Search criteria
2 vulnerabilities found for eki-1222d by advantech
VAR-201511-0046
Vulnerability from variot - Updated: 2023-12-18 13:44Advantech EKI-122x-BE devices with firmware before 1.65, EKI-132x devices with firmware before 1.98, and EKI-136x devices with firmware before 1.27 have hardcoded SSH keys, which makes it easier for remote attackers to obtain access via an SSH session. Supplementary information : CWE Vulnerability type by CWE-798: Use of Hard-coded Credentials ( Using hard-coded credentials ) Has been identified. http://cwe.mitre.org/data/definitions/798.htmlBy a third party SSH Access may be gained through a session. Advantech EKI-122x-BE, EKI-132x and EKI-136x are all serial device networking servers of Advantech, Inc., which provide various redundant configurations and multiple channels for remote monitoring of serial devices via Ethernet communication protocol. Access configuration. Security vulnerabilities exist in several Advantech products. Multiple Advantech EKI products are prone to a security-bypass vulnerability
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201511-0046",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "eki-122x series",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "1.49"
},
{
"model": "eki-1362 series",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "1.17"
},
{
"model": "eki-1321 series",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "1.96"
},
{
"model": "eki-1322 series",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "1.96"
},
{
"model": "eki-1361 series",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "1.17"
},
{
"model": "eki-1221",
"scope": null,
"trust": 0.8,
"vendor": "advantech",
"version": null
},
{
"model": "eki-1221d",
"scope": null,
"trust": 0.8,
"vendor": "advantech",
"version": null
},
{
"model": "eki-1222",
"scope": null,
"trust": 0.8,
"vendor": "advantech",
"version": null
},
{
"model": "eki-1222d",
"scope": null,
"trust": 0.8,
"vendor": "advantech",
"version": null
},
{
"model": "eki-1224",
"scope": null,
"trust": 0.8,
"vendor": "advantech",
"version": null
},
{
"model": "eki-122x series",
"scope": "lt",
"trust": 0.8,
"vendor": "advantech",
"version": "1.65"
},
{
"model": "eki-1321",
"scope": null,
"trust": 0.8,
"vendor": "advantech",
"version": null
},
{
"model": "eki-1321 series",
"scope": "lt",
"trust": 0.8,
"vendor": "advantech",
"version": "1.98"
},
{
"model": "eki-1322",
"scope": null,
"trust": 0.8,
"vendor": "advantech",
"version": null
},
{
"model": "eki-1322 series",
"scope": "lt",
"trust": 0.8,
"vendor": "advantech",
"version": "1.98"
},
{
"model": "eki-1361",
"scope": null,
"trust": 0.8,
"vendor": "advantech",
"version": null
},
{
"model": "eki-1361 series",
"scope": "lt",
"trust": 0.8,
"vendor": "advantech",
"version": "1.27"
},
{
"model": "eki-1362",
"scope": null,
"trust": 0.8,
"vendor": "advantech",
"version": null
},
{
"model": "eki-1362 series",
"scope": "lt",
"trust": 0.8,
"vendor": "advantech",
"version": "1.27"
},
{
"model": "eki-122x-be",
"scope": "lt",
"trust": 0.6,
"vendor": "advantech",
"version": "1.65"
},
{
"model": "eki-132x",
"scope": "lt",
"trust": 0.6,
"vendor": "advantech",
"version": "1.98"
},
{
"model": "eki-136x",
"scope": "lt",
"trust": 0.6,
"vendor": "advantech",
"version": "1.27"
},
{
"model": "eki-1361 series",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "1.17"
},
{
"model": "eki-122x series",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "1.49"
},
{
"model": "eki-1321 series",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "1.96"
},
{
"model": "eki-1362 series",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "1.17"
},
{
"model": "eki-1322 series",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "1.96"
},
{
"model": "eki-1360",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "0"
},
{
"model": "eki-1320",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "0"
},
{
"model": "eki-1220-be",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "0"
},
{
"model": "eki-1360",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "1.27"
},
{
"model": "eki-1320",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "1.98"
},
{
"model": "eki-1220-be",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "1.65"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "eki 1321 series",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "eki 1322 series",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "eki 1361 series",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "eki 1362 series",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "eki 122x series",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "7c6174c4-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-07475"
},
{
"db": "BID",
"id": "77498"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005812"
},
{
"db": "NVD",
"id": "CVE-2015-6476"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-113"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:advantech:eki-1322_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.96",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:advantech:eki-1321_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.96",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:advantech:eki-1322:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:advantech:eki-1321:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:advantech:eki-1361_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.17",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:advantech:eki-1362_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.17",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:advantech:eki-1362:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:advantech:eki-1361:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:advantech:eki-122x_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.49",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:advantech:eki-1221:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:advantech:eki-1221d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:advantech:eki-1222:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:advantech:eki-1222d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:advantech:eki-1224:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6476"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Neil Smith",
