CVE-2001-1594 (GCVE-0-2001-1594)

Vulnerability from cvelistv5 – Published: 2015-08-04 10:00 – Updated: 2024-08-08 04:58
VLAI?
Summary
GE Healthcare eNTEGRA P&R has a password of (1) entegra for the entegra user, (2) passme for the super user of the Polestar/Polestar-i Starlink 4 upgrade, (3) 0 for the entegra user of the Codonics printer FTP service, (4) eNTEGRA for the eNTEGRA P&R user account, (5) insite for the WinVNC Login, and possibly other accounts, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:58:11.420Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://apps.gehealthcare.com/servlet/ClientServlet/2263784.pdf?DOCCLASS=A\u0026REQ=RAC\u0026DIRECTION=2263784-100\u0026FILENAME=2263784.pdf\u0026FILEREV=5\u0026DOCREV_ORG=5\u0026SUBMIT=+ACCEPT+"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://twitter.com/digitalbond/status/619250429751222277"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-06-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "GE Healthcare eNTEGRA P\u0026R has a password of (1) entegra for the entegra user, (2) passme for the super user of the Polestar/Polestar-i Starlink 4 upgrade, (3) 0 for the entegra user of the Codonics printer FTP service, (4) eNTEGRA for the eNTEGRA P\u0026R user account, (5) insite for the WinVNC Login, and possibly other accounts, which has unspecified impact and attack vectors.  NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-03-27T16:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://apps.gehealthcare.com/servlet/ClientServlet/2263784.pdf?DOCCLASS=A\u0026REQ=RAC\u0026DIRECTION=2263784-100\u0026FILENAME=2263784.pdf\u0026FILEREV=5\u0026DOCREV_ORG=5\u0026SUBMIT=+ACCEPT+"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://twitter.com/digitalbond/status/619250429751222277"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1594",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GE Healthcare eNTEGRA P\u0026R has a password of (1) entegra for the entegra user, (2) passme for the super user of the Polestar/Polestar-i Starlink 4 upgrade, (3) 0 for the entegra user of the Codonics printer FTP service, (4) eNTEGRA for the eNTEGRA P\u0026R user account, (5) insite for the WinVNC Login, and possibly other accounts, which has unspecified impact and attack vectors.  NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://apps.gehealthcare.com/servlet/ClientServlet/2263784.pdf?DOCCLASS=A\u0026REQ=RAC\u0026DIRECTION=2263784-100\u0026FILENAME=2263784.pdf\u0026FILEREV=5\u0026DOCREV_ORG=5\u0026SUBMIT=+ACCEPT+",
              "refsource": "CONFIRM",
              "url": "http://apps.gehealthcare.com/servlet/ClientServlet/2263784.pdf?DOCCLASS=A\u0026REQ=RAC\u0026DIRECTION=2263784-100\u0026FILENAME=2263784.pdf\u0026FILEREV=5\u0026DOCREV_ORG=5\u0026SUBMIT=+ACCEPT+"
            },
            {
              "name": "http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/",
              "refsource": "MISC",
              "url": "http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/"
            },
            {
              "name": "https://twitter.com/digitalbond/status/619250429751222277",
              "refsource": "MISC",
              "url": "https://twitter.com/digitalbond/status/619250429751222277"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1594",
    "datePublished": "2015-08-04T10:00:00",
    "dateReserved": "2014-09-29T00:00:00",
