Search criteria
2 vulnerabilities found for vsn300 by abb
VAR-201708-1396
Vulnerability from variot - Updated: 2023-12-18 12:29A Permissions, Privileges, and Access Controls issue was discovered in ABB VSN300 WiFi Logger Card versions 1.8.15 and prior, and VSN300 WiFi Logger Card for React versions 2.1.3 and prior. The web application does not properly restrict privileges of the Guest account. A malicious user may be able to gain access to configuration information that should be restricted. An authentication-bypass vulnerability 2. A security-bypass vulnerability An attacker can exploit these issues to bypass certain security restrictions, perform certain unauthorized actions and bypass the authentication mechanism
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201708-1396",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vsn300 for react",
"scope": "eq",
"trust": 1.6,
"vendor": "abb",
"version": "2.1.3"
},
{
"model": "vsn300",
"scope": "lte",
"trust": 1.0,
"vendor": "abb",
"version": "1.8.15"
},
{
"model": "vsn300 wifi logger card for react",
"scope": "lte",
"trust": 0.8,
"vendor": "abb",
"version": "2.1.3"
},
{
"model": "vsn300 wifi logger card",
"scope": "lte",
"trust": 0.8,
"vendor": "abb",
"version": "1.8.15"
},
{
"model": "vsn300 wifi logger card",
"scope": "lte",
"trust": 0.6,
"vendor": "abb",
"version": "\u003c=1.8.15"
},
{
"model": "vsn300 wifi logger card for react",
"scope": "lte",
"trust": 0.6,
"vendor": "abb",
"version": "\u003c=2.1.3"
},
{
"model": "vsn300",
"scope": "eq",
"trust": 0.6,
"vendor": "abb",
"version": "1.8.15"
},
{
"model": "vsn300 wifi logger card for react",
"scope": "eq",
"trust": 0.3,
"vendor": "abb",
"version": "2.1.3"
},
{
"model": "vsn300 wifi logger card for react",
"scope": "eq",
"trust": 0.3,
"vendor": "abb",
"version": "0"
},
{
"model": "vsn300 wifi logger card",
"scope": "eq",
"trust": 0.3,
"vendor": "abb",
"version": "1.8.15"
},
{
"model": "vsn300 wifi logger card",
"scope": "eq",
"trust": 0.3,
"vendor": "abb",
"version": "0"
},
{
"model": "vsn300 wifi logger card for react",
"scope": "ne",
"trust": 0.3,
"vendor": "abb",
"version": "2.2.5"
},
{
"model": "vsn300 wifi logger card",
"scope": "ne",
"trust": 0.3,
"vendor": "abb",
"version": "1.9"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "vsn300",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "vsn300 for react",
"version": "2.1.3"
}
],
"sources": [
{
"db": "IVD",
"id": "4540790e-c339-4031-b7a6-176c7e6ceff8"
},
{
"db": "CNVD",
"id": "CNVD-2017-17218"
},
{
"db": "BID",
"id": "99558"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006980"
},
{
"db": "NVD",
"id": "CVE-2017-7916"
},
{
"db": "CNNVD",
"id": "CNNVD-201707-602"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:abb:vsn300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.8.15",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:abb:vsn300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:abb:vsn300_for_react_firmware:2.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:abb:vsn300_for_react:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-7916"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Maxim Rupp.",
"sources": [
{
"db": "BID",
"id": "99558"
}
],
"trust": 0.3
},
"cve": "CVE-2017-7916",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2017-7916",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-17218",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "4540790e-c339-4031-b7a6-176c7e6ceff8",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-116119",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 6.5,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2017-7916",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-7916",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2017-17218",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201707-602",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "4540790e-c339-4031-b7a6-176c7e6ceff8",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-116119",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "4540790e-c339-4031-b7a6-176c7e6ceff8"
},
{
"db": "CNVD",
"id": "CNVD-2017-17218"
},
{
"db": "VULHUB",
"id": "VHN-116119"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006980"
},
{
"db": "NVD",
"id": "CVE-2017-7916"
},
{
"db": "CNNVD",
"id": "CNNVD-201707-602"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A Permissions, Privileges, and Access Controls issue was discovered in ABB VSN300 WiFi Logger Card versions 1.8.15 and prior, and VSN300 WiFi Logger Card for React versions 2.1.3 and prior. The web application does not properly restrict privileges of the Guest account. A malicious user may be able to gain access to configuration information that should be restricted. An authentication-bypass vulnerability\n2. A security-bypass vulnerability\nAn attacker can exploit these issues to bypass certain security restrictions, perform certain unauthorized actions and bypass the authentication mechanism",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-7916"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006980"