"sources": [
{
"db": "BID",
"id": "77498"
}
],
"trust": 0.3
},
"cve": "CVE-2015-6476",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-6476",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-07475",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "7c6174c4-2351-11e6-abef-000c29c66e3d",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-84437",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-6476",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2015-07475",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201511-113",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "7c6174c4-2351-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-84437",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7c6174c4-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-07475"
},
{
"db": "VULHUB",
"id": "VHN-84437"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005812"
},
{
"db": "NVD",
"id": "CVE-2015-6476"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-113"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech EKI-122x-BE devices with firmware before 1.65, EKI-132x devices with firmware before 1.98, and EKI-136x devices with firmware before 1.27 have hardcoded SSH keys, which makes it easier for remote attackers to obtain access via an SSH session. Supplementary information : CWE Vulnerability type by CWE-798: Use of Hard-coded Credentials ( Using hard-coded credentials ) Has been identified. http://cwe.mitre.org/data/definitions/798.htmlBy a third party SSH Access may be gained through a session. Advantech EKI-122x-BE, EKI-132x and EKI-136x are all serial device networking servers of Advantech, Inc., which provide various redundant configurations and multiple channels for remote monitoring of serial devices via Ethernet communication protocol. Access configuration. Security vulnerabilities exist in several Advantech products. Multiple Advantech EKI products are prone to a security-bypass vulnerability",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6476"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005812"
},
{
"db": "CNVD",
"id": "CNVD-2015-07475"
},
{
"db": "BID",
"id": "77498"
},
{
"db": "IVD",
"id": "7c6174c4-2351-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-84437"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6476",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-15-309-01",
"trust": 3.4
},
{
"db": "CNNVD",
"id": "CNNVD-201511-113",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2015-07475",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005812",
"trust": 0.8
},
{
"db": "BID",
"id": "77498",
"trust": 0.4
},
{
"db": "IVD",
"id": "7C6174C4-2351-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "SEEBUG",
"id": "SSVID-89764",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-84437",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7c6174c4-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-07475"
},
{
"db": "VULHUB",
"id": "VHN-84437"
},
{
"db": "BID",
"id": "77498"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005812"
},
{
"db": "NVD",
"id": "CVE-2015-6476"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-113"
}
]
},
"id": "VAR-201511-0046",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7c6174c4-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-07475"
},
{
"db": "VULHUB",
"id": "VHN-84437"
}
],
"trust": 1.9
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "7c6174c4-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-07475"
}
]
},
"last_update_date": "2023-12-18T13:44:18.705000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "EKI-136*",
"trust": 0.8,
"url": "http://support.advantech.com.tw/support/searchresult.aspx?keyword=eki-136*\u0026searchtabs=firmware"
},
{
"title": "EKI-132*",
"trust": 0.8,
"url": "http://support.advantech.com.tw/support/searchresult.aspx?keyword=eki-132*\u0026searchtabs=firmware"
},
{
"title": "EKI-122*",
"trust": 0.8,
"url": "http://support.advantech.com.tw/support/searchresult.aspx?keyword=eki-122*\u0026searchtabs=firmware"
},
{
"title": "Patches for several Advantech product SSH key vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/66571"
},
{
"title": "Multiple Advantech Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=58608"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07475"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005812"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-113"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005812"
},
{
"db": "NVD",
"id": "CVE-2015-6476"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-15-309-01"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6476"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6476"
},
{
"trust": 0.3,
"url": "http://www.advantech.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07475"
},
{
"db": "VULHUB",
"id": "VHN-84437"
},
{
"db": "BID",
"id": "77498"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005812"
},
{
"db": "NVD",
