Vulnerabilites related to zyxel - sbg3500-n000
var-201709-0027
Vulnerability from variot

ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys. Many embedded devices are not unique X.509 Certificate and SSH Spoofing and intermediary because host key is used (man-in-the-middle) There is a possibility of being attacked and attacks such as decryption of communication contents. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked. ZyXEL Access Point NWA1100-N is a wireless network receiving device from ZyXEL Technology. Multiple ZyXEL Products are prone to an information-disclosure vulnerability. Successful exploits will lead to other attacks

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201709-0027",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "c1000z",
            scope: "eq",
            trust: 1.6,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p8702n",
            scope: "eq",
            trust: 1.6,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "q1000",
            scope: "eq",
            trust: 1.6,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "pmg5318-b20a",
            scope: "eq",
            trust: 1.6,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "fr1000z",
            scope: "eq",
            trust: 1.6,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "gs1900-24",
            scope: "eq",
            trust: 1.6,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3300-n000",
            scope: "eq",
            trust: 1.6,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3500-n000",
            scope: "eq",
            trust: 1.6,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "gs1900-8",
            scope: "eq",
            trust: 1.6,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3300-nb00",
            scope: "eq",
            trust: 1.6,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1100-nh",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p-660hn-51",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vsg1435-b101",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1121-ni",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b30a",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1123-ac",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1100-n",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8324-b10a",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8924-b10a",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8924-b30a",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg4380-b10a",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1123-ni",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p-663hn-51",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b30b",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b10a",
            scope: "eq",
            trust: 1,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "access point nwa1100-n",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "access point nwa1100-nh",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "access point nwa1123-ac",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "access point nwa1121-ni",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "dsl cpe p-660hn-51",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "dsl cpe p-663hn-51",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "dsl cpe vmg1312-b10a",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "dsl cpe vmg1312-b30a",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "dsl cpe vmg1312-b30b",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "dsl cpe vmg4380-b10a",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "dsl cpe vmg8324-b10a",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "dsl cpe vmg8924-b10a",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "dsl cpe vmg8924-b30a",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "dsl cpe vsg1435-b101",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "gpon pmg1006-b20a",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "gpon pmg5318-b20a",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "small business gateway sbg3300-n000",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "small business gateway sbg3300-nb00",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "small business gateway sbg3500-n000",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "switch gs1900-8",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "switch gs1900-24",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "wimax max208m2w",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "wimax max218m2w",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "wimax max218mw",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "wimax max308m",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "project model c1000z",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "project model q1000",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "project model fr1000z",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "project model p8702n",
            scope: null,
            trust: 0.9,
            vendor: "zyxel",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "actiontec",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "d link",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "general electric",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "netcomm",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "sierra",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "technicolor",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ubiquiti",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "unify",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "zte",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "c1000z",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "fr1000z",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "gs1900-24",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "gs1900-8",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1100-n",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1100-nh",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1121-ni",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1123-ac",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1123-ni",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p-660hn-51",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p-663hn-51",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p8702n",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "pmg5318-b20a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "q1000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3300-n000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3300-nb00",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3500-n000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b30a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b30b",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg4380-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8324-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8924-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8924-b30a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vsg1435-b101",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "",
            scope: null,
            trust: 0.8,
            vendor: "multiple vendors",
            version: null,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2015-08082",
         },
         {
            db: "BID",
            id: "78214",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7256",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201512-204",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:nwa1100-n_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:nwa1100-n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:nwa1100-nh_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:nwa1100-nh:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:nwa1121-ni_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:nwa1121-ni:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:nwa1123-ac_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:nwa1123-ac:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:nwa1123-ni_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:nwa1123-ni:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:p-660hn-51_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:p-660hn-51:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:p-663hn-51_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:p-663hn-51:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:vmg1312-b10a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:vmg1312-b10a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:vmg1312-b30a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:vmg1312-b30a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:vmg1312-b30b_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:vmg1312-b30b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:vmg4380-b10a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:vmg4380-b10a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:vmg8324-b10a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:vmg8924-b10a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:vmg8924-b10a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:vmg8924-b30a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:vmg8924-b30a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:vsg1435-b101_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:vsg1435-b101:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:pmg5318-b20a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:pmg5318-b20a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:sbg3300-n000_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:sbg3300-n000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:sbg3300-nb00_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:sbg3300-nb00:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:sbg3500-n000_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:sbg3500-n000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:gs1900-8_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:gs1900-24_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:c1000z_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:c1000z:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:q1000_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:q1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:fr1000z_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:fr1000z:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zyxel:p8702n_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zyxel:p8702n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-7256",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Stefan Viehb?ck of SEC Consult.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201512-204",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2015-7256",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2015-7256",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CNVD-2015-08082",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "VHN-85217",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.2,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-7256",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2015-08082",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201512-204",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-85217",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-08082",
         },
         {
            db: "VULHUB",
