Search criteria

8 vulnerabilities found for mGuard by Innominate

VAR-201412-0413

Vulnerability from variot - Updated: 2023-12-18 13:24

Innominate mGuard with firmware before 7.6.6 and 8.x before 8.1.4 allows remote authenticated admins to obtain root privileges by changing a PPP configuration setting. mGuard is a product line of Innominate, including firewalls and VPN network security devices. Innominate mGuard is prone to a remote privilege-escalation vulnerability. A remote attacker can exploit this issue to gain root privileges and execute arbitrary commands. Innominate mGuard 8.1.3 and prior are vulnerable. A security vulnerability exists in Innominate mGuard using firmware versions prior to 7.6.6 and 8.x versions prior to 8.1.4

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201412-0413",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.0.3"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.0.1"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.0.0"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.1.3"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.1.2"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.0.2"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.1.1"
      },
      {
        "model": "mguard",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "innominate",
        "version": "7.6.6"
      },
      {
        "model": "mguard",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "8.x"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "8.1.4"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "innominate security",
        "version": "7.6.6"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "innominate security",
        "version": "8.x(\u003c8.1.4)"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "innominate",
        "version": "7.6.6"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-09052"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007346"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9193"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-453"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "7.6.6",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-9193"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Innominate Security Technologies",
    "sources": [
      {
        "db": "BID",
        "id": "71751"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-9193",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 9.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2014-9193",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.8,
            "id": "CNVD-2014-09052",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "VHN-77138",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-9193",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-09052",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201412-453",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-77138",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-09052"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77138"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007346"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9193"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-453"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Innominate mGuard with firmware before 7.6.6 and 8.x before 8.1.4 allows remote authenticated admins to obtain root privileges by changing a PPP configuration setting. mGuard is a product line of Innominate, including firewalls and VPN network security devices. Innominate mGuard is prone to a remote privilege-escalation vulnerability. \nA remote attacker can exploit this issue to gain root privileges and execute arbitrary commands. \nInnominate mGuard 8.1.3 and prior are vulnerable. A security vulnerability exists in Innominate mGuard using firmware versions prior to 7.6.6 and 8.x versions prior to 8.1.4",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-9193"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007346"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-09052"
      },
      {
        "db": "BID",
        "id": "71751"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77138"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "ICS CERT",
        "id": "ICSA-14-352-02",
        "trust": 3.4
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9193",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "71751",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007346",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-453",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-09052",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-77138",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-09052"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77138"
      },
      {
        "db": "BID",
        "id": "71751"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007346"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9193"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-453"
      }
    ]
  },
  "id": "VAR-201412-0413",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-09052"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77138"
      }
    ],
    "trust": 0.06999999999999999
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-09052"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:24:48.810000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "2014/12/17-001",
        "trust": 0.8,
        "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20141217_001_en.pdf"
      },
      {
        "title": "Innominate mGuard is not authorized to modify the patch for the vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/53078"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-09052"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007346"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-77138"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007346"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9193"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-14-352-02"
      },
      {
        "trust": 1.7,
        "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20141217_001_en.pdf"
      },
      {
        "trust": 1.4,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-9193"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9193"
      },
      {
        "trust": 0.3,
        "url": "http://www.innominate.com/en/products/archive"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-09052"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77138"
      },
      {
        "db": "BID",
        "id": "71751"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007346"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9193"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-453"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-09052"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77138"
      },
      {
        "db": "BID",
        "id": "71751"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007346"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9193"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-453"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-12-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-09052"
      },
      {
        "date": "2014-12-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-77138"
      },
      {
        "date": "2014-12-18T00:00:00",
        "db": "BID",
        "id": "71751"
      },
      {
        "date": "2014-12-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-007346"
      },
      {
        "date": "2014-12-20T00:59:03.633000",
        "db": "NVD",
        "id": "CVE-2014-9193"
      },
      {
        "date": "2014-12-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201412-453"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-12-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-09052"
      },
      {
        "date": "2014-12-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-77138"
      },
      {
        "date": "2014-12-18T00:00:00",
        "db": "BID",
        "id": "71751"
      },
      {
        "date": "2014-12-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-007346"
      },
      {
        "date": "2014-12-22T15:35:56.060000",
        "db": "NVD",
        "id": "CVE-2014-9193"
      },
      {
        "date": "2014-12-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201412-453"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-453"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Innominate mGuard In the firmware  root Privileged vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007346"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-453"
      }
    ],
    "trust": 0.6
  }
}

