CVE-2013-0706 (GCVE-0-2013-0706)
Vulnerability from cvelistv5 – Published: 2013-02-22 00:00 – Updated: 2024-09-16 17:22
VLAI?
Summary
NEC Universal RAID Utility 1.40 Rev 680 and earlier, 2.31 Rev 1492 and earlier, and 2.5 Rev 2244 and earlier does not provide access control, which allows remote attackers to perform arbitrary RAID disk operations via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:33:05.667Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2013-000012",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000012"
},
{
"name": "JVN#75585394",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN75585394/index.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://jpn.nec.com/security-info/secinfo/nv13-004.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "NEC Universal RAID Utility 1.40 Rev 680 and earlier, 2.31 Rev 1492 and earlier, and 2.5 Rev 2244 and earlier does not provide access control, which allows remote attackers to perform arbitrary RAID disk operations via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-02-22T00:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2013-000012",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000012"
},
{
"name": "JVN#75585394",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN75585394/index.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://jpn.nec.com/security-info/secinfo/nv13-004.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-0706",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NEC Universal RAID Utility 1.40 Rev 680 and earlier, 2.31 Rev 1492 and earlier, and 2.5 Rev 2244 and earlier does not provide access control, which allows remote attackers to perform arbitrary RAID disk operations via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2013-000012",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000012"
},
{
"name": "JVN#75585394",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN75585394/index.html"
},
{
"name": "http://jpn.nec.com/security-info/secinfo/nv13-004.html",
"refsource": "CONFIRM",
"url": "http://jpn.nec.com/security-info/secinfo/nv13-004.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-0706",
"datePublished": "2013-02-22T00:00:00Z",
"dateReserved": "2012-12-28T00:00:00Z",
"dateUpdated": "2024-09-16T17:22:53.032Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nec:universal_raid_utility:*:rev_680:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.40\", \"matchCriteriaId\": \"FC6E2FA2-7204-40C6-B172-1430C97AF1C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nec:universal_raid_utility:*:rev_2244:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.5\", \"matchCriteriaId\": \"98FBEAF2-E978-479E-8EB4-F724BC34238F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nec:universal_raid_utility:*:rev_1492:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.31\", \"matchCriteriaId\": \"CCE36B33-7326-49D7-871E-A6D94E642154\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nec:universal_raid_utility:1.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5B1B18A-6C35-4129-B6B4-43421D4E62F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nec:universal_raid_utility:2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72DBF2CA-9A7B-42C1-B25F-66EE299CAAD4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nec:universal_raid_utility:2.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"847378C0-75B0-46BA-BD24-4232A9DF9B90\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"NEC Universal RAID Utility 1.40 Rev 680 and earlier, 2.31 Rev 1492 and earlier, and 2.5 Rev 2244 and earlier does not provide access control, which allows remote attackers to perform arbitrary RAID disk operations via unspecified vectors.\"}, {\"lang\": \"es\", \"value\": \"NEC Universal RAID Utility v1.40 Rev 680 y anteriores, v2.31 Rev 1492 y anteriores, y v2.5 Rev 2244 y anteriores no proporciona control de acceso, lo que permite que atacantes remotos lleven a cabo operaciones arbitrarias de disco RAID mediante vectores desconocidos\"}]",
"id": "CVE-2013-0706",
"lastModified": "2024-11-21T01:48:02.240",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:C\", \"baseScore\": 9.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 8.5, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2013-02-22T00:55:01.333",
"references": "[{\"url\": \"http://jpn.nec.com/security-info/secinfo/nv13-004.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://jvn.jp/en/jp/JVN75585394/index.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://jvndb.jvn.jp/jvndb/JVNDB-2013-000012\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://jpn.nec.com/security-info/secinfo/nv13-004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://jvn.jp/en/jp/JVN75585394/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://jvndb.jvn.jp/jvndb/JVNDB-2013-000012\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2013-0706\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2013-02-22T00:55:01.333\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"NEC Universal RAID Utility 1.40 Rev 680 and earlier, 2.31 Rev 1492 and earlier, and 2.5 Rev 2244 and earlier does not provide access control, which allows remote attackers to perform arbitrary RAID disk operations via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"NEC Universal RAID Utility v1.40 Rev 680 y anteriores, v2.31 Rev 1492 y anteriores, y v2.5 Rev 2244 y anteriores no proporciona control de acceso, lo que permite que atacantes remotos lleven a cabo operaciones arbitrarias de disco RAID mediante vectores desconocidos\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":8.5,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nec:universal_raid_utility:*:rev_680:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.40\",\"matchCriteriaId\":\"FC6E2FA2-7204-40C6-B172-1430C97AF1C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nec:universal_raid_utility:*:rev_2244:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.5\",\"matchCriteriaId\":\"98FBEAF2-E978-479E-8EB4-F724BC34238F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nec:universal_raid_utility:*:rev_1492:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.31\",\"matchCriteriaId\":\"CCE36B33-7326-49D7-871E-A6D94E642154\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nec:universal_raid_utility:1.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5B1B18A-6C35-4129-B6B4-43421D4E62F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nec:universal_raid_utility:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72DBF2CA-9A7B-42C1-B25F-66EE299CAAD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nec:universal_raid_utility:2.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"847378C0-75B0-46BA-BD24-4232A9DF9B90\"}]}]}],\"references\":[{\"url\":\"http://jpn.nec.com/security-info/secinfo/nv13-004.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvn.jp/en/jp/JVN75585394/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2013-000012\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jpn.nec.com/security-info/secinfo/nv13-004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvn.jp/en/jp/JVN75585394/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2013-000012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…