            id: "VHN-85217",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7256",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201512-204",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys. Many embedded devices are not unique X.509 Certificate and SSH Spoofing and intermediary because host key is used (man-in-the-middle) There is a possibility of being attacked and attacks such as decryption of communication contents. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked. ZyXEL Access Point NWA1100-N is a wireless network receiving device from ZyXEL Technology. Multiple ZyXEL Products are prone to an information-disclosure vulnerability. Successful exploits will lead to other attacks",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-7256",
         },
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "CNVD",
            id: "CNVD-2015-08082",
         },
         {
            db: "BID",
            id: "78214",
         },
         {
            db: "VULHUB",
            id: "VHN-85217",
         },
      ],
      trust: 3.24,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#566724",
            trust: 3.6,
         },
         {
            db: "NVD",
            id: "CVE-2015-7256",
            trust: 3.4,
         },
         {
            db: "BID",
            id: "78214",
            trust: 1.6,
         },
         {
            db: "JVN",
            id: "JVNVU96100360",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201512-204",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2015-08082",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-85217",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2015-08082",
         },
         {
            db: "VULHUB",
            id: "VHN-85217",
         },
         {
            db: "BID",
            id: "78214",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7256",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201512-204",
         },
      ],
   },
   id: "VAR-201709-0027",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-08082",
         },
         {
            db: "VULHUB",
            id: "VHN-85217",
         },
      ],
      trust: 1.4433235866666667,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-08082",
         },
      ],
   },
   last_update_date: "2023-12-18T12:57:18.228000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Zyxel to Fix SSH Private Key and Certificate Vulnerability (CVE-2015-7256)",
            trust: 0.8,
            url: "http://www.zyxel.com/support/announcement_ssh_private_key_and_certificate_vulnerability.shtml",
         },
         {
            title: "Patches for multiple ZyXEL product information disclosure vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/68153",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-08082",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-310",
            trust: 1.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-85217",
         },
         {
            db: "NVD",
            id: "CVE-2015-7256",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.8,
            url: "http://www.kb.cert.org/vuls/id/566724",
         },
         {
            trust: 2,
            url: "http://www.zyxel.com/support/announcement_ssh_private_key_and_certificate_vulnerability.shtml",
         },
         {
            trust: 1.6,
            url: "http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.html",
         },
         {
            trust: 1.2,
            url: "http://www.securityfocus.com/bid/78214",
         },
         {
            trust: 0.8,
            url: "http://blog.sec-consult.com/2016/09/house-of-keys-9-months-later-40-worse.html",
         },
         {
            trust: 0.8,
            url: "https://www.sec-consult.com/download/certificates.html",
         },
         {
            trust: 0.8,
            url: "https://www.sec-consult.com/download/ssh_host_keys.html",
         },
         {
            trust: 0.8,
            url: "https://scans.io/",
         },
         {
            trust: 0.8,
            url: "https://scans.io/series/ssh-rsa-full-ipv4",
         },
         {
            trust: 0.8,
            url: "https://scans.io/study/sonar.ssl",
         },
         {
            trust: 0.8,
            url: "https://censys.io",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6358",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7255",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7256",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7276",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8251",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu96100360/index.html",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7256",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-6358",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7255",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7276",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8251",
         },
         {
            trust: 0.3,
            url: "http://www.zyxel.com/th/th/",
         },
         {
            trust: 0.3,
            url: "http://www.kb.cert.org/vuls/id/bluu-a2nqyp",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2015-08082",
         },
         {
            db: "VULHUB",
            id: "VHN-85217",
         },
         {
            db: "BID",
            id: "78214",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7256",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201512-204",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2015-08082",
         },
         {
            db: "VULHUB",
            id: "VHN-85217",
         },
         {
            db: "BID",
            id: "78214",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7256",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201512-204",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-11-25T00:00:00",
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            date: "2015-12-14T00:00:00",
            db: "CNVD",
            id: "CNVD-2015-08082",
         },
         {
            date: "2017-09-28T00:00:00",
            db: "VULHUB",
            id: "VHN-85217",
         },
         {
            date: "2015-11-25T00:00:00",
            db: "BID",
            id: "78214",
         },
         {
            date: "2016-02-29T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            date: "2017-09-28T01:29:00.670000",
            db: "NVD",
            id: "CVE-2015-7256",
         },
         {
            date: "2015-11-25T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201512-204",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-09-06T00:00:00",
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            date: "2015-12-14T00:00:00",
            db: "CNVD",
            id: "CNVD-2015-08082",
         },
         {
            date: "2017-10-11T00:00:00",
            db: "VULHUB",
            id: "VHN-85217",
         },
         {
            date: "2015-11-25T00:00:00",
            db: "BID",
            id: "78214",
         },
         {
            date: "2018-02-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            date: "2017-10-11T17:59:55.210000",
            db: "NVD",
            id: "CVE-2015-7256",
         },
         {
            date: "2015-12-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201512-204",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201512-204",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Embedded devices use non-unique X.509 certificates and SSH host keys",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "encryption problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201512-204",
         },
      ],
      trust: 0.6,
   },
}

var-201911-1540
Vulnerability from variot

Technicolor C2000T and C2100T uses hard-coded cryptographic keys. Many embedded devices are not unique X.509 Certificate and SSH Spoofing and intermediary because host key is used (man-in-the-middle) There is a possibility of being attacked and attacks such as decryption of communication contents. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1540",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "c2100t",
            scope: "eq",
            trust: 2.2,
            vendor: "technicolor",
            version: null,
         },
         {
            model: "c2000t",
            scope: "eq",
            trust: 2.2,
            vendor: "technicolor",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "actiontec",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "d link",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "general electric",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "netcomm",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "sierra",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "technicolor",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ubiquiti",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "unify",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "zte",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "c1000z",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "fr1000z",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "gs1900-24",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "gs1900-8",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1100-n",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1100-nh",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1121-ni",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1123-ac",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1123-ni",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p-660hn-51",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p-663hn-51",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p8702n",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "pmg5318-b20a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "q1000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3300-n000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3300-nb00",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3500-n000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b30a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b30b",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg4380-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8324-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8924-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8924-b30a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vsg1435-b101",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "",
            scope: null,
            trust: 0.8,
            vendor: "multiple vendors",
            version: null,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7276",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-301",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:technicolor:c2000t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:technicolor:c2000t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:technicolor:c2100t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:technicolor:c2100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-7276",
         },
      ],
   },
   cve: "CVE-2015-7276",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2015-7276",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.2,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-7276",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201911-301",
                  trust: 0.6,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7276",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-301",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Technicolor C2000T and C2100T uses hard-coded cryptographic keys. Many embedded devices are not unique X.509 Certificate and SSH Spoofing and intermediary because host key is used (man-in-the-middle) There is a possibility of being attacked and attacks such as decryption of communication contents. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-7276",