VAR-201206-0116

Vulnerability from variot - Updated: 2023-12-18 12:38

The Innominate mGuard Smart HW before HW-101130 and BD before BD-101030, mGuard industrial RS, mGuard delta HW before HW-103060 and BD before BD-211010, mGuard PCI, mGuard blade, and EAGLE mGuard appliances with software before 7.5.0 do not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof (1) HTTPS or (2) SSH servers by predicting a key value. Remote attackers can exploit this issue to perform man-in-the-middle attacks against vulnerable applications and to disclose sensitive information. Successful exploits may result in the attacker executing arbitrary code or gain unauthorized access on the affected system. The following products are affected: mGuard Smart mGuard PCI mGuard Industrial RS mGuard Blade mGuard Delta EAGLE mGuard. ----------------------------------------------------------------------

Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch


TITLE: Innominate mGuard Weak Entropy Key Generation Weakness

SECUNIA ADVISORY ID: SA49632

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49632/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49632

RELEASE DATE: 2012-06-18

DISCUSS ADVISORY: http://secunia.com/advisories/49632/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/49632/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=49632

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A weakness has been reported in Innominate mGuard, which can be exploited by malicious people to conduct brute force attacks.

The weakness is reported versions prior to 7.5.0. Please see the vendor's advisory for the list of affected products.

SOLUTION: Update to version 7.5.0.

PROVIDED AND/OR DISCOVERED BY: Nadia Heninger (UCSD), Zakir Durumeric (UMICH), Eric Wustrow (UMICH), and J. Alex Halderman (UMICH).

ORIGINAL ADVISORY: https://freedom-to-tinker.com/blog/nadiah/new-research-theres-no-need-panic-over-factorable-keys-just-mind-your-ps-and-qs/

ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-12-167-01.pdf

Innominate: http://www.innominate.com/data/downloads/software/innominate_security_advisory_20120614_001.pdf