"id": "CVE-2015-6476"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-113"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7c6174c4-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-07475"
},
{
"db": "VULHUB",
"id": "VHN-84437"
},
{
"db": "BID",
"id": "77498"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005812"
},
{
"db": "NVD",
"id": "CVE-2015-6476"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-113"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-12T00:00:00",
"db": "IVD",
"id": "7c6174c4-2351-11e6-abef-000c29c66e3d"
},
{
"date": "2015-11-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-07475"
},
{
"date": "2015-11-07T00:00:00",
"db": "VULHUB",
"id": "VHN-84437"
},
{
"date": "2015-11-05T00:00:00",
"db": "BID",
"id": "77498"
},
{
"date": "2015-11-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005812"
},
{
"date": "2015-11-07T03:59:00.127000",
"db": "NVD",
"id": "CVE-2015-6476"
},
{
"date": "2015-11-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201511-113"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-07475"
},
{
"date": "2015-11-09T00:00:00",
"db": "VULHUB",
"id": "VHN-84437"
},
{
"date": "2015-11-05T00:00:00",
"db": "BID",
"id": "77498"
},
{
"date": "2015-11-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005812"
},
{
"date": "2015-11-09T19:18:42.073000",
"db": "NVD",
"id": "CVE-2015-6476"
},
{
"date": "2015-11-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201511-113"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201511-113"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Advantech EKI Vulnerability to gain access rights in device firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005812"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "77498"
}
],
"trust": 0.3
}
}
VAR-201502-0270
Vulnerability from variot - Updated: 2023-12-18 12:30Buffer overflow on Advantech EKI-1200 gateways with firmware before 1.63 allows remote attackers to execute arbitrary code via unspecified vectors. Advantech EKI-1200 Gateway is Advantech's EKI-1200 series Modbus data gateway product, which is mainly used to integrate Modbus/RTU and Modbus/ASCI serial devices into a two-way gateway based on TCP/IP network. An unknown buffer overflow vulnerability exists in the Advantech EKI-1200 Series. Advantech EKI-1200 Series is prone to an unspecified buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Failed exploit attempts will likely result in denial-of-service conditions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201502-0270",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "eki-1200 gateway series",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "1.62"
},
{
"model": "eki-1200 modbus gateway series",
"scope": "lt",
"trust": 0.8,
"vendor": "advantech",
"version": "1.63"
},
{
"model": "eki-1221",
"scope": null,
"trust": 0.8,
"vendor": "advantech",
"version": null
},
{
"model": "eki-1221d",
"scope": null,
"trust": 0.8,
"vendor": "advantech",
"version": null
},
{
"model": "eki-1222",
"scope": null,
"trust": 0.8,
"vendor": "advantech",
"version": null
},
{
"model": "eki-1222d",
"scope": null,
"trust": 0.8,
"vendor": "advantech",
"version": null
},
{
"model": "eki-1224",
"scope": null,
"trust": 0.8,
"vendor": "advantech",
"version": null
},
{
"model": "eki-1200 gateway",
"scope": "lt",
"trust": 0.6,
"vendor": "advantech",
"version": "1.63"
},
{
"model": "eki-1200 gateway series",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "1.62"
},
{
"model": "eki-1200",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "1.6"
},
{
"model": "eki-1200",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "1.63"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "eki 1200 gateway series",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "a23796e2-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-01247"
},
{
"db": "BID",
"id": "72580"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007887"
},
{
"db": "NVD",
"id": "CVE-2014-8385"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-296"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:advantech:eki-1200_gateway_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.62",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:advantech:eki-1221:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:advantech:eki-1221d:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:advantech:eki-1222:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:advantech:eki-1222d:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:advantech:eki-1224:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-8385"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Enrique Nissim and Pablo Lorenzzato from Core Security Engineering Team",
"sources": [
{
"db": "BID",
"id": "72580"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-296"
}
],
"trust": 0.9
},
"cve": "CVE-2014-8385",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": true,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2014-8385",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-01247",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "a23796e2-2351-11e6-abef-000c29c66e3d",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-76330",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-8385",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2015-01247",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201502-296",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "a23796e2-2351-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-76330",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "a23796e2-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-01247"
},
{
"db": "VULHUB",