    "dateUpdated": "2024-08-08T04:58:11.420Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gehealthcare:entegra_p\\\\\u0026r:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38B4FBF8-59F2-47EF-A662-A43E425625F1\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"GE Healthcare eNTEGRA P\u0026R has a password of (1) entegra for the entegra user, (2) passme for the super user of the Polestar/Polestar-i Starlink 4 upgrade, (3) 0 for the entegra user of the Codonics printer FTP service, (4) eNTEGRA for the eNTEGRA P\u0026R user account, (5) insite for the WinVNC Login, and possibly other accounts, which has unspecified impact and attack vectors.  NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad en GE Healthcare eNTEGRA P\u0026R, tiene una contrase\\u00f1a (1) entegra para el usuario entegra, (2) passme para el superusuario de GE Healthcare eNTEGRA P\u0026Re, (3) 0 para el usuario entegra del servicio Codonics printer FTP, (4) eNTEGRA para la cuenta de usuario eNTEGRA P\u0026R, (5) insite para el WinVNC Login y posiblemente otras cuentas, lo cual tiene un impacto y vectores de ataque no especificados. NOTA: no est\\u00e1 claro si esta contrase\\u00f1a es por defecto, embebida o dependiente de otro sistema o producto que requiera un valor fijo.\"}]",
      "id": "CVE-2001-1594",
      "lastModified": "2024-11-20T23:38:03.683",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": true, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2015-08-04T14:59:00.143",
      "references": "[{\"url\": \"http://apps.gehealthcare.com/servlet/ClientServlet/2263784.pdf?DOCCLASS=A\u0026REQ=RAC\u0026DIRECTION=2263784-100\u0026FILENAME=2263784.pdf\u0026FILEREV=5\u0026DOCREV_ORG=5\u0026SUBMIT=+ACCEPT+\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://twitter.com/digitalbond/status/619250429751222277\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://apps.gehealthcare.com/servlet/ClientServlet/2263784.pdf?DOCCLASS=A\u0026REQ=RAC\u0026DIRECTION=2263784-100\u0026FILENAME=2263784.pdf\u0026FILEREV=5\u0026DOCREV_ORG=5\u0026SUBMIT=+ACCEPT+\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://twitter.com/digitalbond/status/619250429751222277\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-255\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2001-1594\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-08-04T14:59:00.143\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GE Healthcare eNTEGRA P\u0026R has a password of (1) entegra for the entegra user, (2) passme for the super user of the Polestar/Polestar-i Starlink 4 upgrade, (3) 0 for the entegra user of the Codonics printer FTP service, (4) eNTEGRA for the eNTEGRA P\u0026R user account, (5) insite for the WinVNC Login, and possibly other accounts, which has unspecified impact and attack vectors.  NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en GE Healthcare eNTEGRA P\u0026R, tiene una contrase\u00f1a (1) entegra para el usuario entegra, (2) passme para el superusuario de GE Healthcare eNTEGRA P\u0026Re, (3) 0 para el usuario entegra del servicio Codonics printer FTP, (4) eNTEGRA para la cuenta de usuario eNTEGRA P\u0026R, (5) insite para el WinVNC Login y posiblemente otras cuentas, lo cual tiene un impacto y vectores de ataque no especificados. NOTA: no est\u00e1 claro si esta contrase\u00f1a es por defecto, embebida o dependiente de otro sistema o producto que requiera un valor fijo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-255\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gehealthcare:entegra_p\\\\\u0026r:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38B4FBF8-59F2-47EF-A662-A43E425625F1\"}]}]}],\"references\":[{\"url\":\"http://apps.gehealthcare.com/servlet/ClientServlet/2263784.pdf?DOCCLASS=A\u0026REQ=RAC\u0026DIRECTION=2263784-100\u0026FILENAME=2263784.pdf\u0026FILEREV=5\u0026DOCREV_ORG=5\u0026SUBMIT=+ACCEPT+\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://twitter.com/digitalbond/status/619250429751222277\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://apps.gehealthcare.com/servlet/ClientServlet/2263784.pdf?DOCCLASS=A\u0026REQ=RAC\u0026DIRECTION=2263784-100\u0026FILENAME=2263784.pdf\u0026FILEREV=5\u0026DOCREV_ORG=5\u0026SUBMIT=+ACCEPT+\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://twitter.com/digitalbond/status/619250429751222277\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…