         },
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#566724",
            trust: 3.2,
         },
         {
            db: "NVD",
            id: "CVE-2015-7276",
            trust: 2.4,
         },
         {
            db: "JVN",
            id: "JVNVU96100360",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-301",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7276",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-301",
         },
      ],
   },
   id: "VAR-201911-1540",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5497076,
   },
   last_update_date: "2023-12-18T12:57:18.203000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Zyxel to Fix SSH Private Key and Certificate Vulnerability (CVE-2015-7256)",
            trust: 0.8,
            url: "http://www.zyxel.com/support/announcement_ssh_private_key_and_certificate_vulnerability.shtml",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-798",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-7276",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "http://www.kb.cert.org/vuls/id/566724",
         },
         {
            trust: 1.6,
            url: "http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.html",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7276",
         },
         {
            trust: 1,
            url: "https://sec-consult.com/en/blog/2015/11/house-of-keys-industry-wide-https/",
         },
         {
            trust: 0.8,
            url: "http://blog.sec-consult.com/2016/09/house-of-keys-9-months-later-40-worse.html",
         },
         {
            trust: 0.8,
            url: "https://www.sec-consult.com/download/certificates.html",
         },
         {
            trust: 0.8,
            url: "https://www.sec-consult.com/download/ssh_host_keys.html",
         },
         {
            trust: 0.8,
            url: "https://scans.io/",
         },
         {
            trust: 0.8,
            url: "https://scans.io/series/ssh-rsa-full-ipv4",
         },
         {
            trust: 0.8,
            url: "https://scans.io/study/sonar.ssl",
         },
         {
            trust: 0.8,
            url: "https://censys.io",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6358",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7255",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7256",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7276",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8251",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu96100360/index.html",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7256",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-6358",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7255",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8251",
         },
         {
            trust: 0.6,
            url: "https/",
         },
         {
            trust: 0.6,
            url: "https://sec-consult.com/en/blog/2015/11/house-of-keys-industry-wide-",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7276",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-301",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7276",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-301",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-11-25T00:00:00",
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            date: "2016-02-29T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            date: "2019-11-06T16:15:10.447000",
            db: "NVD",
            id: "CVE-2015-7276",
         },
         {
            date: "2019-11-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201911-301",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-09-06T00:00:00",
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            date: "2018-02-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            date: "2019-11-08T19:42:59.110000",
            db: "NVD",
            id: "CVE-2015-7276",
         },
         {
            date: "2019-11-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201911-301",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201911-301",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Embedded devices use non-unique X.509 certificates and SSH host keys",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "trust management problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201911-301",
         },
      ],
      trust: 0.6,
   },
}

var-201709-0051
Vulnerability from variot

OpenStage 60 and OpenScape Desk Phone IP 55G SIP V3, OpenStage 15, 20E, 20 and 40 and OpenScape Desk Phone IP 35G SIP V3, OpenScape Desk Phone IP 35G Eco SIP V3, OpenStage 60 and OpenScape Desk Phone IP 55G HFA V3, OpenStage 15, 20E, 20, and 40 and OpenScape Desk Phone IP 35G HFA V3, and OpenScape Desk Phone IP 35G Eco HFA V3 use non-unique X.509 certificates and SSH host keys. Many embedded devices are not unique X.509 Certificate and SSH Spoofing and intermediary because host key is used (man-in-the-middle) There is a possibility of being attacked and attacks such as decryption of communication contents. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked. UnifyOpenStage60 and so on are all IP phones from Unify. A remote attacker could exploit the vulnerability to exploit a man-in-the-middle attack or decrypt communication between legitimate users and devices

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201709-0051",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "openstage 20e",
            scope: "eq",
            trust: 1.6,
            vendor: "unify",
            version: "3.0",
         },
         {
            model: "openscape desk phone ip 35g sip",
            scope: "eq",
            trust: 1.6,
            vendor: "unify",
            version: "3.0",
         },
         {
            model: "openstage 15",
            scope: "eq",
            trust: 1.6,
            vendor: "unify",
            version: "3.0",
         },
         {
            model: "openscape desk phone ip 35g hfa",
            scope: "eq",
            trust: 1.6,
            vendor: "unify",
            version: "3.0",
         },
         {
            model: "openstage 20",
            scope: "eq",
            trust: 1.6,
            vendor: "unify",
            version: "3.0",
         },
         {
            model: "openscape desk phone ip 55g hfa",
            scope: "eq",
            trust: 1.6,
            vendor: "unify",
            version: "3.0",
         },
         {
            model: "openscape desk phone ip 55g sip",
            scope: "eq",
            trust: 1.6,
            vendor: "unify",
            version: "3.0",
         },
         {
            model: "openscape desk phone ip 35g eco sip",
            scope: "eq",
            trust: 1.6,
            vendor: "unify",
            version: "3.0",
         },
         {
            model: "openstage 40",
            scope: "eq",
            trust: 1.6,
            vendor: "unify",
            version: "3.0",
         },
         {
            model: "openstage 60",
            scope: "eq",
            trust: 1.6,
            vendor: "unify",
            version: "3.0",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "actiontec",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "d link",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "general electric",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "netcomm",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "sierra",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "technicolor",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ubiquiti",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "unify",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "zte",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "c1000z",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "fr1000z",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "gs1900-24",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "gs1900-8",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1100-n",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1100-nh",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1121-ni",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1123-ac",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1123-ni",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p-660hn-51",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p-663hn-51",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p8702n",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "pmg5318-b20a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "q1000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3300-n000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3300-nb00",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3500-n000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b30a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b30b",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg4380-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8324-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8924-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8924-b30a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vsg1435-b101",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "",
            scope: null,
            trust: 0.8,
            vendor: "multiple vendors",
            version: null,
         },
         {
            model: "openstage",
            scope: "eq",
            trust: 0.6,
            vendor: "unify",
            version: "60",
         },
         {
            model: "openscape desk phone ip 55g sip",
            scope: "eq",
            trust: 0.6,
            vendor: "unify",
            version: "v3",
         },
         {
            model: "openscape desk phone ip 35g sip",
            scope: "eq",
            trust: 0.6,
            vendor: "unify",
            version: "v3",
         },
         {
            model: "openstage",
            scope: "eq",
            trust: 0.6,
            vendor: "unify",
            version: "40",
         },
         {
            model: "openstage",
            scope: "eq",
            trust: 0.6,
            vendor: "unify",
            version: "20",
         },
         {
            model: "openstage 20e",
            scope: null,
            trust: 0.6,
            vendor: "unify",
            version: null,
         },
         {
            model: "openstage",
            scope: "eq",
            trust: 0.6,
            vendor: "unify",
            version: "15",
         },
         {
            model: "openscape desk phone ip 55g hfa",
            scope: "eq",
            trust: 0.6,
            vendor: "unify",
            version: "v3",
         },
         {
            model: "openscape desk phone ip 35g hfa",
            scope: "eq",
            trust: 0.6,
            vendor: "unify",
            version: "v3",
         },
         {
            model: "openscape desk phone ip 35g eco hfa",
            scope: "eq",
            trust: 0.6,
            vendor: "unify",
