVNDB", "id": "JVNDB-2016-003169" }, { "db": "NVD", "id": "CVE-2016-4524" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-152-02" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4524" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4524" }, { "trust": 0.6, "url": "http://www.auscert.org.au/./render.html?it=35270" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03752" }, { "db": "VULHUB", "id": "VHN-93343" }, { "db": "JVNDB", "id": "JVNDB-2016-003169" }, { "db": "NVD", "id": "CVE-2016-4524" }, { "db": "CNNVD", "id": "CNNVD-201605-715" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "57244dda-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03752" }, { "db": "VULHUB", "id": "VHN-93343" }, { "db": "BID", "id": "90966" }, { "db": "JVNDB", "id": "JVNDB-2016-003169" }, { "db": "NVD", "id": "CVE-2016-4524" }, { "db": "CNNVD", "id": "CNNVD-201605-715" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-06-02T00:00:00", "db": "IVD", "id": "57244dda-2351-11e6-abef-000c29c66e3d" }, { "date": "2016-06-02T00:00:00", "db": "CNVD", "id": "CNVD-2016-03752" }, { "date": "2016-06-10T00:00:00", "db": "VULHUB", "id": "VHN-93343" }, { "date": "2016-05-31T00:00:00", "db": "BID", "id": "90966" }, { "date": "2016-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-003169" }, { "date": "2016-06-10T01:59:13.037000", "db": "NVD", "id": "CVE-2016-4524" }, { "date": "2016-05-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-715" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-06-02T00:00:00", "db": "CNVD", "id": "CNVD-2016-03752" }, { "date": "2016-06-15T00:00:00", "db": "VULHUB", "id": "VHN-93343" }, { "date": "2016-05-31T00:00:00", "db": "BID", "id": "90966" }, { "date": "2016-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-003169" }, { "date": "2016-06-15T18:48:34.953000", "db": "NVD", "id": "CVE-2016-4524" }, { "date": "2016-06-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-715" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "90966" }, { "db": "CNNVD", "id": "CNNVD-201605-715" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ABB PCM600 Credential Protection Vulnerability", "sources": [ { "db": "IVD", "id": "57244dda-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-03752" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-715" } ], "trust": 0.6 } }