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201206-0116",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mguard",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "innominate",
        "version": "7.5.0"
      },
      {
        "model": "eagle mguard",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "hw-201000"
      },
      {
        "model": "eagle mguard",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "bd-301010"
      },
      {
        "model": "mguard blade",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "hw-104020"
      },
      {
        "model": "mguard blade",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "hw-104050"
      },
      {
        "model": "mguard delta",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "hw-103050"
      },
      {
        "model": "mguard delta",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "bd-201000"
      },
      {
        "model": "mguard industrial rs",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "hw-105000"
      },
      {
        "model": "mguard industrial rs",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "bd-501000"
      },
      {
        "model": "mguard industrial rs",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "bd-501010"
      },
      {
        "model": "mguard industrial rs",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "bd-501020"
      },
      {
        "model": "mguard pci",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "hw-102020"
      },
      {
        "model": "mguard pci",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "hw-102050"
      },
      {
        "model": "mguard pci",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "bd-111010"
      },
      {
        "model": "mguard pci",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "bd-111020"
      },
      {
        "model": "mguard smart",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "hw-101020"
      },
      {
        "model": "mguard smart",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "hw-101050"
      },
      {
        "model": "mguard smart",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "bd-101010"
      },
      {
        "model": "mguard smart",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "bd-101020"
      },
      {
        "model": "mguard pci",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "innominate",
        "version": "bd-111020"
      },
      {
        "model": "mguard blade",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "innominate",
        "version": "hw-104020"
      },
      {
        "model": "mguard pci",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "innominate",
        "version": "hw-102050"
      },
      {
        "model": "eagle mguard",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "innominate",
        "version": "hw-201000"
      },
      {
        "model": "mguard pci",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "innominate",
        "version": "bd-111010"
      },
      {
        "model": "mguard pci",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "innominate",
        "version": "hw-102020"
      },
      {
        "model": "eagle mguard",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "innominate",
        "version": "bd-301010"
      },
      {
        "model": "mguard delta",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "innominate",
        "version": "bd-201000"
      },
      {
        "model": "mguard blade",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "innominate",
        "version": "hw-104050"
      },
      {
        "model": "mguard delta",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "innominate",
        "version": "hw-103050"
      },
      {
        "model": "mguard smart hw-101050",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "mguard smart hw-101020",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "mguard smart bd-101020",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "mguard smart bd-101010",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "mguard pci hw-102050",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "mguard pci hw-102020",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "mguard pci bd-111020",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "mguard pci bd-111010",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "mguard delta hw-103050",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "mguard delta bd-201000",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "mguard blade hw-104050",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "mguard blade hw-104020",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "industrial rs hw-105000",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "industrial rs bd-501020",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "industrial rs bd-501010",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "industrial rs bd-501000",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "eagle mguard hw-201000",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "eagle mguard bd-301010",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "delta hw-103050",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "delta bd-201000",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "blade hw-104050",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      },
      {
        "model": "blade hw-104020",
        "scope": null,
        "trust": 0.3,
        "vendor": "innominate",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "54033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002806"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3006"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-265"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "7.5.0",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:eagle_mguard_bd-301010:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_blade_hw-104020:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_industrial_rs_bd-501010:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_industrial_rs_hw-105000:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_smart_hw-101020:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_pci_bd-111020:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_pci_hw-102020:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_pci_hw-102050:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_smart_bd-101010:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_blade_hw-104050:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_delta_bd-201000:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_delta_hw-103050:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_industrial_rs_bd-501000:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:eagle_mguard_hw-201000:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_industrial_rs_bd-501020:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_pci_bd-111010:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_smart_bd-101020:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:innominate:mguard_smart_hw-101050:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-3006"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Nadia Heninger, Eric Wustrow, and J. Alex Halderman, Zakir Durumeric",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-265"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2012-3006",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.1,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2012-3006",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-56287",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:H/AU:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-3006",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201206-265",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-56287",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-56287"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002806"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3006"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-265"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Innominate mGuard Smart HW before HW-101130 and BD before BD-101030, mGuard industrial RS, mGuard delta HW before HW-103060 and BD before BD-211010, mGuard PCI, mGuard blade, and EAGLE mGuard appliances with software before 7.5.0 do not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof (1) HTTPS or (2) SSH servers by predicting a key value. \nRemote attackers can exploit this issue to perform man-in-the-middle attacks against vulnerable applications and to disclose sensitive information. Successful exploits may result in the attacker executing arbitrary code or  gain unauthorized access on the affected system. \nThe following products are affected:\nmGuard Smart\nmGuard PCI\nmGuard Industrial RS\nmGuard Blade\nmGuard Delta\nEAGLE mGuard. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nInnominate mGuard Weak Entropy Key Generation Weakness\n\nSECUNIA ADVISORY ID:\nSA49632\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49632/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49632\n\nRELEASE DATE:\n2012-06-18\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49632/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49632/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49632\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA weakness has been reported in Innominate mGuard, which can be\nexploited by malicious people to conduct brute force attacks. \n\nThe weakness is reported versions prior to 7.5.0. Please see the\nvendor\u0027s advisory for the list of affected products. \n\nSOLUTION:\nUpdate to version 7.5.0. \n\nPROVIDED AND/OR DISCOVERED BY:\nNadia Heninger (UCSD), Zakir Durumeric (UMICH), Eric Wustrow (UMICH),\nand J. Alex Halderman (UMICH). \n\nORIGINAL ADVISORY:\nhttps://freedom-to-tinker.com/blog/nadiah/new-research-theres-no-need-panic-over-factorable-keys-just-mind-your-ps-and-qs/\n\nICS-CERT:\nhttp://www.us-cert.gov/control_systems/pdf/ICSA-12-167-01.pdf\n\nInnominate:\nhttp://www.innominate.com/data/downloads/software/innominate_security_advisory_20120614_001.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-3006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002806"
      },
      {
        "db": "BID",
        "id": "54033"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56287"
      },
      {
        "db": "PACKETSTORM",
        "id": "113830"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "ICS CERT",
        "id": "ICSA-12-167-01",
        "trust": 2.9
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3006",
        "trust": 2.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002806",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-265",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "54033",
        "trust": 0.4
      },
      {
        "db": "SECUNIA",
        "id": "49632",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-56287",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "113830",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-56287"
      },
      {
        "db": "BID",
        "id": "54033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002806"
      },
      {
        "db": "PACKETSTORM",
        "id": "113830"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3006"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-265"
      }
    ]
  },
  "id": "VAR-201206-0116",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-56287"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:38:49.099000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.innominate.com/en"
      },
      {
        "title": "ICS-VU-873212",
        "trust": 0.8,
        "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20120614_001.pdf"
      },
      {
        "title": "Innominate Security Technologies mGuard Repair measures for weak entropy key generation vulnerability",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=97709"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002806"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-265"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-56287"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002806"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3006"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.9,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-167-01.pdf"
      },
      {
        "trust": 2.1,
        "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20120614_001.pdf"
      },
      {
        "trust": 1.7,
        "url": "https://freedom-to-tinker.com/blog/nadiah/new-research-theres-no-need-panic-over-factorable-keys-just-mind-your-ps-and-qs"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3006"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3006"
      },
      {
        "trust": 0.3,
        "url": "http://www.innominate.com/en/downloads/software-and-misc"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49632"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/psi_30_beta_launch"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/49632/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/49632/"
      },
      {
        "trust": 0.1,
        "url": "https://freedom-to-tinker.com/blog/nadiah/new-research-theres-no-need-panic-over-factorable-keys-just-mind-your-ps-and-qs/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-56287"
      },
      {
        "db": "BID",
        "id": "54033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002806"
      },
      {
        "db": "PACKETSTORM",
        "id": "113830"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3006"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-265"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-56287"
      },
      {
        "db": "BID",
        "id": "54033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002806"
      },
      {
        "db": "PACKETSTORM",
        "id": "113830"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3006"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-265"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-06-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-56287"
      },
      {
        "date": "2012-06-15T00:00:00",
        "db": "BID",
        "id": "54033"
      },
      {
        "date": "2012-06-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-002806"
      },
      {
        "date": "2012-06-18T04:32:45",
        "db": "PACKETSTORM",
        "id": "113830"
      },
      {
        "date": "2012-06-19T18:55:01.113000",
        "db": "NVD",
        "id": "CVE-2012-3006"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201206-265"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-56287"
      },
      {
        "date": "2012-06-15T00:00:00",
        "db": "BID",
        "id": "54033"
      },
      {
        "date": "2012-06-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-002806"
      },
      {
        "date": "2019-08-29T15:42:37.633000",
        "db": "NVD",
        "id": "CVE-2012-3006"
      },
      {
        "date": "2019-08-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201206-265"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-265"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Innominate Security Technologies In our products  HTTPS Or  SSH Vulnerability impersonating a server",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002806"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-265"
      }
    ],
    "trust": 0.6
  }
}

