BDU:2024-02878

Vulnerability from fstec - Published: 27.03.2024
VLAI Severity ?
Title
Уязвимость микропрограммного обеспечения точек доступа Cisco Aironet Access Points (AP) серий 1540, 1560, 1800, 2800, 3800, 4800, Catalyst 9105AX, Catalyst 9115, Catalyst 9120AX, Catalyst 9124AX, Catalyst 9130AX и Catalyst 9136, связанняа с нарушением доверительных границ, позволяющая нарушителю обойти ограничения безопасности, выполнить произвольные команды и загрузить измененный образ программного обеспечения
Description
Уязвимость микропрограммного обеспечения точек доступа Cisco Aironet Access Points (AP) серий 1540, 1560, 1800, 2800, 3800, 4800, Catalyst 9105AX, Catalyst 9115, Catalyst 9120AX, Catalyst 9124AX, Catalyst 9130AX и Catalyst 9136 связана с нарушением доверительных границ. Эксплуатация уязвимости может позволить нарушителю обойти ограничения безопасности, обойти ограничения безопасности, выполнить произвольные команды и загрузить измененный образ программного обеспечения
Vendor
Cisco Systems Inc.
Software Name
Cisco Embedded Services 6300 Series APs, Catalyst IW6300 Heavy Duty Series APs, Aironet 1540 Series APs, Aironet 1560 Series APs, Aironet 1800 Series APs, Aironet 2800 Series APs, Aironet 3800 Series APs, Aironet 4800 APs, Cisco Business 150 AP, Cisco Business 151 Mesh Extender, Cisco Business 100 Series Access Points, Cisco Business 200 Series Access Points, Catalyst 9105AX Series, Catalyst 9115 Series, Catalyst 9120AX Series, Catalyst 9124AX Series, Catalyst 9130AX Series, Catalyst 9136, Catalyst Cellular Gateways, Cisco Wide Pluggable Form Factor Wi-Fi 6 AP Module for Industrial Routers
Software Version
до 17.3.8 (Cisco Embedded Services 6300 Series APs), от 17.4 до 17.6.6 (Cisco Embedded Services 6300 Series APs), до 17.3.8 (Catalyst IW6300 Heavy Duty Series APs), от 17.4 до 17.6.6 (Catalyst IW6300 Heavy Duty Series APs), до 8.10.190.0 (Aironet 1540 Series APs), до 8.10.190.0 (Aironet 1560 Series APs), до 8.10.190.0 (Aironet 1800 Series APs), до 8.10.190.0 (Aironet 2800 Series APs), до 8.10.190.0 (Aironet 3800 Series APs), до 8.10.190.0 (Aironet 4800 APs), до 10.6.2.0 (Cisco Business 150 AP), до 10.6.2.0 (Cisco Business 151 Mesh Extender), до 10.9.1.0 (Cisco Business 100 Series Access Points), до 10.9.1.0 (Cisco Business 200 Series Access Points), от 17.7 до 17.9.4 (Cisco Embedded Services 6300 Series APs), от 17.10 до 17.11 включительно (Cisco Embedded Services 6300 Series APs), до 17.3.8 (Catalyst 9105AX Series), от 17.4 до 17.6.6 (Catalyst 9105AX Series), от 17.7 до 17.9.4 (Catalyst 9105AX Series), от 17.10 до 17.11 включительно (Catalyst 9105AX Series), от 17.10 до 17.11 включительно (Catalyst 9115 Series), от 17.7 до 17.9.4 (Catalyst 9115 Series), от 17.4 до 17.6.6 (Catalyst 9115 Series), до 17.3.8 (Catalyst 9115 Series), от 17.10 до 17.11 включительно (Catalyst 9120AX Series), от 17.7 до 17.9.4 (Catalyst 9120AX Series), от 17.4 до 17.6.6 (Catalyst 9120AX Series), до 17.3.8 (Catalyst 9120AX Series), от 17.10 до 17.11 включительно (Catalyst 9124AX Series), от 17.7 до 17.9.4 (Catalyst 9124AX Series), от 17.4 до 17.6.6 (Catalyst 9124AX Series), до 17.3.8 (Catalyst 9124AX Series), от 17.10 до 17.11 включительно (Catalyst 9130AX Series), от 17.7 до 17.9.4 (Catalyst 9130AX Series), от 17.4 до 17.6.6 (Catalyst 9130AX Series), до 17.3.8 (Catalyst 9130AX Series), от 17.10 до 17.11 включительно (Catalyst 9136), от 17.7 до 17.9.4 (Catalyst 9136), от 17.4 до 17.6.6 (Catalyst 9136), до 17.3.8 (Catalyst 9136), от 17.10 до 17.11 включительно (Catalyst Cellular Gateways), от 17.7 до 17.9.4 (Catalyst Cellular Gateways), от 17.4 до 17.6.6 (Catalyst Cellular Gateways), до 17.3.8 (Catalyst Cellular Gateways), от 17.7 до 17.9.4 (Catalyst IW6300 Heavy Duty Series APs), от 17.10 до 17.11 включительно (Catalyst IW6300 Heavy Duty Series APs), от 17.10 до 17.11 включительно (Cisco Wide Pluggable Form Factor Wi-Fi 6 AP Module for Industrial Routers), от 17.7 до 17.9.4 (Cisco Wide Pluggable Form Factor Wi-Fi 6 AP Module for Industrial Routers), от 17.4 до 17.6.6 (Cisco Wide Pluggable Form Factor Wi-Fi 6 AP Module for Industrial Routers), до 17.3.8 (Cisco Wide Pluggable Form Factor Wi-Fi 6 AP Module for Industrial Routers)