            version: "v3",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-33799",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-8251",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201709-1157",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:unify:openstage_60_firmware:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:unify:openstage_60:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:unify:openscape_desk_phone_ip_55g_sip_firmware:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:unify:openscape_desk_phone_ip_55g_sip:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:unify:openstage_15_firmware:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:unify:openstage_15:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:unify:openstage_20e_firmware:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:unify:openstage_20e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:unify:openstage_20_firmware:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:unify:openstage_20:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:unify:openstage_40_firmware:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:unify:openstage_40:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:unify:openscape_desk_phone_ip_35g_sip_firmware:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:unify:openscape_desk_phone_ip_35g_sip:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:unify:openscape_desk_phone_ip_35g_eco_sip_firmware:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:unify:openscape_desk_phone_ip_35g_eco_sip:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:unify:openscape_desk_phone_ip_55g_hfa_firmware:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:unify:openscape_desk_phone_ip_55g_hfa:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:unify:openscape_desk_phone_ip_35g_hfa_firmware:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:unify:openscape_desk_phone_ip_35g_hfa:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:unify:openstage_60_firmware:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:unify:openscape_desk_phone_ip_35g_eco_hfa:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-8251",
         },
      ],
   },
   cve: "CVE-2015-8251",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2015-8251",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CNVD-2017-33799",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "VHN-86212",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.2,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-8251",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-33799",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201709-1157",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-86212",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-33799",
         },
         {
            db: "VULHUB",
            id: "VHN-86212",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-8251",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201709-1157",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenStage 60 and OpenScape Desk Phone IP 55G SIP V3, OpenStage 15, 20E, 20 and 40 and OpenScape Desk Phone IP 35G SIP V3, OpenScape Desk Phone IP 35G Eco SIP V3, OpenStage 60 and OpenScape Desk Phone IP 55G HFA V3, OpenStage 15, 20E, 20, and 40 and OpenScape Desk Phone IP 35G HFA V3, and OpenScape Desk Phone IP 35G Eco HFA V3 use non-unique X.509 certificates and SSH host keys. Many embedded devices are not unique X.509 Certificate and SSH Spoofing and intermediary because host key is used (man-in-the-middle) There is a possibility of being attacked and attacks such as decryption of communication contents. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked. UnifyOpenStage60 and so on are all IP phones from Unify. A remote attacker could exploit the vulnerability to exploit a man-in-the-middle attack or decrypt communication between legitimate users and devices",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-8251",
         },
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-33799",
         },
         {
            db: "VULHUB",
            id: "VHN-86212",
         },
      ],
      trust: 2.97,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#566724",
            trust: 3.9,
         },
         {
            db: "NVD",
            id: "CVE-2015-8251",
            trust: 3.1,
         },
         {
            db: "JVN",
            id: "JVNVU96100360",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201709-1157",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-33799",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "84118",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-86212",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-33799",
         },
         {
            db: "VULHUB",
            id: "VHN-86212",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-8251",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201709-1157",
         },
      ],
   },
   id: "VAR-201709-0051",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-33799",
         },
         {
            db: "VULHUB",
            id: "VHN-86212",
         },
      ],
      trust: 1.1312134525,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-33799",
         },
      ],
   },
   last_update_date: "2023-12-18T12:57:18.266000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Zyxel to Fix SSH Private Key and Certificate Vulnerability (CVE-2015-7256)",
            trust: 0.8,
            url: "http://www.zyxel.com/support/announcement_ssh_private_key_and_certificate_vulnerability.shtml",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-86212",
         },
         {
            db: "NVD",
            id: "CVE-2015-8251",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.1,
            url: "http://www.kb.cert.org/vuls/id/566724",
         },
         {
            trust: 1.7,
            url: "https://networks.unify.com/security/advisories/obso-1511-02-a.pdf",
         },
         {
            trust: 1.7,
            url: "https://networks.unify.com/security/advisories/obso-1511-02.pdf",
         },
         {
            trust: 1.7,
            url: "https://www.kb.cert.org/vuls/id/bluu-a2ppze",
         },
         {
            trust: 1.6,
            url: "http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.html",
         },
         {
            trust: 0.8,
            url: "http://blog.sec-consult.com/2016/09/house-of-keys-9-months-later-40-worse.html",
         },
         {
            trust: 0.8,
            url: "https://www.sec-consult.com/download/certificates.html",
         },
         {
            trust: 0.8,
            url: "https://www.sec-consult.com/download/ssh_host_keys.html",
         },
         {
            trust: 0.8,
            url: "https://scans.io/",
         },
         {
            trust: 0.8,
            url: "https://scans.io/series/ssh-rsa-full-ipv4",
         },
         {
            trust: 0.8,
            url: "https://scans.io/study/sonar.ssl",
         },
         {
            trust: 0.8,
            url: "https://censys.io",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6358",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7255",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7256",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7276",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8251",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu96100360/index.html",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7256",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-6358",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7255",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7276",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8251",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-33799",
         },
         {
            db: "VULHUB",
            id: "VHN-86212",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-8251",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201709-1157",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-33799",
         },
         {
            db: "VULHUB",
            id: "VHN-86212",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-8251",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201709-1157",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-11-25T00:00:00",
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            date: "2017-11-14T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-33799",
         },
         {
            date: "2017-09-25T00:00:00",
            db: "VULHUB",
            id: "VHN-86212",
         },
         {
            date: "2016-02-29T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            date: "2017-09-25T21:29:00.913000",
            db: "NVD",
            id: "CVE-2015-8251",
         },
         {
            date: "2017-09-25T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201709-1157",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-09-06T00:00:00",
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            date: "2017-11-14T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-33799",
         },
         {
            date: "2017-10-11T00:00:00",
            db: "VULHUB",
            id: "VHN-86212",
         },
         {
            date: "2018-02-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            date: "2017-10-11T17:53:34.040000",
            db: "NVD",
            id: "CVE-2015-8251",
         },
         {
            date: "2017-11-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201709-1157",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201709-1157",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Embedded devices use non-unique X.509 certificates and SSH host keys",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201709-1157",
         },
      ],
      trust: 0.6,
   },
}

var-201710-0035
Vulnerability from variot

Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked. The Cisco RV320 Dual Gigabit WAN VPN is a router product from Cisco Systems, USA. Multiple Cisco Products are prone to an information-disclosure vulnerability. Successful exploits will lead to other attacks. This issue is being tracked by Cisco Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913. The flaw stems from the fact that the program does not generate unique keys and certificates

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0035",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "wap4410n",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "2.0.7.8",
         },
         {
            model: "srp520-u",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "1.2.6",
         },
         {
            model: "wap2000",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "2.0.8.0",
         },
         {
            model: "wvc2300",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "1.1.2.6",
         },
         {
            model: "rv315w",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "1.01.03",
         },
         {
            model: "wap4400n",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "srp520",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "1.01.29",
         },
         {
            model: "rtp300",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "3.1.24",
         },
         {
            model: "rv180w",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "1.0.5.4",
         },
         {
            model: "wrvs4400n",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "2.0.2.2",
         },
         {
            model: "wap200",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "2.0.6.0",
         },
         {
            model: "rvs4000",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "2.0.3.4",
         },
         {
            model: "wrv210",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "2.0.1.5",
         },
         {
            model: "wrp500",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "1.0.1.002",
         },
         {
            model: "rv325",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "1.3.1.10",