VAR-201407-0241

Vulnerability from variot - Updated: 2023-12-18 12:21

Innominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request. Innominate mGuard is prone to a remote information-disclosure vulnerability. Attackers can exploit this issue to gain access to sensitive information. This may aid in further attacks. Innominate mGuard is a series of products including network security equipment such as firewall and VPN from German Innominate Company

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201407-0241",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "7.3.1"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.0.2"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.0.1"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "6.1.5"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "7.0.2"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "7.4.1"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.0.0"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "7.2.1"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "7.1.1"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "innominate",
        "version": "4.0.4"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "innominate",
        "version": "4.2.3"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "innominate",
        "version": "5.1.6"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "innominate",
        "version": "6.0.2"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "innominate",
        "version": "4.1.1"
      },
      {
        "model": "mguard",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "innominate",
        "version": "7.5.0"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "innominate",
        "version": "5.0.1"
      },
      {
        "model": "mguard",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "8.x"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "8.0.3"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "innominate",
        "version": "7.5.0"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003651"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2356"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-722"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "7.5.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:7.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:6.1.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:6.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:5.1.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:7.3.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:7.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:5.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:4.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:7.4.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:7.2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:4.2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:4.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2356"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Applied Risk Research team",
    "sources": [
      {
        "db": "BID",
        "id": "68948"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-2356",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2014-2356",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-70295",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-2356",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201407-722",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-70295",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-70295"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003651"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2356"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-722"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Innominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request. Innominate mGuard is prone to a remote information-disclosure vulnerability. \nAttackers can exploit this issue to gain access to sensitive information. This may aid in further attacks. Innominate mGuard is a series of products including network security equipment such as firewall and VPN from German Innominate Company",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2356"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003651"
      },
      {
        "db": "BID",
        "id": "68948"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70295"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "ICS CERT",
        "id": "ICSA-14-189-02",
        "trust": 2.8
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2356",
        "trust": 2.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003651",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-722",
        "trust": 0.7
      },
      {
        "db": "SECUNIA",
        "id": "59327",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "68948",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-70295",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-70295"
      },
      {
        "db": "BID",
        "id": "68948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003651"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2356"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-722"
      }
    ]
  },
  "id": "VAR-201407-0241",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-70295"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:21:15.107000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "mGuard firmware",
        "trust": 0.8,
        "url": "http://www.innominate.com/en/products"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003651"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-70295"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003651"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2356"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-189-02"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2356"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2356"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/59327"
      },
      {
        "trust": 0.3,
        "url": "http://www.innominate.com/en/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-70295"
      },
      {
        "db": "BID",
        "id": "68948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003651"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2356"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-722"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-70295"
      },
      {
        "db": "BID",
        "id": "68948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003651"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2356"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-722"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-07-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-70295"
      },
      {
        "date": "2014-07-29T00:00:00",
        "db": "BID",
        "id": "68948"
      },
      {
        "date": "2014-08-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-003651"
      },
      {
        "date": "2014-07-30T14:55:06.680000",
        "db": "NVD",
        "id": "CVE-2014-2356"
      },
      {
        "date": "2014-07-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201407-722"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-08-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-70295"
      },
      {
        "date": "2014-07-29T00:00:00",
        "db": "BID",
        "id": "68948"
      },
      {
        "date": "2014-08-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-003651"
      },
      {
        "date": "2014-08-04T15:19:11.567000",
        "db": "NVD",
        "id": "CVE-2014-2356"
      },
      {
        "date": "2014-08-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201407-722"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-722"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Innominate mGuard Vulnerability in which important information is obtained",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003651"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-722"
      }
    ],
    "trust": 0.6
  }
}

