CVE-2019-10957 (GCVE-0-2019-10957)
Vulnerability from cvelistv5 – Published: 2020-01-17 17:53 – Updated: 2024-08-04 22:40
VLAI?
Summary
Geutebruck IP Cameras G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior may allow a remote authenticated attacker with access to event configuration to store malicious code on the server, which could later be triggered by a legitimate user resulting in code execution within the user’s browser.
Severity ?
No CVSS data available.
CWE
- CWE-79 - IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Geutebruck IP Cameras |
Affected:
G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T22:40:15.636Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.us-cert.gov/ics/advisories/ICSA-19-155-03"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Geutebruck IP Cameras",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Geutebruck IP Cameras G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior may allow a remote authenticated attacker with access to event configuration to store malicious code on the server, which could later be triggered by a legitimate user resulting in code execution within the user\u2019s browser."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (\u0027CROSS-SITE SCRIPTING\u0027) CWE-79",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-01-17T17:53:09",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.us-cert.gov/ics/advisories/ICSA-19-155-03"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2019-10957",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Geutebruck IP Cameras",
"version": {
"version_data": [
{
"version_value": "G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Geutebruck IP Cameras G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior may allow a remote authenticated attacker with access to event configuration to store malicious code on the server, which could later be triggered by a legitimate user resulting in code execution within the user\u2019s browser."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (\u0027CROSS-SITE SCRIPTING\u0027) CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.us-cert.gov/ics/advisories/ICSA-19-155-03",
"refsource": "MISC",
"url": "https://www.us-cert.gov/ics/advisories/ICSA-19-155-03"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2019-10957",
"datePublished": "2020-01-17T17:53:09",
"dateReserved": "2019-04-08T00:00:00",
"dateUpdated": "2024-08-04T22:40:15.636Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.12.0.25\", \"matchCriteriaId\": \"1CF8C5A5-0F3A-467A-AFD2-E60ADA62CCBF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:geutebrueck:g-code_eec-2400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C32316BD-4862-47BC-9CDF-8461B0867284\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.12.0.25\", \"matchCriteriaId\": \"F8EB2851-9D8A-487C-9B71-5BF9EB5048A7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:geutebrueck:g-cam_ebc-2110:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8752CB59-2B2F-49DA-9307-8B4BDB081494\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.12.0.25\", \"matchCriteriaId\": \"775DBC94-B21B-40D1-8E5F-6FCC422CBFD4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:geutebrueck:g-cam_ebc-2111:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA6A053D-DD65-4FC3-A053-FE3FB3E640F5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:geutebrueck:g-cam_efd-2240_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.12.0.25\", \"matchCriteriaId\": \"6FD3D4CF-129F-4AAA-9FC3-35C3DFB5ED17\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:geutebrueck:g-cam_efd-2240:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B75A2AE-8029-4BF1-8B13-5698738ADD8D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.12.0.25\", \"matchCriteriaId\": \"32B9BEC3-0176-4985-BE0A-54287072E21B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:geutebrueck:g-cam_efd-2241:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFAA8B7F-8CFF-4BE9-9301-0D60FF3370DA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.12.0.25\", \"matchCriteriaId\": \"00C44320-C897-4D9A-AE77-6DAE7180AF07\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:geutebrueck:g-cam_efd-2250:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A628256-3DB6-4316-BF48-16C7147702F7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.12.0.25\", \"matchCriteriaId\": \"2947E7D8-912F-48BB-B0CA-4223A76B8E1D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:geutebrueck:g-cam_ethc-2230:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A04410F-F5DD-4C0A-ADC5-F531418BC6A2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.12.0.25\", \"matchCriteriaId\": \"2A2E4987-7C8C-441E-ADAA-F2E9642DABA6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:geutebrueck:g-cam_ethc-2240:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57913EDA-9EA4-449E-ADE0-B785073AA92C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.12.0.25\", \"matchCriteriaId\": \"3052946A-3500-4824-A032-9E7E2861959A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:geutebrueck:g-cam_ethc-2239:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24B4318D-1EF6-4697-B613-601B099D0A29\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.12.0.25\", \"matchCriteriaId\": \"F94563FF-BF68-43F4-873A-DC6FCCC08EE2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:geutebrueck:g-cam_ethc-2249:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAF52FD5-3CD6-4463-9B89-546AF6FFEF03\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.12.0.25\", \"matchCriteriaId\": \"922E63BC-4703-4120-8AC4-5ED1EECC085E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:geutebrueck:g-cam_ewpc-2270:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B1CC8C3-EC7A-4BE2-AA0E-38DA0783FC68\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Geutebruck IP Cameras G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior may allow a remote authenticated attacker with access to event configuration to store malicious code on the server, which could later be triggered by a legitimate user resulting in code execution within the user\\u2019s browser.\"}, {\"lang\": \"es\", \"value\": \"C\\u00e1maras IP Geutebruck G-Code (EEC-2xxx), G-Cam (EBC-21xx / EFD-22xx / ETHC-22xx / EWPC-22xx): todas las versiones 1.12.0.25 y anteriores pueden permitir un atacante autenticado remoto con acceso al evento configuraci\\u00f3n para almacenar c\\u00f3digo malicioso en el servidor, que luego podr\\u00eda ser activado por un usuario leg\\u00edtimo, lo que da como resultado la ejecuci\\u00f3n de c\\u00f3digo dentro del navegador del usuario.\"}]",