         },
         {
            model: "wrv200",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.0.39",
         },
         {
            model: "rv180",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "1.0.5.4",
         },
         {
            model: "wet200",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "2.0.8.0",
         },
         {
            model: "rv120w",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "1.0.5.9",
         },
         {
            model: "spa400",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "1.1.2.2",
         },
         {
            model: "pvc2300",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "1.1.2.6",
         },
         {
            model: "srw224p",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "2.0.2.4",
         },
         {
            model: "rv220w",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "1.0.4.17",
         },
         {
            model: "rv320",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "1.3.1.10",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "actiontec",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "d link",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "general electric",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "netcomm",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "sierra",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "technicolor",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ubiquiti",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "unify",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "zte",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "c1000z",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "fr1000z",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "gs1900-24",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "gs1900-8",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1100-n",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1100-nh",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1121-ni",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1123-ac",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1123-ni",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p-660hn-51",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p-663hn-51",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p8702n",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "pmg5318-b20a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "q1000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3300-n000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3300-nb00",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3500-n000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b30a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b30b",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg4380-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8324-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8924-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8924-b30a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vsg1435-b101",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "",
            scope: null,
            trust: 0.8,
            vendor: "multiple vendors",
            version: null,
         },
         {
            model: "rv320 dual gigabit wan vpn router",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rv325 dual gigabit wan vpn router",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rv325 dual wan gigabit vpn router",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rvs4000 4-port gigabit security router vpn",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "wrv210 wireless-g vpn router rangebooster",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "wap4410n wireless-n access point poe/advanced security",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "wrv200 wireless-g vpn router rangebooster",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "wrvs4400n wireless",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "srw224p",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "2.0.2.4",
         },
         {
            model: "wap4400n",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "wvc2300",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "1.1.2.6",
         },
         {
            model: "rv180",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "1.0.5.4",
         },
         {
            model: "wap200",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "2.0.6.0",
         },
         {
            model: "wrvs4400n",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "2.0.2.2",
         },
         {
            model: "rv180w",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "1.0.5.4",
         },
         {
            model: "wap2000",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "2.0.8.0",
         },
         {
            model: "pvc2300",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "1.1.2.6",
         },
         {
            model: "wet200",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "2.0.8.0",
         },
         {
            model: "wvc2300 wireless-g business internet video camera audio",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "wrvs4400n wireless-n gigabit security router vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-2.0",
         },
         {
            model: "wrv210 wireless-g vpn router rangebooster",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "wrv200 wireless-g vpn router rangebooster",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "wrp500 wireless-ac broadband router with phone ports",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "20",
         },
         {
            model: "wet200 wireless-g business ethernet bridge",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "wap4410n wireless-n access point poe/advanced security",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "wap4400n wireless-n access point poe",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "wap2000 wireless-g access point poe",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "wap200 wireless-g access point poe/rangebooster",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "srw224p 24-port 2-port gigabit switch webview/poe",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10/100+-0",
         },
         {
            model: "spa400 internet telephony gateway with fxo ports",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40",
         },
         {
            model: "small business srp520-u models",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "small business srp520 models",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rvs4000 4-port gigabit security router vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "rv325 dual wan gigabit vpn router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rv325 dual gigabit wan vpn router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rv320 dual gigabit wan vpn router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rv315w wireless-n vpn router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rv220w wireless network security firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rv180w wireless-n multifunction vpn router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rv180 vpn router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rv120w wireless-n vpn firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rtp300 broadband router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "pvc2300 business internet video camera audio/poe",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2015-07863",
         },
         {
            db: "BID",
            id: "78047",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-6358",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-426",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "1.3.1.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "1.3.1.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:rvs4000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "2.0.3.4",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:rvs4000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:wrv210_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "2.0.1.5",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:wrv210:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:wap4410n_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "2.0.7.8",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:wap4410n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:wrv200_firmware:1.0.39:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:wrv200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:wrvs4400n_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "2.0.2.2",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:wrvs4400n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:wap200_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "2.0.6.0",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:wap200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:wvc2300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "1.1.2.6",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:wvc2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pvc2300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "1.1.2.6",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:pvc2300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:srw224p_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "2.0.2.4",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:srw224p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:wet200_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "2.0.8.0",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:wet200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:wap2000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "2.0.8.0",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:wap2000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:wap4400n_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "-",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:wap4400n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:rv120w_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "1.0.5.9",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:rv120w:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:rv180_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "1.0.5.4",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:rv180:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:rv180w_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "1.0.5.4",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:rv180w:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:rv315w_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "1.01.03",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:rv315w:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:srp520_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "1.01.29",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:srp520:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:srp520-u_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "1.2.6",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:srp520-u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:wrp500_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "1.0.1.002",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:wrp500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:spa400_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "1.1.2.2",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:spa400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:rtp300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "3.1.24",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:rtp300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:rv220w_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "1.0.4.17",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:rv220w:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-6358",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Stefan Viehböck of SEC Consult.",