VAR-201508-0392

Vulnerability from variot - Updated: 2023-12-18 12:20

The IPsec SA establishment process on Innominate mGuard devices with firmware 8.x before 8.1.7 allows remote authenticated users to cause a denial of service (VPN service restart) by leveraging a peer relationship to send a crafted configuration with compression. Innominate mGuard is prone to a denial-of-service vulnerability. An attacker can leverage this issue to cause a denial-of-service condition, denying service to legitimate users. Innominate mGuard 8.0.0 through 8.1.6 are vulnerable. Innominate mGuard is an mGuard series product suite of German Innominate Company that includes network security devices such as firewalls and VPNs

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201508-0392",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.0.3"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.0.1"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.1.3"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.1.2"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.0.2"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.1.5"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.1.4"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.0.0"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.1.6"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "innominate",
        "version": "8.1.1"
      },
      {
        "model": "mguard",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "8.x"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "innominate security",
        "version": "8.1.7"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004502"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3966"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-568"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.1.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.1.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:innominate:mguard_firmware:8.1.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-3966"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "74543"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-3966",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 4.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2015-3966",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "VHN-81927",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-3966",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201508-568",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-81927",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-81927"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004502"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3966"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-568"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The IPsec SA establishment process on Innominate mGuard devices with firmware 8.x before 8.1.7 allows remote authenticated users to cause a denial of service (VPN service restart) by leveraging a peer relationship to send a crafted configuration with compression. Innominate mGuard is prone to a denial-of-service vulnerability. \nAn attacker can leverage this issue to cause a denial-of-service condition, denying service to legitimate users. \nInnominate mGuard 8.0.0 through 8.1.6 are vulnerable. Innominate mGuard is an mGuard series product suite of German Innominate Company that includes network security devices such as firewalls and VPNs",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-3966"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004502"
      },
      {
        "db": "BID",
        "id": "74543"
      },
      {
        "db": "VULHUB",
        "id": "VHN-81927"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "ICS CERT",
        "id": "ICSA-15-239-03",
        "trust": 2.8
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3966",
        "trust": 2.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004502",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-568",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "74543",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-81927",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-81927"
      },
      {
        "db": "BID",
        "id": "74543"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004502"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3966"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-568"
      }
    ]
  },
  "id": "VAR-201508-0392",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-81927"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:20:46.986000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "2015/07/14-001",
        "trust": 0.8,
        "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20150714_001_en.pdf"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004502"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-81927"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004502"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3966"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-239-03"
      },
      {
        "trust": 1.7,
        "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20150714_001_en.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3966"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3966"
      },
      {
        "trust": 0.3,
        "url": "http://www.innominate.com/en/products/archive"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-81927"
      },
      {
        "db": "BID",
        "id": "74543"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004502"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3966"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-568"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-81927"
      },
      {
        "db": "BID",
        "id": "74543"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004502"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3966"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-568"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-08-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-81927"
      },
      {
        "date": "2015-08-27T00:00:00",
        "db": "BID",
        "id": "74543"
      },
      {
        "date": "2015-09-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-004502"
      },
      {
        "date": "2015-08-30T14:59:00.110000",
        "db": "NVD",
        "id": "CVE-2015-3966"
      },
      {
        "date": "2015-08-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201508-568"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-08-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-81927"
      },
      {
        "date": "2015-08-27T00:00:00",
        "db": "BID",
        "id": "74543"
      },
      {
        "date": "2015-09-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-004502"
      },
      {
        "date": "2015-08-31T18:55:37.437000",
        "db": "NVD",
        "id": "CVE-2015-3966"
      },
      {
        "date": "2015-09-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201508-568"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-568"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Innominate mGuard Device firmware  IPsec SA Service disruption in the establishment process  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004502"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-568"
      }
    ],
    "trust": 0.6
  }
}

CVE-2014-9193 (GCVE-0-2014-9193)

