CVE-2013-2310
Vulnerability from cvelistv5
Published
2013-06-17 01:00
Modified
2024-09-16 17:32
Severity ?
Summary
SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network.
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:36:45.790Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN85371480/397327/index.html"
          },
          {
            "name": "JVN#85371480",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN85371480/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN85371480/995417/index.html"
          },
          {
            "name": "JVNDB-2013-000039",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000039"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN85371480/995319/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-06-17T01:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jvn.jp/en/jp/JVN85371480/397327/index.html"
        },
        {
          "name": "JVN#85371480",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN85371480/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jvn.jp/en/jp/JVN85371480/995417/index.html"
        },
        {
          "name": "JVNDB-2013-000039",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000039"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jvn.jp/en/jp/JVN85371480/995319/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-2310",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://jvn.jp/en/jp/JVN85371480/397327/index.html",
              "refsource": "CONFIRM",
              "url": "http://jvn.jp/en/jp/JVN85371480/397327/index.html"
            },
            {
              "name": "JVN#85371480",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN85371480/index.html"
            },
            {
              "name": "http://jvn.jp/en/jp/JVN85371480/995417/index.html",
              "refsource": "CONFIRM",
              "url": "http://jvn.jp/en/jp/JVN85371480/995417/index.html"
            },
            {
              "name": "JVNDB-2013-000039",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000039"
            },
            {
              "name": "http://jvn.jp/en/jp/JVN85371480/995319/index.html",
              "refsource": "CONFIRM",
              "url": "http://jvn.jp/en/jp/JVN85371480/995319/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-2310",
    "datePublished": "2013-06-17T01:00:00Z",
    "dateReserved": "2013-03-04T00:00:00Z",
    "dateUpdated": "2024-09-16T17:32:46.117Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-2310\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2013-06-17T03:29:45.050\",\"lastModified\":\"2013-06-17T04:00:00.000\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network.\"},{\"lang\":\"es\",\"value\":\"SoftBank Wi-Fi Spot Configuration Software, usado en tel\u00e9fonos SoftBank SHARP 3G, tel\u00e9fonos  SoftBank Panasonic 3G , tel\u00e9fonos  SoftBank NEC 3G, tel\u00e9fonos  SoftBank Samsung 3G, routers SoftBank mobile Wi-Fi , SoftBank Android smartphones con la aplicaci\u00f3n Wi-Fi anterior a 1.7.1, SoftBank Windows Mobile smartphones con la aplicaci\u00f3n WISPrClient anterior a 1.3.1, SoftBank Disney Mobile Android smartphones con la aplicaci\u00f3n  Wi-Fi anteiror a 1.7.1, y WILLCOM Android smartphones con la aplicaci\u00f3n Wi-Fi anterior a 1.7.1, no se conectan adecuadamente a los puntos de acceso, lo que permite a atacantes remotos obtener informaci\u00f3n sensible aprovechando el acceso a las redes 802.11.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:P/I:N/A:N\",\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":3.3},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.5,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:softbank:wi-fi_spot_configuration_software:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8424BE0-F1F7-4336-BC1E-058055E9CC0D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:mobile_wi-fi_router:101sb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9153F3B7-38DC-47E3-87B7-8C35F546EDC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:mobile_wi-fi_router:102hw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CD3301E-D5E9-430B-9602-05427B7FF730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:mobile_wi-fi_router:102z:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD37D025-D5E9-4440-9CAC-434E4FEC463D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:nec_3g_handset:001n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF09BC52-4D7E-4C64-BABB-87E61AB75D42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:nec_3g_handset:931n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11170487-BE0C-44F4-8E3B-F35188E3A297\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:nec_3g_handset:940n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4265CA6E-01A3-49EA-B87C-AA509AABA46A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:panasonic_3g_handset:001p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39F73551-9FD8-4536-930E-98F817C13AE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:panasonic_3g_handset:941p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D25FD7D-DE60-4E52-A011-FADAA966C7D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:panasonic_3g_handset:942p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0E31794-8041-4654-8BB5-1EA324AA2C6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:samsung_3g_handset:941sc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8736D68E-631A-4FBF-B24E-294D3DD9171F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:001n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D743D290-74D6-47C5-B768-F69C1DF73290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:001p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"270E6CF6-D931-4B64-9ADA-BF63458B38AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:002sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B14F72B4-0E55-46F9-8D51-95F0625700EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:004sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D5C4BC-4B54-4EB6-BD5C-E135D9B23981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:004shp3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC644ACE-434E-4911-8FEC-54D1A3EF5162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:931n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9561E43E-D7EF-43F6-95E3-AEDDEBF9F1B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:940n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9EF4D8D-E3FD-44FB-98B7-3203BA4184E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:940sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA85E94-A808-4014-A52D-9569F7382074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:941p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EFC72E0-E0C0-485D-94B0-0156DB617756\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:941sc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B7DA3CC-E95F-45B7-A6B4-D615FD5A5724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:941sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4A91327-41D7-4E42-AAB8-407C1BAB5BFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:942p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39031BDF-0B11-4BBA-A650-B7EBC2B210AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:943sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A116933E-B64E-411F-A15E-E0F712A0C274\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:944sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4488FC16-124F-422C-B93C-35E04D1CCC14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:945sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA687EA-7FA6-4DA2-890B-81FECF1668B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:sharp_3g_handset:945shg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4049FD7E-3472-49D6-ADB3-00DDB6B8A46D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:softbank:wi-fi_application:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.7.0\",\"matchCriteriaId\":\"728BE73D-A7B7-454C-9A2B-D4E47871CF3C