Search criteria

3 vulnerabilities found for ts3310_tape_library_firmware by ibm

FKIE_CVE-2012-1844

Vulnerability from fkie_nvd - Published: 2012-03-22 10:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "285AA3DB-D702-4F55-A6B6-99F6BC12B1DF",
              "versionEndIncluding": "i7.0.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE92B3E-2606-4309-9462-E0529A967AC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8B4BB2-1E77-4980-BFD2-3030703C27C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AF16C0F-1D0B-45DB-BDBE-3400DEC20B9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ADF92E7-1E86-432F-990A-D2B032329C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i5:*:*:*:*:*:*:*",
              "matchCriteriaId": "85452B6E-BD5E-436B-BC5C-F91F68FD19A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FB27B5B-0E14-4866-88FF-83BA652E6CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i6:*:*:*:*:*:*:*",
              "matchCriteriaId": "94298513-64B2-40F5-AA01-27F5620217B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FB8F97-28EE-42D3-B793-6E7F36B15234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i7:*:*:*:*:*:*:*",
              "matchCriteriaId": "466D3BD8-0B2A-4DE6-BD23-118CF7AD3413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D2BEA7-216D-4202-8BE2-430CCCAD106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:sp4:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CA3AC1-4AC5-48BA-B749-CF29104093DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:sp4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAE34EB9-66D2-498D-A02D-7F5EAD923707",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:5u:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6AA8B64-A78C-4B51-B29B-21CF2AEF9484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:14u:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6FFB7DA-15EB-4053-9440-A30F8E434F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:23u:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39DFB77-7945-4CA0-9B66-AF3908FE515D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dell:powervault_ml6000_firmware:585g.gs003:*:*:*:*:*:*:*",
              "matchCriteriaId": "B993C619-EC72-47F2-AAE0-8EED9AAC7BF6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6000:32u:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C9AB1-37AE-43EE-BAAC-39277789B734",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6000:41u:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A96FD1-2005-41BE-ACE5-33AC136F7206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6010:5u:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB0FF827-E40B-4DC0-9CAC-82922B827F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6020:14u:*:*:*:*:*:*:*",
              "matchCriteriaId": "789D5925-AF4A-4CBA-B51F-FF6F1ADE5C6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6030:23u:*:*:*:*:*:*:*",
              "matchCriteriaId": "B93C93C2-3FC1-4E5A-AC82-22EAFAA5B4CE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:ts3310_tape_library_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D9D062-754E-49D8-94D9-81E15511A5D2",
              "versionEndIncluding": "605g.g002",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ibm:ts3310_tape_library:3573:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AC7FE3B-2E91-4A09-9C41-7F0CB198B0E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:ts3310_tape_library:3576:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE63555B-ADBE-45DA-9D98-22445A11FCA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors."
    },
    {
      "lang": "es",
      "value": "La librer\u00eda de cintas Quantum Scalar i500 con el firmware antes de i7.0.3 (604G.GS00100), que tambi\u00e9n se distribuye como la librer\u00eda de cintas Dell ML6000 con el firmware antes de A20-00 (590G.GS00100) y como la librer\u00eda de cintas IBM TS3310 con el firmware antes de R6C (606G. GS001), utiliza contrase\u00f1as por defecto para las cuentas de usuario no especificados, lo cual facilita a los atacantes remotos a la hora de obtener acceso a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2012-1844",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-22T10:17:11.127",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80372"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/913483"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/913483"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.",
      "lastModified": "2012-06-13T00:00:00",
      "organization": "Quantum Corporation"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2012-1844 (GCVE-0-2012-1844)

Vulnerability from cvelistv5 – Published: 2012-03-22 10:00 – Updated: 2024-08-06 19:08
VLAI?
Summary
The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:08:38.646Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "scalar-default-account(74322)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
          },
          {
            "name": "VU#913483",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/913483"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
          },
          {
            "name": "80372",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80372"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-09T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "scalar-default-account(74322)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
        },
        {
          "name": "VU#913483",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/913483"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
        },
        {
          "name": "80372",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80372"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1844",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "scalar-default-account(74322)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
            },
            {
              "name": "VU#913483",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/913483"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
            },
            {
              "name": "80372",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80372"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1844",
    "datePublished": "2012-03-22T10:00:00",
    "dateReserved": "2012-03-21T00:00:00",
    "dateUpdated": "2024-08-06T19:08:38.646Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1844 (GCVE-0-2012-1844)

Vulnerability from nvd – Published: 2012-03-22 10:00 – Updated: 2024-08-06 19:08
VLAI?
Summary
The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:08:38.646Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "scalar-default-account(74322)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
          },
          {
            "name": "VU#913483",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/913483"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
          },
          {
            "name": "80372",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80372"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-09T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "scalar-default-account(74322)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
        },
        {
          "name": "VU#913483",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/913483"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
        },
        {
          "name": "80372",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80372"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1844",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "scalar-default-account(74322)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
            },
            {
              "name": "VU#913483",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/913483"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
            },
            {
              "name": "80372",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80372"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1844",
    "datePublished": "2012-03-22T10:00:00",
    "dateReserved": "2012-03-21T00:00:00",
    "dateUpdated": "2024-08-06T19:08:38.646Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}