Vulnerability from cvelistv5 – Published: 2014-12-20 00:00 – Updated: 2025-07-28 20:35
VLAI?
Summary
Innominate mGuard with firmware before 7.6.6 and 8.x before 8.1.4 allows remote authenticated admins to obtain root privileges by changing a PPP configuration setting.
Severity ?
No CVSS data available.
CWE
Assigner
Impacted products
Vendor Product Version
Innominate mGuard Affected: 0 , ≤ 8.1.3 (custom)
Unaffected: 7.6.6
Unaffected: 8.1.4
Create a notification for this product.
Credits
Innominate Security Technologies has identified a privilege escalation vulnerability affecting all mGuard devices.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:40:24.558Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20141217_001_en.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-352-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "mGuard",
          "vendor": "Innominate",
          "versions": [
            {
              "lessThanOrEqual": "8.1.3",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "7.6.6"
            },
            {
              "status": "unaffected",
              "version": "8.1.4"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Innominate Security Technologies has identified a privilege escalation vulnerability affecting all mGuard devices."
        }
      ],
      "datePublic": "2014-12-17T07:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eInnominate mGuard with firmware before 7.6.6 and 8.x before 8.1.4 allows remote authenticated admins to obtain root privileges by changing a PPP configuration setting.\u003c/p\u003e"
            }
          ],
          "value": "Innominate mGuard with firmware before 7.6.6 and 8.x before 8.1.4 allows remote authenticated admins to obtain root privileges by changing a PPP configuration setting."
        }
      ],
      "metrics": [
        {
          "cvssV2_0": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-28T20:35:16.302Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20141217_001_en.pdf"
        },
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-352-02"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eInnominate has released firmware patches Version 7.6.6 and Version \n8.1.4 that mitigates the vulnerability in the mGuard firmware Version 7 \nand Version 8, respectively. Innominate recommends that customers using \nfirmware versions older than Version 7, which are no longer being \nmaintained, should upgrade to mGuard firmware Version 7.6.6 or Version \n8.1.4. Innominate also recommends that customers limit access to the \nadministrative interfaces to a minimum via firewall rules.\u003c/p\u003e\n\u003cp\u003eFor additional information on the vulnerability, Innominate\u2019s security advisory is available on its web site at:\u003c/p\u003e\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://www.innominate.com/en/downloads/security-advisories\"\u003ehttp://www.innominate.com/en/downloads/security-advisories\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eInnominate\u2019s firmware updates are available on its web site at:\u003c/p\u003e\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://www.innominate.com/en/downloads/updates\"\u003ehttp://www.innominate.com/en/downloads/updates\u003c/a\u003e\u0026nbsp;\u0026nbsp;\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "Innominate has released firmware patches Version 7.6.6 and Version \n8.1.4 that mitigates the vulnerability in the mGuard firmware Version 7 \nand Version 8, respectively. Innominate recommends that customers using \nfirmware versions older than Version 7, which are no longer being \nmaintained, should upgrade to mGuard firmware Version 7.6.6 or Version \n8.1.4. Innominate also recommends that customers limit access to the \nadministrative interfaces to a minimum via firewall rules.\n\n\nFor additional information on the vulnerability, Innominate\u2019s security advisory is available on its web site at:\n\n http://www.innominate.com/en/downloads/security-advisories \n\n\nInnominate\u2019s firmware updates are available on its web site at:\n\n http://www.innominate.com/en/downloads/updates"
        }
      ],
      "source": {
        "advisory": "ICSA-14-352-02",
        "discovery": "INTERNAL"
      },
      "title": "Innominate mGuard Improper Privilege Management",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2014-9193",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Innominate mGuard with firmware before 7.6.6 and 8.x before 8.1.4 allows remote authenticated admins to obtain root privileges by changing a PPP configuration setting."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20141217_001_en.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20141217_001_en.pdf"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-14-352-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-352-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2014-9193",
    "datePublished": "2014-12-20T00:00:00",
    "dateReserved": "2014-12-02T00:00:00",
    "dateUpdated": "2025-07-28T20:35:16.302Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2356 (GCVE-0-2014-2356)