},
{
"db": "CNVD",
"id": "CNVD-2017-17218"
},
{
"db": "BID",
"id": "99558"
},
{
"db": "IVD",
"id": "4540790e-c339-4031-b7a6-176c7e6ceff8"
},
{
"db": "VULHUB",
"id": "VHN-116119"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-7916",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-17-192-03",
"trust": 3.4
},
{
"db": "BID",
"id": "99558",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201707-602",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-17218",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006980",
"trust": 0.8
},
{
"db": "IVD",
"id": "4540790E-C339-4031-B7A6-176C7E6CEFF8",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-116119",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "4540790e-c339-4031-b7a6-176c7e6ceff8"
},
{
"db": "CNVD",
"id": "CNVD-2017-17218"
},
{
"db": "VULHUB",
"id": "VHN-116119"
},
{
"db": "BID",
"id": "99558"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006980"
},
{
"db": "NVD",
"id": "CVE-2017-7916"
},
{
"db": "CNNVD",
"id": "CNNVD-201707-602"
}
]
},
"id": "VAR-201708-1396",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "4540790e-c339-4031-b7a6-176c7e6ceff8"
},
{
"db": "CNVD",
"id": "CNVD-2017-17218"
},
{
"db": "VULHUB",
"id": "VHN-116119"
}
],
"trust": 1.6388889
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "4540790e-c339-4031-b7a6-176c7e6ceff8"
},
{
"db": "CNVD",
"id": "CNVD-2017-17218"
}
]
},
"last_update_date": "2023-12-18T12:29:32.040000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "ABBVU-EPPE-ICS-VU-196220",
"trust": 0.8,
"url": "http://search.abb.com/library/download.aspx?documentid=9akk107045a1977\u0026languagecode=en\u0026documentpartid=\u0026action=launch"
},
{
"title": "Patch for ABB VSN300 WiFi Logger Card and VSN300 WiFi Logger Card for React Access Control Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/99152"
},
{
"title": "ABB VSN300 WiFi Logger Card and VSN300 WiFi Logger Card for React Fixes for permission permissions and access control vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=71716"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-17218"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006980"
},
{
"db": "CNNVD",
"id": "CNNVD-201707-602"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-269",
"trust": 1.1
},
{
"problemtype": "CWE-264",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-116119"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006980"
},
{
"db": "NVD",
"id": "CVE-2017-7916"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-192-03"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/99558"
},
{
"trust": 1.6,
"url": "http://search.abb.com/library/download.aspx?documentid=9akk107045a1977\u0026languagecode=en\u0026documentpartid=\u0026action=launch"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7916"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7916"
},
{
"trust": 0.3,
"url": "http://www.abb.com/"
},
{
"trust": 0.1,
"url": "http://search.abb.com/library/download.aspx?documentid=9akk107045a1977\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-17218"
},
{
"db": "VULHUB",
"id": "VHN-116119"
},
{
"db": "BID",
"id": "99558"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006980"
},
{
"db": "NVD",
"id": "CVE-2017-7916"
},
{
"db": "CNNVD",
"id": "CNNVD-201707-602"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "4540790e-c339-4031-b7a6-176c7e6ceff8"
},
{
"db": "CNVD",
"id": "CNVD-2017-17218"
},
{
"db": "VULHUB",
"id": "VHN-116119"
},
{
"db": "BID",
"id": "99558"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006980"
},
{
"db": "NVD",
"id": "CVE-2017-7916"
},
{
"db": "CNNVD",
"id": "CNNVD-201707-602"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-28T00:00:00",
"db": "IVD",
"id": "4540790e-c339-4031-b7a6-176c7e6ceff8"
},
{
"date": "2017-07-28T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-17218"
},
{
"date": "2017-08-07T00:00:00",
"db": "VULHUB",
"id": "VHN-116119"
},
{
"date": "2017-07-11T00:00:00",
"db": "BID",
"id": "99558"
},
{
"date": "2017-09-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-006980"
},
{
"date": "2017-08-07T08:29:00.197000",
"db": "NVD",
"id": "CVE-2017-7916"
},
{
"date": "2017-07-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201707-602"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-28T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-17218"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-116119"
},
{
"date": "2017-07-11T00:00:00",
"db": "BID",
"id": "99558"
},
{
"date": "2017-09-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-006980"
},
{
"date": "2019-10-09T23:29:57.593000",
"db": "NVD",
"id": "CVE-2017-7916"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201707-602"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201707-602"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ABB VSN300 WiFi Logger Card and VSN300 WiFi Logger Card for React Vulnerabilities related to authorization, permissions, and access control",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-006980"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control issues",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201707-602"