Possible Mitigations
Использование рекомендаций: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD
Reference
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD
CWE
CWE-501

{
  "CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:C/A:N",
  "CVSS 3.0": "AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 17.3.8 (Cisco Embedded Services 6300 Series APs), \u043e\u0442 17.4 \u0434\u043e 17.6.6 (Cisco Embedded Services 6300 Series APs), \u0434\u043e 17.3.8 (Catalyst IW6300 Heavy Duty Series APs), \u043e\u0442 17.4 \u0434\u043e 17.6.6 (Catalyst IW6300 Heavy Duty Series APs), \u0434\u043e 8.10.190.0 (Aironet 1540 Series APs), \u0434\u043e 8.10.190.0 (Aironet 1560 Series APs), \u0434\u043e 8.10.190.0 (Aironet 1800 Series APs), \u0434\u043e 8.10.190.0 (Aironet 2800 Series APs), \u0434\u043e 8.10.190.0 (Aironet 3800 Series APs), \u0434\u043e 8.10.190.0 (Aironet 4800 APs), \u0434\u043e 10.6.2.0 (Cisco Business 150 AP), \u0434\u043e 10.6.2.0 (Cisco Business 151 Mesh Extender), \u0434\u043e 10.9.1.0 (Cisco Business 100 Series Access Points), \u0434\u043e 10.9.1.0 (Cisco Business 200 Series Access Points), \u043e\u0442 17.7 \u0434\u043e 17.9.4 (Cisco Embedded Services 6300 Series APs), \u043e\u0442 17.10 \u0434\u043e 17.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Cisco Embedded Services 6300 Series APs), \u0434\u043e 17.3.8 (Catalyst 9105AX Series), \u043e\u0442 17.4 \u0434\u043e 17.6.6 (Catalyst 9105AX Series), \u043e\u0442 17.7 \u0434\u043e 17.9.4 (Catalyst 9105AX Series), \u043e\u0442 17.10 \u0434\u043e 17.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Catalyst 9105AX Series), \u043e\u0442 17.10 \u0434\u043e 17.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Catalyst 9115 Series), \u043e\u0442 17.7 \u0434\u043e 17.9.4 (Catalyst 9115 Series), \u043e\u0442 17.4 \u0434\u043e 17.6.6 (Catalyst 9115 Series), \u0434\u043e 17.3.8 (Catalyst 9115 Series), \u043e\u0442 17.10 \u0434\u043e 17.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Catalyst 9120AX Series), \u043e\u0442 17.7 \u0434\u043e 17.9.4 (Catalyst 9120AX Series), \u043e\u0442 17.4 \u0434\u043e 17.6.6 (Catalyst 9120AX Series), \u0434\u043e 17.3.8 (Catalyst 9120AX Series), \u043e\u0442 17.10 \u0434\u043e 17.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Catalyst 9124AX Series), \u043e\u0442 17.7 \u0434\u043e 17.9.4 (Catalyst 9124AX Series), \u043e\u0442 17.4 \u0434\u043e 17.6.6 (Catalyst 9124AX Series), \u0434\u043e 17.3.8 (Catalyst 9124AX Series), \u043e\u0442 17.10 \u0434\u043e 17.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Catalyst 9130AX Series), \u043e\u0442 17.7 \u0434\u043e 17.9.4 (Catalyst 9130AX Series), \u043e\u0442 17.4 \u0434\u043e 17.6.6 (Catalyst 9130AX Series), \u0434\u043e 17.3.8 (Catalyst 9130AX Series), \u043e\u0442 17.10 \u0434\u043e 17.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Catalyst 9136), \u043e\u0442 17.7 \u0434\u043e 17.9.4 (Catalyst 9136), \u043e\u0442 17.4 \u0434\u043e 17.6.6 (Catalyst 9136), \u0434\u043e 17.3.8 (Catalyst 9136), \u043e\u0442 17.10 \u0434\u043e 17.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Catalyst Cellular Gateways), \u043e\u0442 17.7 \u0434\u043e 17.9.4 (Catalyst Cellular Gateways), \u043e\u0442 17.4 \u0434\u043e 17.6.6 (Catalyst Cellular Gateways), \u0434\u043e 17.3.8 (Catalyst Cellular Gateways), \u043e\u0442 17.7 \u0434\u043e 17.9.4 (Catalyst IW6300 Heavy Duty Series APs), \u043e\u0442 17.10 \u0434\u043e 17.