CVE-2012-1844 (GCVE-0-2012-1844)

Vulnerability from cvelistv5 – Published: 2012-03-22 10:00 – Updated: 2024-08-06 19:08
VLAI?
Summary
The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:08:38.646Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "scalar-default-account(74322)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
          },
          {
            "name": "VU#913483",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/913483"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
          },
          {
            "name": "80372",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80372"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-09T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "scalar-default-account(74322)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
        },
        {
          "name": "VU#913483",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/913483"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
        },
        {
          "name": "80372",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80372"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1844",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "scalar-default-account(74322)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
            },
            {
              "name": "VU#913483",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/913483"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
            },
            {
              "name": "80372",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80372"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1844",
    "datePublished": "2012-03-22T10:00:00",
    "dateReserved": "2012-03-21T00:00:00",
    "dateUpdated": "2024-08-06T19:08:38.646Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quantum:scalar_i500_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"i7.0.2\", \"matchCriteriaId\": \"285AA3DB-D702-4F55-A6B6-99F6BC12B1DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quantum:scalar_i500_firmware:i2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCE92B3E-2606-4309-9462-E0529A967AC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quantum:scalar_i500_firmware:i3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC8B4BB2-1E77-4980-BFD2-3030703C27C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quantum:scalar_i500_firmware:i3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AF16C0F-1D0B-45DB-BDBE-3400DEC20B9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quantum:scalar_i500_firmware:i4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ADF92E7-1E86-432F-990A-D2B032329C0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quantum:scalar_i500_firmware:i5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85452B6E-BD5E-436B-BC5C-F91F68FD19A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quantum:scalar_i500_firmware:i5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FB27B5B-0E14-4866-88FF-83BA652E6CD2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quantum:scalar_i500_firmware:i6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94298513-64B2-40F5-AA01-27F5620217B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quantum:scalar_i500_firmware:i6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12FB8F97-28EE-42D3-B793-6E7F36B15234\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quantum:scalar_i500_firmware:i7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"466D3BD8-0B2A-4DE6-BD23-118CF7AD3413\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quantum:scalar_i500_firmware:i7.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8D2BEA7-216D-4202-8BE2-430CCCAD106F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quantum:scalar_i500_firmware:sp4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68CA3AC1-4AC5-48BA-B749-CF29104093DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quantum:scalar_i500_firmware:sp4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAE34EB9-66D2-498D-A02D-7F5EAD923707\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:quantum:scalar_i500:5u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6AA8B64-A78C-4B51-B29B-21CF2AEF9484\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:quantum:scalar_i500:14u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6FFB7DA-15EB-4053-9440-A30F8E434F5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:quantum:scalar_i500:23u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C39DFB77-7945-4CA0-9B66-AF3908FE515D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:powervault_ml6000_firmware:585g.gs003:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B993C619-EC72-47F2-AAE0-8EED9AAC7BF6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:dell:powervault_ml6000:32u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"136C9AB1-37AE-43EE-BAAC-39277789B734\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:dell:powervault_ml6000:41u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33A96FD1-2005-41BE-ACE5-33AC136F7206\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:dell:powervault_ml6010:5u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB0FF827-E40B-4DC0-9CAC-82922B827F35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:dell:powervault_ml6020:14u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"789D5925-AF4A-4CBA-B51F-FF6F1ADE5C6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:dell:powervault_ml6030:23u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B93C93C2-3FC1-4E5A-AC82-22EAFAA5B4CE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:ts3310_tape_library_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"605g.g002\", \"matchCriteriaId\": \"54D9D062-754E-49D8-94D9-81E15511A5D2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:ibm:ts3310_tape_library:3573:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AC7FE3B-2E91-4A09-9C41-7F0CB198B0E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:ibm:ts3310_tape_library:3576:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE63555B-ADBE-45DA-9D98-22445A11FCA5\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors.\"}, {\"lang\": \"es\", \"value\": \"La librer\\u00eda de cintas Quantum Scalar i500 con el firmware antes de i7.0.3 (604G.GS00100), que tambi\\u00e9n se distribuye como la librer\\u00eda de cintas Dell ML6000 con el firmware antes de A20-00 (590G.GS00100) y como la librer\\u00eda de cintas IBM TS3310 con el firmware antes de R6C (606G. GS001), utiliza contrase\\u00f1as por defecto para las cuentas de usuario no especificados, lo cual facilita a los atacantes remotos a la hora de obtener acceso a trav\\u00e9s de vectores desconocidos.\"}]",
      "id": "CVE-2012-1844",
      "lastModified": "2024-11-21T01:37:53.720",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2012-03-22T10:17:11.127",