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:001dl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860CAE12-12A4-4D70-9613-3F9E1C397CF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:001ht:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E585AA33-6BD4-4148-ACC3-AC6C0D0BEDA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:003p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A3440B3-C997-468A-97D4-48C4CFE15B6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:003sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CFC956B-3B5F-4FD2-B374-A2E528EC5DB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:003z:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"858F4F6B-9F7D-4469-87BB-F79768060A83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:005sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C138AE9-1781-4EBC-9704-BE127B41E912\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:006sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACA0678D-DB8D-4A0E-B83F-93B5153F6779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:007hw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF3C3B94-130F-40B5-AD8A-12FA8FBD1C65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:007sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A944DB22-DAA7-4C6C-A8CE-3C07C681B819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:007sh:j:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6CBD600-3DB7-4817-BD80-15BA91DDC32E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:007sh:kt:*:*:*:*:*:*\",\"matchCriteriaId\":\"17410E04-45AF-4CF3-8BA3-D1B06276BF5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:008z:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45346D13-FB49-4335-B3A4-6344BF0A2100\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:009sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A4BE02-7F8A-4D9B-8AD6-6100DD3EBA04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:009sh:y:*:*:*:*:*:*\",\"matchCriteriaId\":\"09D75B0F-C249-4E6B-9BB2-33C5AC27E9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:009z:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E796C0BE-68BE-4527-918C-0E566F48A654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:101dl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5581ABB-788E-4535-909B-3E2CB0BDD56E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:101f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A22707E7-A667-4998-BC88-D31F817EDCB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:101k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5A27BFB-3E8C-4355-AD40-B0B77ED0D205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:101n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9BA10CB-0287-4DAF-8BE5-C1122228E295\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:101p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72EBB6D5-A9A6-4680-8207-290C0B077FD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:101sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1122DD83-4AAD-46A3-9CA6-502CE1D5DA36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:102p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F561E55A-9D2A-4015-9480-14B9C06000E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:102sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A30E1217-413E-46F1-8BC1-71A572E95D6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:102sh:ii:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AF47817-2CF5-4818-A692-AD674E719FB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:103sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9786BCDA-478A-4481-84E4-F702E9CD3F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:104sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"212598FF-B9CD-4DD1-8BAD-4069F1222F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:106sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18F1D45-E478-489F-BEA9-8E5895900004\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:107sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4FECAAD-4F1D-4D3E-A54B-FA86FFAA9F08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:200sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEC2FAFC-ABB6-4BCF-9ECA-BAF6FD616D01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:201hw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E1DA60-36C4-40C2-B2FA-E686BE0EFC85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:201k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98977425-4075-4EED-8532-8AACEF38D913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:201m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CBEC7C8-66AC-48E5-B12A-AC1E59F1F10C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:x06ht:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D69C5D-C585-40F6-A48D-ABA60FC54772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:android_smartphone:x06ht:ii:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD5E6A6D-692C-4E16-8F79-34998365D9DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:softbank:wisprclient:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.3.0\",\"matchCriteriaId\":\"B858D183-AC0D-4CC8-9F00-A73C5E3393C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:windows_mobile_smartphone:x01sc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00808F4B-F195-4EA3-8CCC-A15C0B463A78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:windows_mobile_smartphone:x02t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D76533-11B7-4635-91B0-0147B02195DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:windows_mobile_smartphone:x04ht:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D218D52-D34D-4836-B553-347FC1BC1863\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:windows_mobile_smartphone:x05ht:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3FF21BD-89A7-409F-873F-62FCDA956F92\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:softbank:wi-fi_application:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.7.0\",\"matchCriteriaId\":\"728BE73D-A7B7-454C-9A2B-D4E47871CF3C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:disney_mobile_android_smartphone:dm009sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C205636-3731-4393-8BBB-CD77B3381898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:disney_mobile_android_smartphone:dm010sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B6EFE0B-7942-4F81-A10B-EA3AE841AF68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:disney_mobile_android_smartphone:dm011sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E174AF85-578F-48FD-B211-36A7CE68E1FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:disney_mobile_android_smartphone:dm012sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D9EA535-89EC-449A-AC80-89A0C3831677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:softbank:disney_mobile_android_smartphone:dm013sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E2D8F65-FFA3-4EF5-A2B1-B46371015320\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:willcom-inc:wi-fi_application:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.7.0\",\"matchCriteriaId\":\"DCEA9809-AC80-4213-AA36-4040DD9DA2BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:willcom-inc:android_smartphone:wx04k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCCA03A2-B3FA-4EB0-B459-484022A6F0CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:willcom-inc:android_smartphone:wx06k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F24C6476-61FE-4A02-8783-C23273D237DE\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN85371480/397327/index.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvn.jp/en/jp/JVN85371480/995319/index.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvn.jp/en/jp/JVN85371480/995417/index.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvn.jp/en/jp/JVN85371480/index.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2013-000039\",\"source\":\"vultures@jpcert.or.jp\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.