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Catalyst IW6300 Heavy Duty Series APs), \u043e\u0442 17.10 \u0434\u043e 17.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Cisco Wide Pluggable Form Factor Wi-Fi 6 AP Module for Industrial Routers), \u043e\u0442 17.7 \u0434\u043e 17.9.4 (Cisco Wide Pluggable Form Factor Wi-Fi 6 AP Module for Industrial Routers), \u043e\u0442 17.4 \u0434\u043e 17.6.6 (Cisco Wide Pluggable Form Factor Wi-Fi 6 AP Module for Industrial Routers), \u0434\u043e 17.3.8 (Cisco Wide Pluggable Form Factor Wi-Fi 6 AP Module for Industrial Routers)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "27.03.2024",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "15.04.2024",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "15.04.2024",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-02878",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-20265",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Cisco Embedded Services 6300 Series APs, Catalyst IW6300 Heavy Duty Series APs, Aironet 1540 Series APs, Aironet 1560 Series APs, Aironet 1800 Series APs, Aironet 2800 Series APs, Aironet 3800 Series APs, Aironet 4800 APs, Cisco Business 150 AP, Cisco Business 151 Mesh Extender, Cisco Business 100 Series Access Points, Cisco Business 200 Series Access Points, Catalyst 9105AX Series, Catalyst 9115 Series, Catalyst 9120AX Series, Catalyst 9124AX Series, Catalyst 9130AX Series, Catalyst 9136, Catalyst Cellular Gateways, Cisco Wide Pluggable Form Factor Wi-Fi 6 AP Module for Industrial Routers",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u0447\u0435\u043a \u0434\u043e\u0441\u0442\u0443\u043f\u0430 Cisco Aironet Access Points (AP) \u0441\u0435\u0440\u0438\u0439 1540, 1560, 1800, 2800, 3800, 4800, Catalyst 9105AX, Catalyst 9115, Catalyst 9120AX, Catalyst 9124AX, Catalyst 9130AX \u0438 Catalyst 9136, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044f\u0430 \u0441 \u043d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435\u043c \u0434\u043e\u0432\u0435\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0433\u0440\u0430\u043d\u0438\u0446, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u0431\u043e\u0439\u0442\u0438 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0438 \u0437\u0430\u0433\u0440\u0443\u0437\u0438\u0442\u044c \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u043d\u044b\u0439 \u043e\u0431\u0440\u0430\u0437 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0434\u043e\u0432\u0435\u0440\u0438\u044f (CWE-501)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u0447\u0435\u043a \u0434\u043e\u0441\u0442\u0443\u043f\u0430 Cisco Aironet Access Points (AP) \u0441\u0435\u0440\u0438\u0439 1540, 1560, 1800, 2800, 3800, 4800, Catalyst 9105AX, Catalyst 9115, Catalyst 9120AX, Catalyst 9124AX, Catalyst 9130AX \u0438 Catalyst 9136 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435\u043c \u0434\u043e\u0432\u0435\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0433\u0440\u0430\u043d\u0438\u0446. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u0431\u043e\u0439\u0442\u0438 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043e\u0431\u043e\u0439\u0442\u0438 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0438 \u0437\u0430\u0433\u0440\u0443\u0437\u0438\u0442\u044c \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u043d\u044b\u0439 \u043e\u0431\u0440\u0430\u0437 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-501",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,2)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,9)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…