      sources: [
         {
            db: "BID",
            id: "78047",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-6358",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2015-6358",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CNVD-2015-07863",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "VHN-84319",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.2,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-6358",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2015-07863",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201511-426",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-84319",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07863",
         },
         {
            db: "VULHUB",
            id: "VHN-84319",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-6358",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-426",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked. The Cisco RV320 Dual Gigabit WAN VPN is a router product from Cisco Systems, USA. Multiple Cisco Products are prone to an information-disclosure vulnerability. Successful exploits will lead to other attacks. \nThis issue is being tracked by Cisco Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913. The flaw stems from the fact that the program does not generate unique keys and certificates",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-6358",
         },
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "CNVD",
            id: "CNVD-2015-07863",
         },
         {
            db: "BID",
            id: "78047",
         },
         {
            db: "VULHUB",
            id: "VHN-84319",
         },
      ],
      trust: 3.24,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#566724",
            trust: 3.6,
         },
         {
            db: "NVD",
            id: "CVE-2015-6358",
            trust: 3.4,
         },
         {
            db: "BID",
            id: "78047",
            trust: 2,
         },
         {
            db: "SECTRACK",
            id: "1034257",
            trust: 1.7,
         },
         {
            db: "SECTRACK",
            id: "1034255",
            trust: 1.7,
         },
         {
            db: "SECTRACK",
            id: "1034258",
            trust: 1.7,
         },
         {
            db: "SECTRACK",
            id: "1034256",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU96100360",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-426",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2015-07863",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-84319",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2015-07863",
         },
         {
            db: "VULHUB",
            id: "VHN-84319",
         },
         {
            db: "BID",
            id: "78047",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-6358",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-426",
         },
      ],
   },
   id: "VAR-201710-0035",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07863",
         },
         {
            db: "VULHUB",
            id: "VHN-84319",
         },
      ],
      trust: 1.3657509969230768,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07863",
         },
      ],
   },
   last_update_date: "2023-12-18T12:57:18.166000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Zyxel to Fix SSH Private Key and Certificate Vulnerability (CVE-2015-7256)",
            trust: 0.8,
            url: "http://www.zyxel.com/support/announcement_ssh_private_key_and_certificate_vulnerability.shtml",
         },
         {
            title: "Patches for multiple Cisco product information disclosure vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/67387",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2015-07863",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-295",
            trust: 1.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-84319",
         },
         {
            db: "NVD",
            id: "CVE-2015-6358",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.8,
            url: "http://www.kb.cert.org/vuls/id/566724",
         },
         {
            trust: 2.6,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151125-ci",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/78047",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id/1034255",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id/1034256",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id/1034257",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id/1034258",
         },
         {
            trust: 1.6,
            url: "http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.html",
         },
         {
            trust: 0.8,
            url: "http://blog.sec-consult.com/2016/09/house-of-keys-9-months-later-40-worse.html",
         },
         {
            trust: 0.8,
            url: "https://www.sec-consult.com/download/certificates.html",
         },
         {
            trust: 0.8,
            url: "https://www.sec-consult.com/download/ssh_host_keys.html",
         },
         {
            trust: 0.8,
            url: "https://scans.io/",
         },
         {
            trust: 0.8,
            url: "https://scans.io/series/ssh-rsa-full-ipv4",
         },
         {
            trust: 0.8,
            url: "https://scans.io/study/sonar.ssl",
         },
         {
            trust: 0.8,
            url: "https://censys.io",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6358",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7255",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7256",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7276",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8251",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu96100360/index.html",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7256",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-6358",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7255",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7276",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8251",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/",
         },
         {
            trust: 0.3,
            url: "http://www.kb.cert.org/vuls/id/bluu-a2nqxj",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2015-07863",
         },
         {
            db: "VULHUB",
            id: "VHN-84319",
         },
         {
            db: "BID",
            id: "78047",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-6358",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-426",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2015-07863",
         },
         {
            db: "VULHUB",
            id: "VHN-84319",
         },
         {
            db: "BID",
            id: "78047",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-6358",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201511-426",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-11-25T00:00:00",
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            date: "2015-12-01T00:00:00",
            db: "CNVD",
            id: "CNVD-2015-07863",
         },
         {
            date: "2017-10-12T00:00:00",
            db: "VULHUB",
            id: "VHN-84319",
         },
         {
            date: "2015-11-25T00:00:00",
            db: "BID",
            id: "78047",
         },
         {
            date: "2016-02-29T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            date: "2017-10-12T15:29:00.217000",
            db: "NVD",
            id: "CVE-2015-6358",
         },
         {
            date: "2015-11-26T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201511-426",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-09-06T00:00:00",
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            date: "2015-12-01T00:00:00",
            db: "CNVD",
            id: "CNVD-2015-07863",
         },
         {
            date: "2017-11-03T00:00:00",
            db: "VULHUB",
            id: "VHN-84319",
         },
         {
            date: "2015-11-25T00:00:00",
            db: "BID",
            id: "78047",
         },
         {
            date: "2018-02-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            date: "2017-11-03T16:46:26.840000",
            db: "NVD",
            id: "CVE-2015-6358",
         },
         {
            date: "2017-10-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201511-426",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201511-426",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Embedded devices use non-unique X.509 certificates and SSH host keys",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "lack of information",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201511-426",
         },
      ],
      trust: 0.6,
   },
}

var-201708-0143
Vulnerability from variot

ZTE OX-330P, ZXHN H108N, W300V1.0.0S_ZRD_TR1_D68, HG110, GAN9.8T101A-B, MF28G, ZXHN H108N use non-unique X.509 certificates and SSH host keys, which might allow remote attackers to obtain credentials or other sensitive information via a man-in-the-middle attack, passive decryption attack, or impersonating a legitimate device. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. As a result, confidential information may be leaked. ZTEOX-330P and others are wireless router products of China ZTE Corporation (ZTE). An information disclosure vulnerability exists in several ZTE products. The following products are affected: ZTE OX-330P; ZXHN H108N; W300V1.0.0S_ZRD_TR1_D68; HG110; GAN9.8T101A-B; MF28G;

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201708-0143",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "ox-330p",
            scope: "eq",
            trust: 1.6,
            vendor: "zte",
            version: null,
         },
         {
            model: "zxhn h108n",
            scope: "eq",
            trust: 1.6,
            vendor: "zte",
            version: null,
         },
         {
            model: "hg110",
            scope: "eq",
            trust: 1.6,
            vendor: "zte",
            version: null,
         },
         {
            model: "gan9.8t101a-b",
            scope: "eq",
            trust: 1.6,
            vendor: "zte",
            version: null,
         },
         {
            model: "mf28g",
            scope: "eq",
            trust: 1.6,
            vendor: "zte",
            version: null,
         },
         {
            model: "w300v1.0.0s zrd tr1 d68",
            scope: "eq",
            trust: 1.6,
            vendor: "zte",
            version: null,
         },
         {
            model: "zxhn h108n",
            scope: null,
            trust: 1.2,