}
],
"trust": 0.6
}
}
VAR-201708-1397
Vulnerability from variot - Updated: 2023-12-18 12:29An Improper Authentication issue was discovered in ABB VSN300 WiFi Logger Card versions 1.8.15 and prior, and VSN300 WiFi Logger Card for React versions 2.1.3 and prior. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access internal information about status and connected devices without authenticating. ABBVSN300WiFiLoggerCard and VSN300WiFiLoggerCardforReact are wireless data recording card products of Swiss AseaBrownBoveri (ABB). There are security vulnerabilities in ABBVSN300WiFiLoggerCard1.8.15 and earlier and VSN300WiFiLoggerCardforReact2.1.3 and earlier. An authentication-bypass vulnerability 2. A security-bypass vulnerability An attacker can exploit these issues to bypass certain security restrictions, perform certain unauthorized actions and bypass the authentication mechanism
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201708-1397",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vsn300 for react",
"scope": "eq",
"trust": 1.6,
"vendor": "abb",
"version": "2.1.3"
},
{
"model": "vsn300",
"scope": "lte",
"trust": 1.0,
"vendor": "abb",
"version": "1.8.15"
},
{
"model": "vsn300 wifi logger card for react",
"scope": "lte",
"trust": 0.8,
"vendor": "abb",
"version": "2.1.3"
},
{
"model": "vsn300 wifi logger card",
"scope": "lte",
"trust": 0.8,
"vendor": "abb",
"version": "1.8.15"
},
{
"model": "vsn300 wifi logger card",
"scope": "lte",
"trust": 0.6,
"vendor": "abb",
"version": "\u003c=1.8.15"
},
{
"model": "vsn300 wifi logger card for react",
"scope": "lte",
"trust": 0.6,
"vendor": "abb",
"version": "\u003c=2.1.3"
},
{
"model": "vsn300",
"scope": "eq",
"trust": 0.6,
"vendor": "abb",
"version": "1.8.15"
},
{
"model": "vsn300 wifi logger card for react",
"scope": "eq",
"trust": 0.3,
"vendor": "abb",
"version": "2.1.3"
},
{
"model": "vsn300 wifi logger card for react",
"scope": "eq",
"trust": 0.3,
"vendor": "abb",
"version": "0"
},
{
"model": "vsn300 wifi logger card",
"scope": "eq",
"trust": 0.3,
"vendor": "abb",
"version": "1.8.15"
},
{
"model": "vsn300 wifi logger card",
"scope": "eq",
"trust": 0.3,
"vendor": "abb",
"version": "0"
},
{
"model": "vsn300 wifi logger card for react",
"scope": "ne",
"trust": 0.3,
"vendor": "abb",
"version": "2.2.5"
},
{
"model": "vsn300 wifi logger card",
"scope": "ne",
"trust": 0.3,
"vendor": "abb",
"version": "1.9"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "vsn300",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "vsn300 for react",
"version": "2.1.3"
}
],
"sources": [
{
"db": "IVD",
"id": "3c61fa5e-9b12-48d6-aa53-1bfba0c9ec05"
},
{
"db": "CNVD",
"id": "CNVD-2017-22992"
},
{
"db": "BID",
"id": "99558"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006981"
},
{
"db": "NVD",
"id": "CVE-2017-7920"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-1050"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:abb:vsn300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.8.15",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:abb:vsn300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:abb:vsn300_for_react_firmware:2.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:abb:vsn300_for_react:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-7920"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Maxim Rupp.",
"sources": [
{
"db": "BID",
"id": "99558"
}
],
"trust": 0.3
},
"cve": "CVE-2017-7920",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2017-7920",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-22992",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "3c61fa5e-9b12-48d6-aa53-1bfba0c9ec05",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-116123",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2017-7920",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-7920",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2017-22992",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201704-1050",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "3c61fa5e-9b12-48d6-aa53-1bfba0c9ec05",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-116123",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "3c61fa5e-9b12-48d6-aa53-1bfba0c9ec05"
},
{
"db": "CNVD",
"id": "CNVD-2017-22992"
},
{
"db": "VULHUB",
"id": "VHN-116123"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006981"
},
{
"db": "NVD",
"id": "CVE-2017-7920"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-1050"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An Improper Authentication issue was discovered in ABB VSN300 WiFi Logger Card versions 1.8.15 and prior, and VSN300 WiFi Logger Card for React versions 2.1.3 and prior. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access internal information about status and connected devices without authenticating. ABBVSN300WiFiLoggerCard and VSN300WiFiLoggerCardforReact are wireless data recording card products of Swiss AseaBrownBoveri (ABB). There are security vulnerabilities in ABBVSN300WiFiLoggerCard1.8.15 and earlier and VSN300WiFiLoggerCardforReact2.1.3 and earlier. An authentication-bypass vulnerability\n2. A security-bypass vulnerability\nAn attacker can exploit these issues to bypass certain security restrictions, perform certain unauthorized actions and bypass the authentication mechanism",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-7920"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006981"