Vulnerability from cvelistv5 – Published: 2014-07-30 14:00 – Updated: 2025-10-03 17:08
VLAI?
Summary
Innominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request.
Severity ?
No CVSS data available.
CWE
Assigner
Impacted products
Vendor Product Version
Innominate mGuard Affected: 4.0.0 , ≤ 8.0.2 (custom)
Unaffected: 7.6.4
Unaffected: 8.0.3
Unaffected: 8.1.0
Unaffected: 8.1.1
Create a notification for this product.
Credits
Applied Risk Research team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:14:25.451Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-189-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "mGuard",
          "vendor": "Innominate",
          "versions": [
            {
              "lessThanOrEqual": "8.0.2",
              "status": "affected",
              "version": "4.0.0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "7.6.4"
            },
            {
              "status": "unaffected",
              "version": "8.0.3"
            },
            {
              "status": "unaffected",
              "version": "8.1.0"
            },
            {
              "status": "unaffected",
              "version": "8.1.1"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Applied Risk Research team"
        }
      ],
      "datePublic": "2014-07-29T06:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eInnominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request.\u003c/p\u003e"
            }
          ],
          "value": "Innominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request."
        }
      ],
      "metrics": [
        {
          "cvssV2_0": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-03T17:08:22.828Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-189-02"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAll users of affected Innominate mGuard devices may either update to \none of the following firmware versions: 7.6.4, 8.0.3, 8.1.0, 8.1.1, or \nhigher, or use the hotfix-CVE-2014-2356.tar.gz patch-update to fix their\n systems without updating any other component.\u003c/p\u003e\n\u003cp\u003eThe patch can be applied by either uploading the patch-update as \n\u201cLocal Update\u201d or by the \u201cOnline Update\u201d functionality and using \nhotfix-CVE-2014-2356 as \u201cPackage set name.\u201d In addition, Innominate \nrecommends limiting access to the administrative interfaces via firewall\n rules to the minimum necessary.\u003c/p\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "All users of affected Innominate mGuard devices may either update to \none of the following firmware versions: 7.6.4, 8.0.3, 8.1.0, 8.1.1, or \nhigher, or use the hotfix-CVE-2014-2356.tar.gz patch-update to fix their\n systems without updating any other component.\n\n\nThe patch can be applied by either uploading the patch-update as \n\u201cLocal Update\u201d or by the \u201cOnline Update\u201d functionality and using \nhotfix-CVE-2014-2356 as \u201cPackage set name.\u201d In addition, Innominate \nrecommends limiting access to the administrative interfaces via firewall\n rules to the minimum necessary."
        }
      ],
      "source": {
        "advisory": "ICSA-14-189-02",
        "discovery": "EXTERNAL"
      },
      "title": "Innominate mGuard Exposure of Sensitive Information to an Unauthorized Actor",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2014-2356",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Innominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-189-02",
              "refsource": "MISC",
              "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-189-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2014-2356",
    "datePublished": "2014-07-30T14:00:00",
    "dateReserved": "2014-03-13T00:00:00",
    "dateUpdated": "2025-10-03T17:08:22.828Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-9193 (GCVE-0-2014-9193)

Vulnerability from nvd – Published: 2014-12-20 00:00 – Updated: 2025-07-28 20:35
VLAI?
Summary
Innominate mGuard with firmware before 7.6.6 and 8.x before 8.1.4 allows remote authenticated admins to obtain root privileges by changing a PPP configuration setting.
Severity ?
No CVSS data available.
CWE
Assigner
Impacted products
Vendor Product Version
Innominate mGuard Affected: 0 , ≤ 8.1.3 (custom)
Unaffected: 7.6.6
Unaffected: 8.1.4
Create a notification for this product.
Credits
Innominate Security Technologies has identified a privilege escalation vulnerability affecting all mGuard devices.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:40:24.558Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20141217_001_en.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-352-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "mGuard",
          "vendor": "Innominate",
          "versions": [
            {
              "lessThanOrEqual": "8.1.3",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "7.6.6"
            },
            {
              "status": "unaffected",
              "version": "8.1.4"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Innominate Security Technologies has identified a privilege escalation vulnerability affecting all mGuard devices."
        }
      ],
      "datePublic": "2014-12-17T07:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eInnominate mGuard with firmware before 7.6.6 and 8.x before 8.1.4 allows remote authenticated admins to obtain root privileges by changing a PPP configuration setting.\u003c/p\u003e"
            }
          ],
          "value": "Innominate mGuard with firmware before 7.6.6 and 8.x before 8.1.4 allows remote authenticated admins to obtain root privileges by changing a PPP configuration setting."
        }
      ],
      "metrics": [
        {
          "cvssV2_0": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-28T20:35:16.302Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20141217_001_en.pdf"
        },
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-352-02"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eInnominate has released firmware patches Version 7.6.6 and Version \n8.1.4 that mitigates the vulnerability in the mGuard firmware Version 7 \nand Version 8, respectively. Innominate recommends that customers using \nfirmware versions older than Version 7, which are no longer being \nmaintained, should upgrade to mGuard firmware Version 7.6.6 or Version \n8.1.4. Innominate also recommends that customers limit access to the \nadministrative interfaces to a minimum via firewall rules.\u003c/p\u003e\n\u003cp\u003eFor additional information on the vulnerability, Innominate\u2019s security advisory is available on its web site at:\u003c/p\u003e\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://www.innominate.com/en/downloads/security-advisories\"\u003ehttp://www.innominate.com/en/downloads/security-advisories\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eInnominate\u2019s firmware updates are available on its web site at:\u003c/p\u003e\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://www.innominate.com/en/downloads/updates\"\u003ehttp://www.innominate.com/en/downloads/updates\u003c/a\u003e\u0026nbsp;\u0026nbsp;\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "Innominate has released firmware patches Version 7.6.6 and Version \n8.1.4 that mitigates the vulnerability in the mGuard firmware Version 7 \nand Version 8, respectively. Innominate recommends that customers using \nfirmware versions older than Version 7, which are no longer being \nmaintained, should upgrade to mGuard firmware Version 7.6.6 or Version \n8.1.4. Innominate also recommends that customers limit access to the \nadministrative interfaces to a minimum via firewall rules.\n\n\nFor additional information on the vulnerability, Innominate\u2019s security advisory is available on its web site at:\n\n http://www.innominate.com/en/downloads/security-advisories \n\n\nInnominate\u2019s firmware updates are available on its web site at:\n\n http://www.innominate.com/en/downloads/updates"
        }
      ],
      "source": {
        "advisory": "ICSA-14-352-02",
        "discovery": "INTERNAL"
      },
      "title": "Innominate mGuard Improper Privilege Management",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2014-9193",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Innominate mGuard with firmware before 7.6.6 and 8.x before 8.1.4 allows remote authenticated admins to obtain root privileges by changing a PPP configuration setting."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20141217_001_en.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20141217_001_en.pdf"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-14-352-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-352-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2014-9193",
    "datePublished": "2014-12-20T00:00:00",
    "dateReserved": "2014-12-02T00:00:00",
    "dateUpdated": "2025-07-28T20:35:16.302Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2356 (GCVE-0-2014-2356)