            vendor: "zte",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "actiontec",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "d link",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "general electric",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "huawei",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "netcomm",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "sierra",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "technicolor",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ubiquiti",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "unify",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "zte",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "c1000z",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "fr1000z",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "gs1900-24",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "gs1900-8",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1100-n",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1100-nh",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1121-ni",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1123-ac",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "nwa1123-ni",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p-660hn-51",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p-663hn-51",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "p8702n",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "pmg5318-b20a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "q1000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3300-n000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3300-nb00",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "sbg3500-n000",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b30a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg1312-b30b",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg4380-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8324-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8924-b10a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vmg8924-b30a",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "vsg1435-b101",
            scope: null,
            trust: 0.8,
            vendor: "zyxel",
            version: null,
         },
         {
            model: "",
            scope: null,
            trust: 0.8,
            vendor: "multiple vendors",
            version: null,
         },
         {
            model: "ox-330p",
            scope: null,
            trust: 0.6,
            vendor: "zte",
            version: null,
         },
         {
            model: "w300v1.0.0s zrd tr1 d68",
            scope: null,
            trust: 0.6,
            vendor: "zte",
            version: null,
         },
         {
            model: "hg110",
            scope: null,
            trust: 0.6,
            vendor: "zte",
            version: null,
         },
         {
            model: "gan9.8t101a-b",
            scope: null,
            trust: 0.6,
            vendor: "zte",
            version: null,
         },
         {
            model: "mf28g",
            scope: null,
            trust: 0.6,
            vendor: "zte",
            version: null,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-33516",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7255",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201708-1334",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zte:ox-330p_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zte:ox-330p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zte:zxhn_h108n_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zte:zxhn_h108n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zte:w300v1.0.0s_zrd_tr1_d68_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zte:w300v1.0.0s_zrd_tr1_d68:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zte:hg110_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zte:hg110:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zte:gan9.8t101a-b_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zte:gan9.8t101a-b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zte:mf28g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zte:mf28g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:zte:zxhn_h108n_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:zte:zxhn_h108n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-7255",
         },
      ],
   },
   cve: "CVE-2015-7255",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2015-7255",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CNVD-2017-33516",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-85216",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-7255",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2015-7255",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-33516",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201708-1334",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-85216",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-33516",
         },
         {
            db: "VULHUB",
            id: "VHN-85216",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7255",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201708-1334",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "ZTE OX-330P, ZXHN H108N, W300V1.0.0S_ZRD_TR1_D68, HG110, GAN9.8T101A-B, MF28G, ZXHN H108N use non-unique X.509 certificates and SSH host keys, which might allow remote attackers to obtain credentials or other sensitive information via a man-in-the-middle attack, passive decryption attack, or impersonating a legitimate device. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. As a result, confidential information may be leaked. ZTEOX-330P and others are wireless router products of China ZTE Corporation (ZTE). An information disclosure vulnerability exists in several ZTE products. The following products are affected: ZTE OX-330P; ZXHN H108N; W300V1.0.0S_ZRD_TR1_D68; HG110; GAN9.8T101A-B; MF28G;",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-7255",
         },
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-33516",
         },
         {
            db: "VULHUB",
            id: "VHN-85216",
         },
      ],
      trust: 2.97,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#566724",
            trust: 3.9,
         },
         {
            db: "NVD",
            id: "CVE-2015-7255",
            trust: 3.1,
         },
         {
            db: "JVN",
            id: "JVNVU96100360",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201708-1334",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-33516",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-85216",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-33516",
         },
         {
            db: "VULHUB",
            id: "VHN-85216",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7255",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201708-1334",
         },
      ],
   },
   id: "VAR-201708-0143",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-33516",
         },
         {
            db: "VULHUB",
            id: "VHN-85216",
         },
      ],
      trust: 1.2870330757142856,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-33516",
         },
      ],
   },
   last_update_date: "2023-12-18T12:57:18.133000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Zyxel to Fix SSH Private Key and Certificate Vulnerability (CVE-2015-7256)",
            trust: 0.8,
            url: "http://www.zyxel.com/support/announcement_ssh_private_key_and_certificate_vulnerability.shtml",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-85216",
         },
         {
            db: "NVD",
            id: "CVE-2015-7255",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.1,
            url: "http://www.kb.cert.org/vuls/id/566724",
         },
         {
            trust: 1.7,
            url: "https://www.kb.cert.org/vuls/id/bluu-a2nqyr",
         },
         {
            trust: 1.6,
            url: "http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.html",
         },
         {
            trust: 1.6,
            url: "https://github.com/sec-consult/houseofkeys/search?p=3&q=zte&type=&utf8=%e2%9c%93",
         },
         {
            trust: 0.8,
            url: "http://blog.sec-consult.com/2016/09/house-of-keys-9-months-later-40-worse.html",
         },
         {
            trust: 0.8,
            url: "https://www.sec-consult.com/download/certificates.html",
         },
         {
            trust: 0.8,
            url: "https://www.sec-consult.com/download/ssh_host_keys.html",
         },
         {
            trust: 0.8,
            url: "https://scans.io/",
         },
         {
            trust: 0.8,
            url: "https://scans.io/series/ssh-rsa-full-ipv4",
         },
         {
            trust: 0.8,
            url: "https://scans.io/study/sonar.ssl",
         },
         {
            trust: 0.8,
            url: "https://censys.io",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6358",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7255",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7256",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7276",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8251",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu96100360/index.html",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7256",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-6358",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7255",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7276",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8251",
         },
         {
            trust: 0.1,
            url: "https://github.com/sec-consult/houseofkeys/search?p=3&q=zte&type=&utf8=%e2%9c%93",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-33516",
         },
         {
            db: "VULHUB",
            id: "VHN-85216",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7255",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201708-1334",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-33516",
         },
         {
            db: "VULHUB",
            id: "VHN-85216",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            db: "NVD",
            id: "CVE-2015-7255",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201708-1334",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-11-25T00:00:00",
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            date: "2017-11-10T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-33516",
         },
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-85216",
         },
         {
            date: "2016-02-29T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            date: "2017-08-29T15:29:00.517000",
            db: "NVD",
            id: "CVE-2015-7255",
         },
         {
            date: "2017-08-29T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201708-1334",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-09-06T00:00:00",
            db: "CERT/CC",
            id: "VU#566724",
         },
         {
            date: "2017-11-10T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-33516",
         },
         {
            date: "2017-09-12T00:00:00",
            db: "VULHUB",
            id: "VHN-85216",
         },
         {
            date: "2018-02-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-006907",
         },
         {
            date: "2017-09-12T15:56:48.910000",
            db: "NVD",
            id: "CVE-2015-7255",
         },
         {
            date: "2017-10-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201708-1334",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201708-1334",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Embedded devices use non-unique X.509 certificates and SSH host keys",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#566724",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201708-1334",
         },
      ],
      trust: 0.6,
   },
}

cve-2015-7256
Vulnerability from cvelistv5
Published
2017-09-27 18:00
Modified
2024-08-06 07:43
Severity ?