},
{
"db": "CNVD",
"id": "CNVD-2017-22992"
},
{
"db": "BID",
"id": "99558"
},
{
"db": "IVD",
"id": "3c61fa5e-9b12-48d6-aa53-1bfba0c9ec05"
},
{
"db": "VULHUB",
"id": "VHN-116123"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-7920",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-17-192-03",
"trust": 3.4
},
{
"db": "BID",
"id": "99558",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201704-1050",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-22992",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006981",
"trust": 0.8
},
{
"db": "IVD",
"id": "3C61FA5E-9B12-48D6-AA53-1BFBA0C9EC05",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-116123",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "3c61fa5e-9b12-48d6-aa53-1bfba0c9ec05"
},
{
"db": "CNVD",
"id": "CNVD-2017-22992"
},
{
"db": "VULHUB",
"id": "VHN-116123"
},
{
"db": "BID",
"id": "99558"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006981"
},
{
"db": "NVD",
"id": "CVE-2017-7920"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-1050"
}
]
},
"id": "VAR-201708-1397",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "3c61fa5e-9b12-48d6-aa53-1bfba0c9ec05"
},
{
"db": "CNVD",
"id": "CNVD-2017-22992"
},
{
"db": "VULHUB",
"id": "VHN-116123"
}
],
"trust": 1.6388889
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "3c61fa5e-9b12-48d6-aa53-1bfba0c9ec05"
},
{
"db": "CNVD",
"id": "CNVD-2017-22992"
}
]
},
"last_update_date": "2023-12-18T12:29:32.001000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "ABBVU-EPPE-ICS-VU-196220",
"trust": 0.8,
"url": "http://search.abb.com/library/download.aspx?documentid=9akk107045a1977\u0026languagecode=en\u0026documentpartid=\u0026action=launch"
},
{
"title": "ABB VSN300 WiFi Logger Card and VSN300 WiFi Logger Card for React Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=99756"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-006981"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-1050"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-116123"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006981"
},
{
"db": "NVD",
"id": "CVE-2017-7920"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-192-03"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/99558"
},
{
"trust": 1.6,
"url": "http://search.abb.com/library/download.aspx?documentid=9akk107045a1977\u0026languagecode=en\u0026documentpartid=\u0026action=launch"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7920"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7920"
},
{
"trust": 0.3,
"url": "http://www.abb.com/"
},
{
"trust": 0.1,
"url": "http://search.abb.com/library/download.aspx?documentid=9akk107045a1977\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-22992"
},
{
"db": "VULHUB",
"id": "VHN-116123"
},
{
"db": "BID",
"id": "99558"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006981"
},
{
"db": "NVD",
"id": "CVE-2017-7920"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-1050"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "3c61fa5e-9b12-48d6-aa53-1bfba0c9ec05"
},
{
"db": "CNVD",
"id": "CNVD-2017-22992"
},
{
"db": "VULHUB",
"id": "VHN-116123"
},
{
"db": "BID",
"id": "99558"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-006981"
},
{
"db": "NVD",
"id": "CVE-2017-7920"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-1050"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-25T00:00:00",
"db": "IVD",
"id": "3c61fa5e-9b12-48d6-aa53-1bfba0c9ec05"
},
{
"date": "2017-08-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-22992"
},
{
"date": "2017-08-07T00:00:00",
"db": "VULHUB",
"id": "VHN-116123"
},
{
"date": "2017-07-11T00:00:00",
"db": "BID",
"id": "99558"
},
{
"date": "2017-09-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-006981"
},
{
"date": "2017-08-07T08:29:00.243000",
"db": "NVD",
"id": "CVE-2017-7920"
},
{
"date": "2017-04-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-1050"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-22992"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-116123"
},
{
"date": "2017-07-11T00:00:00",
"db": "BID",
"id": "99558"
},
{
"date": "2017-09-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-006981"
},
{
"date": "2019-10-09T23:29:58.187000",
"db": "NVD",
"id": "CVE-2017-7920"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-1050"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-1050"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ABB VSN300 WiFi Logger Card and VSN300 WiFi Logger Card for React Authentication vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-006981"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-1050"
}
],
"trust": 0.6
}
}