      "references": "[{\"url\": \"http://osvdb.org/80372\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/913483\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/MAPG-8NNKN8\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/MAPG-8NVRPY\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/MORO-8QNJLE\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/74322\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/80372\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/913483\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/MAPG-8NNKN8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/MAPG-8NVRPY\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/MORO-8QNJLE\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/74322\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vendorComments": "[{\"organization\": \"Quantum Corporation\", \"comment\": \"The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.\", \"lastModified\": \"2012-06-13T00:00:00\"}]",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-255\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-1844\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2012-03-22T10:17:11.127\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors.\"},{\"lang\":\"es\",\"value\":\"La librer\u00eda de cintas Quantum Scalar i500 con el firmware antes de i7.0.3 (604G.GS00100), que tambi\u00e9n se distribuye como la librer\u00eda de cintas Dell ML6000 con el firmware antes de A20-00 (590G.GS00100) y como la librer\u00eda de cintas IBM TS3310 con el firmware antes de R6C (606G. GS001), utiliza contrase\u00f1as por defecto para las cuentas de usuario no especificados, lo cual facilita a los atacantes remotos a la hora de obtener acceso a trav\u00e9s de vectores desconocidos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-255\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quantum:scalar_i500_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"i7.0.2\",\"matchCriteriaId\":\"285AA3DB-D702-4F55-A6B6-99F6BC12B1DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quantum:scalar_i500_firmware:i2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCE92B3E-2606-4309-9462-E0529A967AC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quantum:scalar_i500_firmware:i3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC8B4BB2-1E77-4980-BFD2-3030703C27C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quantum:scalar_i500_firmware:i3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AF16C0F-1D0B-45DB-BDBE-3400DEC20B9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quantum:scalar_i500_firmware:i4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ADF92E7-1E86-432F-990A-D2B032329C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quantum:scalar_i500_firmware:i5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85452B6E-BD5E-436B-BC5C-F91F68FD19A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quantum:scalar_i500_firmware:i5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FB27B5B-0E14-4866-88FF-83BA652E6CD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quantum:scalar_i500_firmware:i6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94298513-64B2-40F5-AA01-27F5620217B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quantum:scalar_i500_firmware:i6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12FB8F97-28EE-42D3-B793-6E7F36B15234\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quantum:scalar_i500_firmware:i7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"466D3BD8-0B2A-4DE6-BD23-118CF7AD3413\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quantum:scalar_i500_firmware:i7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8D2BEA7-216D-4202-8BE2-430CCCAD106F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quantum:scalar_i500_firmware:sp4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CA3AC1-4AC5-48BA-B749-CF29104093DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quantum:scalar_i500_firmware:sp4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAE34EB9-66D2-498D-A02D-7F5EAD923707\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:quantum:scalar_i500:5u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6AA8B64-A78C-4B51-B29B-21CF2AEF9484\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:quantum:scalar_i500:14u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6FFB7DA-15EB-4053-9440-A30F8E434F5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:quantum:scalar_i500:23u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C39DFB77-7945-4CA0-9B66-AF3908FE515D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:powervault_ml6000_firmware:585g.gs003:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B993C619-EC72-47F2-AAE0-8EED9AAC7BF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:dell:powervault_ml6000:32u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"136C9AB1-37AE-43EE-BAAC-39277789B734\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:dell:powervault_ml6000:41u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33A96FD1-2005-41BE-ACE5-33AC136F7206\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:dell:powervault_ml6010:5u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB0FF827-E40B-4DC0-9CAC-82922B827F35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:dell:powervault_ml6020:14u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"789D5925-AF4A-4CBA-B51F-FF6F1ADE5C6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:dell:powervault_ml6030:23u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B93C93C2-3FC1-4E5A-AC82-22EAFAA5B4CE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:ts3310_tape_library_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"605g.g002\",\"matchCriteriaId\":\"54D9D062-754E-49D8-94D9-81E15511A5D2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:ibm:ts3310_tape_library:3573:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AC7FE3B-2E91-4A09-9C41-7F0CB198B0E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:ibm:ts3310_tape_library:3576:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE63555B-ADBE-45DA-9D98-22445A11FCA5\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/80372\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/913483\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MAPG-8NNKN8\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MAPG-8NVRPY\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MORO-8QNJLE\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/74322\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/80372\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/913483\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MAPG-8NNKN8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MAPG-8NVRPY\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MORO-8QNJLE\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/74322\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Quantum Corporation\",\"comment\":\"The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.\",\"lastModified\":\"2012-06-13T00:00:00\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…