Summary
ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T07:43:45.967Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "VU#566724",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/566724",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-11-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-09-28T12:57:01",
            orgId: "37e5125f-f79b-445b-8fad-9564f167944b",
            shortName: "certcc",
         },
         references: [
            {
               name: "VU#566724",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/566724",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cert@cert.org",
               ID: "CVE-2015-7256",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "VU#566724",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/566724",
                  },
                  {
                     name: "http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml",
                     refsource: "CONFIRM",
                     url: "http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b",
      assignerShortName: "certcc",
      cveId: "CVE-2015-7256",
      datePublished: "2017-09-27T18:00:00",
      dateReserved: "2015-09-18T00:00:00",
      dateUpdated: "2024-08-06T07:43:45.967Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2017-09-28 01:29
Modified
2024-11-21 02:36
Summary
ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:nwa1100-n_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D2E585A-9A92-4A4A-9496-61C3F9AD74C0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:nwa1100-n:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6904F1E3-5032-4FC8-95C9-1E2267A19382",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:nwa1100-nh_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDF4B052-913F-477D-BCCC-2CE965F6FE13",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:nwa1100-nh:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F73B7235-D7A0-4931-A92E-4B1BEE2102F9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:nwa1121-ni_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CCCE350-59AB-42A1-AA17-F82289D5BCF4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:nwa1121-ni:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5156EAF7-E47F-4A8A-BB6C-047969276060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:nwa1123-ac_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30A700E3-2BC9-4BCF-A0FC-F7EFB1DF7392",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:nwa1123-ac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4261C53-83AC-4440-8408-7A8DFFE10F04",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:nwa1123-ni_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "258C8E28-0C36-4B59-A047-938779FECD9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:nwa1123-ni:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98A7D843-1F0F-4173-A581-73B60130C7EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:p-660hn-51_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C16165B-FD30-43B0-965E-CBC8C46B1DB7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:p-660hn-51:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0138796-FFDC-4976-83AB-018DD7CD7D5F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:p-663hn-51_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "04DAE774-A4DE-4F56-A22B-0C2AE261BEDC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:p-663hn-51:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F2A8EAA-E91F-48D8-82F9-0719C6F6BB2F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:vmg1312-b10a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8CC0C61-EB6A-4736-80E3-B69693D4A2B1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:vmg1312-b10a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B6C4A31-3B83-444F-B5F8-1397B43B2211",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:vmg1312-b30a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B0F62E6-04C9-4611-8C82-80DD8D58757F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:vmg1312-b30a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD5CB070-4FD9-4393-94BF-40E3FD0C596F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:vmg1312-b30b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C4A52F8-F5FD-4E53-BBE6-69F673A7904B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:vmg1312-b30b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CF7CD5-ADE5-4F77-9F81-C0FF32A5E267",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:vmg4380-b10a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4808FDF8-4815-4C4F-AFE7-31EADE517B31",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:vmg4380-b10a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88BA2BDF-9ACA-4F89-B7B7-FD232A6399CD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:vmg8324-b10a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF0AFA0F-D126-4D1C-89EC-878AB0F5E74C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53C32749-82A6-42AA-9EBE-11014F161D2F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:vmg8924-b10a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11BEC42C-7815-4EA3-B1E5-66E2443B5032",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:vmg8924-b10a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96DC6BBF-15B8-496F-85FE-5373B6CEDC3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:vmg8924-b30a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CB88CC1-9F13-4EB1-AF6D-5ED44EFB9868",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:vmg8924-b30a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89D58204-B0DB-4C36-A619-FA5969797CF2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:vsg1435-b101_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5047833-C798-4111-8C97-CE9B70F7834D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:vsg1435-b101:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C31517DD-3D1B-4F9D-8673-145927CADFBB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:pmg5318-b20a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "41AF2B1B-A5BB-4F40-9C30-6AD665AE5596",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:pmg5318-b20a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EF6C90D-9BF3-4302-B834-BC897473E502",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:sbg3300-n000_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "852E8F04-4C28-4904-AA4A-ACE4EAD6DC31",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:sbg3300-n000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "902A735D-2D84-4183-B4B3-FA36AD9F13A5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:sbg3300-nb00_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B338AE18-ECE4-4B90-A1D5-16F2983464E7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:sbg3300-nb00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4658399-1699-4426-ACFF-BDEE20BF1A54",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:sbg3500-n000_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BC4B86C-ED2F-406D-BCAA-B970BAD248D8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:sbg3500-n000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1E3BCE8-F36A-4FFE-933B-6BADF24506AF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:gs1900-8_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "316DC84A-7B3C-4396-A0BD-EAA3B5DA0476",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51D33F50-B5A4-4AEF-972C-7FF089C21D52",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:gs1900-24_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91426AF7-9D95-486F-9155-B4F9636F3CEB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4F55299-70D5-4CE1-A1EC-D79B469B94F7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:c1000z_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC9FB893-7F6A-48AD-B3C8-FC85A6A80CEB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:c1000z:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "812C4AFE-364D-4D18-A79F-6CD98EDDC3B6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:q1000_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8090C667-2E54-462F-BD5A-DF7854252A0B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:q1000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F2A44DC-DFB9-46A8-BD9B-B207BBFFD764",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:fr1000z_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23ADD49B-C666-4E28-813A-55DB6BEF4EB4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:fr1000z:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA597CC9-92FE-47AC-86F9-FA5B2E032961",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:zyxel:p8702n_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "59D9B829-FD92-46D2-840F-A99E5FF0DC4C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:zyxel:p8702n:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C906711-7699-4A0A-BA3C-7A007EDF301E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys.",
      },
      {
         lang: "es",
         value: "Los puntos de acceso ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, NWA1123-NI; los CPE DSL P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, VSG1435-B101; las puertas de enlace para pequeñas empresas PMG5318-B20A GPON, SBG3300-N000, SBG3300-NB00, SBG3500-N000; los switches GS1900-8 y GS1900-24 y los modelos de módem C1000Z, Q1000, FR1000Z, P8702N emplean certificados X.509 y claves host de SSH que no son únicos.",
      },
   ],
   id: "CVE-2015-7256",
   lastModified: "2024-11-21T02:36:26.873",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-09-28T01:29:00.670",
   references: [
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/566724",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/566724",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.zyxel.com/support/announcement_SSH_private_key_and_certificate_vulnerability.shtml",
      },
   ],
   sourceIdentifier: "cret@cert.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-310",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}