Vulnerability from nvd – Published: 2014-07-30 14:00 – Updated: 2025-10-03 17:08
VLAI?
Summary
Innominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request.
Severity ?
No CVSS data available.
CWE
Assigner
Impacted products
Vendor Product Version
Innominate mGuard Affected: 4.0.0 , ≤ 8.0.2 (custom)
Unaffected: 7.6.4
Unaffected: 8.0.3
Unaffected: 8.1.0
Unaffected: 8.1.1
Create a notification for this product.
Credits
Applied Risk Research team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:14:25.451Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-189-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "mGuard",
          "vendor": "Innominate",
          "versions": [
            {
              "lessThanOrEqual": "8.0.2",
              "status": "affected",
              "version": "4.0.0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "7.6.4"
            },
            {
              "status": "unaffected",
              "version": "8.0.3"
            },
            {
              "status": "unaffected",
              "version": "8.1.0"
            },
            {
              "status": "unaffected",
              "version": "8.1.1"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Applied Risk Research team"
        }
      ],
      "datePublic": "2014-07-29T06:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eInnominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request.\u003c/p\u003e"
            }
          ],
          "value": "Innominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request."
        }
      ],
      "metrics": [
        {
          "cvssV2_0": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-03T17:08:22.828Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-189-02"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAll users of affected Innominate mGuard devices may either update to \none of the following firmware versions: 7.6.4, 8.0.3, 8.1.0, 8.1.1, or \nhigher, or use the hotfix-CVE-2014-2356.tar.gz patch-update to fix their\n systems without updating any other component.\u003c/p\u003e\n\u003cp\u003eThe patch can be applied by either uploading the patch-update as \n\u201cLocal Update\u201d or by the \u201cOnline Update\u201d functionality and using \nhotfix-CVE-2014-2356 as \u201cPackage set name.\u201d In addition, Innominate \nrecommends limiting access to the administrative interfaces via firewall\n rules to the minimum necessary.\u003c/p\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "All users of affected Innominate mGuard devices may either update to \none of the following firmware versions: 7.6.4, 8.0.3, 8.1.0, 8.1.1, or \nhigher, or use the hotfix-CVE-2014-2356.tar.gz patch-update to fix their\n systems without updating any other component.\n\n\nThe patch can be applied by either uploading the patch-update as \n\u201cLocal Update\u201d or by the \u201cOnline Update\u201d functionality and using \nhotfix-CVE-2014-2356 as \u201cPackage set name.\u201d In addition, Innominate \nrecommends limiting access to the administrative interfaces via firewall\n rules to the minimum necessary."
        }
      ],
      "source": {
        "advisory": "ICSA-14-189-02",
        "discovery": "EXTERNAL"
      },
      "title": "Innominate mGuard Exposure of Sensitive Information to an Unauthorized Actor",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2014-2356",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Innominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-189-02",
              "refsource": "MISC",
              "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-189-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2014-2356",
    "datePublished": "2014-07-30T14:00:00",
    "dateReserved": "2014-03-13T00:00:00",
    "dateUpdated": "2025-10-03T17:08:22.828Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}