"id": "VHN-76330"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007887"
},
{
"db": "NVD",
"id": "CVE-2014-8385"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-296"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow on Advantech EKI-1200 gateways with firmware before 1.63 allows remote attackers to execute arbitrary code via unspecified vectors. Advantech EKI-1200 Gateway is Advantech\u0027s EKI-1200 series Modbus data gateway product, which is mainly used to integrate Modbus/RTU and Modbus/ASCI serial devices into a two-way gateway based on TCP/IP network. An unknown buffer overflow vulnerability exists in the Advantech EKI-1200 Series. Advantech EKI-1200 Series is prone to an unspecified buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Failed exploit attempts will likely result in denial-of-service conditions",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-8385"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007887"
},
{
"db": "CNVD",
"id": "CNVD-2015-01247"
},
{
"db": "BID",
"id": "72580"
},
{
"db": "IVD",
"id": "a23796e2-2351-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-76330"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-8385",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-15-041-01",
"trust": 3.4
},
{
"db": "BID",
"id": "72580",
"trust": 1.6
},
{
"db": "CNNVD",
"id": "CNNVD-201502-296",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2015-01247",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007887",
"trust": 0.8
},
{
"db": "IVD",
"id": "A23796E2-2351-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-76330",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "a23796e2-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-01247"
},
{
"db": "VULHUB",
"id": "VHN-76330"
},
{
"db": "BID",
"id": "72580"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007887"
},
{
"db": "NVD",
"id": "CVE-2014-8385"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-296"
}
]
},
"id": "VAR-201502-0270",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "a23796e2-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-01247"
},
{
"db": "VULHUB",
"id": "VHN-76330"
}
],
"trust": 1.7000000000000002
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "a23796e2-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-01247"
}
]
},
"last_update_date": "2023-12-18T12:30:23.943000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Modbus\u30b2\u30fc\u30c8\u30a6\u30a7\u30a4",
"trust": 0.8,
"url": "http://www.advantech.co.jp/products/modbus-gateway/sub_gf-5tz5.aspx"
},
{
"title": "Firmware Ver. 1.63 for Modbus Gateway EKI-1221D-AE",
"trust": 0.8,
"url": "http://support.advantech.com.tw/support/downloadsrdetail_new.aspx?sr_id=1-v6xohk\u0026amp;doc_source=download"
},
{
"title": "Patch for Unknown Buffer Overflow Vulnerability in Advantech EKI-1200 Series",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/55469"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01247"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007887"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-76330"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007887"
},
{
"db": "NVD",
"id": "CVE-2014-8385"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-15-041-01"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8385"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8385"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/72580/info"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/72580"
},
{
"trust": 0.3,
"url": "http://www.advantech.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01247"
},
{
"db": "VULHUB",
"id": "VHN-76330"
},
{
"db": "BID",
"id": "72580"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007887"
},
{
"db": "NVD",
"id": "CVE-2014-8385"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-296"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "a23796e2-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-01247"
},
{
"db": "VULHUB",
"id": "VHN-76330"
},
{
"db": "BID",
"id": "72580"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007887"
},
{
"db": "NVD",
"id": "CVE-2014-8385"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-296"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-02-27T00:00:00",
"db": "IVD",
"id": "a23796e2-2351-11e6-abef-000c29c66e3d"
},
{
"date": "2015-02-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-01247"
},
{
"date": "2015-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-76330"
},
{
"date": "2015-02-10T00:00:00",
"db": "BID",
"id": "72580"
},
{
"date": "2015-02-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-007887"
},
{
"date": "2015-02-13T02:59:07.127000",
"db": "NVD",
"id": "CVE-2014-8385"
},
{
"date": "2015-02-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201502-296"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-02-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-01247"
},
{
"date": "2015-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-76330"
},
{
"date": "2015-02-10T00:00:00",
"db": "BID",
"id": "72580"
},
{
"date": "2015-02-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-007887"
},
{
"date": "2015-02-13T23:20:16.770000",
"db": "NVD",
"id": "CVE-2014-8385"
},
{
"date": "2015-02-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201502-296"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201502-296"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech EKI-1200 Gateway firmware buffer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-007887"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow",
"sources": [
{
"db": "IVD",
"id": "a23796e2-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-296"
}
],
"trust": 0.8
}
}