"id": "CVE-2019-10957",
"lastModified": "2024-11-21T04:20:13.960",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 4.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.7, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:N/I:P/A:N\", \"baseScore\": 3.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 6.8, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2020-01-17T18:15:12.180",
"references": "[{\"url\": \"https://www.us-cert.gov/ics/advisories/ICSA-19-155-03\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.us-cert.gov/ics/advisories/ICSA-19-155-03\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}]",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-10957\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2020-01-17T18:15:12.180\",\"lastModified\":\"2024-11-21T04:20:13.960\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Geutebruck IP Cameras G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior may allow a remote authenticated attacker with access to event configuration to store malicious code on the server, which could later be triggered by a legitimate user resulting in code execution within the user\u2019s browser.\"},{\"lang\":\"es\",\"value\":\"C\u00e1maras IP Geutebruck G-Code (EEC-2xxx), G-Cam (EBC-21xx / EFD-22xx / ETHC-22xx / EWPC-22xx): todas las versiones 1.12.0.25 y anteriores pueden permitir un atacante autenticado remoto con acceso al evento configuraci\u00f3n para almacenar c\u00f3digo malicioso en el servidor, que luego podr\u00eda ser activado por un usuario leg\u00edtimo, lo que da como resultado la ejecuci\u00f3n de c\u00f3digo dentro del navegador del usuario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.7,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.25\",\"matchCriteriaId\":\"1CF8C5A5-0F3A-467A-AFD2-E60ADA62CCBF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-code_eec-2400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C32316BD-4862-47BC-9CDF-8461B0867284\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.25\",\"matchCriteriaId\":\"F8EB2851-9D8A-487C-9B71-5BF9EB5048A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ebc-2110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8752CB59-2B2F-49DA-9307-8B4BDB081494\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.25\",\"matchCriteriaId\":\"775DBC94-B21B-40D1-8E5F-6FCC422CBFD4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ebc-2111:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA6A053D-DD65-4FC3-A053-FE3FB3E640F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_efd-2240_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.25\",\"matchCriteriaId\":\"6FD3D4CF-129F-4AAA-9FC3-35C3DFB5ED17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_efd-2240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B75A2AE-8029-4BF1-8B13-5698738ADD8D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.25\",\"matchCriteriaId\":\"32B9BEC3-0176-4985-BE0A-54287072E21B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_efd-2241:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFAA8B7F-8CFF-4BE9-9301-0D60FF3370DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.25\",\"matchCriteriaId\":\"00C44320-C897-4D9A-AE77-6DAE7180AF07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_efd-2250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A628256-3DB6-4316-BF48-16C7147702F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.25\",\"matchCriteriaId\":\"2947E7D8-912F-48BB-B0CA-4223A76B8E1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ethc-2230:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A04410F-F5DD-4C0A-ADC5-F531418BC6A2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.25\",\"matchCriteriaId\":\"2A2E4987-7C8C-441E-ADAA-F2E9642DABA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ethc-2240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57913EDA-9EA4-449E-ADE0-B785073AA92C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.25\",\"matchCriteriaId\":\"3052946A-3500-4824-A032-9E7E2861959A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ethc-2239:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24B4318D-1EF6-4697-B613-601B099D0A29\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.25\",\"matchCriteriaId\":\"F94563FF-BF68-43F4-873A-DC6FCCC08EE2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ethc-2249:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAF52FD5-3CD6-4463-9B89-546AF6FFEF03\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.25\",\"matchCriteriaId\":\"922E63BC-4703-4120-8AC4-5ED1EECC085E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ewpc-2270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B1CC8C3-EC7A-4BE2-AA0E-38DA0783FC68\"}]}]}],\"references\":[{\"url\":\"https://www.us-cert.gov/ics/advisories/ICSA-19-155-03\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/ICSA-19-155-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…