CVE-2012-2217 (GCVE-0-2012-2217)

Vulnerability from cvelistv5 – Published: 2012-05-01 14:00 – Updated: 2024-08-06 19:26
VLAI?
Summary
The HTC IQRD service for Android on the HTC EVO 4G before 4.67.651.3, EVO Design 4G before 2.12.651.5, Shift 4G before 2.77.651.3, EVO 3D before 2.17.651.5, EVO View 4G before 2.23.651.1, Vivid before 3.26.502.56, and Hero does not restrict localhost access to TCP port 2479, which allows remote attackers to (1) send SMS messages, (2) obtain the Network Access Identifier (NAI) and its password, or trigger (3) popup messages or (4) tones via a crafted application that leverages the android.permission.INTERNET permission.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:26:08.929Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "53187",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53187"
          },
          {
            "name": "htc-iqrd-sec-bypass(75080)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75080"
          },
          {
            "name": "20120421 HTC IQRD Android Permission Leakage (CVE-2012-2217)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0176.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.vsecurity.com/resources/advisory/20120420-1/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The HTC IQRD service for Android on the HTC EVO 4G before 4.67.651.3, EVO Design 4G before 2.12.651.5, Shift 4G before 2.77.651.3, EVO 3D before 2.17.651.5, EVO View 4G before 2.23.651.1, Vivid before 3.26.502.56, and Hero does not restrict localhost access to TCP port 2479, which allows remote attackers to (1) send SMS messages, (2) obtain the Network Access Identifier (NAI) and its password, or trigger (3) popup messages or (4) tones via a crafted application that leverages the android.permission.INTERNET permission."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-13T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "53187",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53187"
        },
        {
          "name": "htc-iqrd-sec-bypass(75080)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75080"
        },
        {
          "name": "20120421 HTC IQRD Android Permission Leakage (CVE-2012-2217)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0176.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.vsecurity.com/resources/advisory/20120420-1/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-2217",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The HTC IQRD service for Android on the HTC EVO 4G before 4.67.651.3, EVO Design 4G before 2.12.651.5, Shift 4G before 2.77.651.3, EVO 3D before 2.17.651.5, EVO View 4G before 2.23.651.1, Vivid before 3.26.502.56, and Hero does not restrict localhost access to TCP port 2479, which allows remote attackers to (1) send SMS messages, (2) obtain the Network Access Identifier (NAI) and its password, or trigger (3) popup messages or (4) tones via a crafted application that leverages the android.permission.INTERNET permission."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "53187",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53187"
            },
            {
              "name": "htc-iqrd-sec-bypass(75080)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75080"
            },
            {
              "name": "20120421 HTC IQRD Android Permission Leakage (CVE-2012-2217)",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0176.html"
            },
            {
              "name": "http://www.vsecurity.com/resources/advisory/20120420-1/",
              "refsource": "MISC",
              "url": "http://www.vsecurity.com/resources/advisory/20120420-1/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-2217",
    "datePublished": "2012-05-01T14:00:00",
    "dateReserved": "2012-04-10T00:00:00",
    "dateUpdated": "2024-08-06T19:26:08.929Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_4g_software:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"4.54.651.1\", \"matchCriteriaId\": \"E815F275-7BB3-4E14-92F3-3D52A72CBE7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_4g_software:1.32.651.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4654D8F-7355-4141-BD39-0A8ED38F437C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_4g_software:1.47.651.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0662E7B8-A831-4167-BEB9-9DD3CCF9F97F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_4g_software:3.26.651.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A367B3F-5ADC-422B-A032-D82CD50D761F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_4g_software:3.29.651.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B0AA96D-7810-43C3-996F-3BC01B4F6D62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_4g_software:3.30.651.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02E8E505-CCEA-4052-AF9B-C5EF58DBCBD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_4g_software:3.30.651.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FD9E9AA-3DF7-4787-982F-8A0E651DF94D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_4g_software:3.70.651.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D22BA87-3334-4939-B42E-0B3611E8B862\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_4g_software:4.22.651.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2408E95-7BFA-4D58-9FDA-9FF05DB2B5C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_4g_software:4.24.651.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6179012-8E51-4BFC-9592-BFA6AAE803D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_4g_software:4.53.651.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BCEC1AC-7CCA-409B-8346-35D9A2251FB6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:htc:evo_4g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1368A8C3-7F80-4DC4-9ADF-AC69E44CB9FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:htc:evo_4g:gri40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF9842B1-3735-48CC-9163-36253B9C5AF6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_design_4g_software:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.19.651.1\", \"matchCriteriaId\": \"7310B73E-B908-4A7D-8495-77454E87BAC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_design_4g_software:1.19.651.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A33CE59-A315-4013-BE89-67EA077B7175\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:htc:evo_design_4g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11B01216-33EC-40A7-9781-2900BCEA15A3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:shift_4g_software:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.76.651.6\", \"matchCriteriaId\": \"2253FDBF-228A-4D3F-ABF9-7AFF03207D99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:shift_4g_software:1.17.651.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB8920D7-3F96-4D13-BDFC-353E841BBE31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:shift_4g_software:2.75.651.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28DA32A0-818E-4442-B22B-A9BEC5052D96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:shift_4g_software:2.75.651.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4407EE19-DE46-49BC-8CBA-D810B084EAD9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:htc:shift_4g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2741C50D-A992-49D9-8FC5-A782AE65B0AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_3d_software:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.08.651.3\", \"matchCriteriaId\": \"8197CEE7-054D-4840-B67C-A25B44068A7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_3d_software:1.11.651.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77844462-3FA7-4C46-AFB5-61DD250711AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_3d_software:1.13.651.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F8636AB-44E1-4135-A13D-975E09812C0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_3d_software:2.08.651.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"693681CD-E6E7-43D5-BC65-78828BDD4A6C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:htc:evo_3d:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8C77876-DC0F-42CB-B795-0BB5A0A7559A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:htc:evo_3d:gri40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04CE53C2-E91D-4E99-820A-D06BA1BBAAD3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_view_4g_software:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.22.651.2\", \"matchCriteriaId\": \"7DD5920B-2C35-47B7-A54B-05C214556404\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:evo_view_4g_software:1.22.651.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCF81B72-FC57-4979-A44E-CA1BDDE07910\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:htc:evo_view_4g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDF0CF5D-A1CC-4703-9E93-04C7C8219CD4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:vivid_software:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.26.502\", \"matchCriteriaId\": \"91416F0F-82A0-42FA-831C-FF61ADFAE7EF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:htc:vivid:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"977B55E8-22F3-47A9-876D-D0E858118FC3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:hero_software:1.29.651.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7178F17C-1CEF-419F-B7D0-85145807C2BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:hero_software:1.56.651.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77BAD23A-A63F-47A4-9378-BA45A1327C48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:hero_software:2.27.651.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F01536FC-F034-47F8-951E-26C87B40B311\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:hero_software:2.27.651.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FC961A5-EC4B-4D4B-8465-35C2CC104751\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:hero_software:2.31.651.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9F56F7E-D65F-4532-8CE1-D434B5BAF8CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:htc:hero_software:2.32.651.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69E23E10-885D-4D8E-B98C-1007CD8C7AD9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:htc:hero:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"831A21A7-B190-408D-B220-6A5A023725A7\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The HTC IQRD service for Android on the HTC EVO 4G before 4.67.651.3, EVO Design 4G before 2.12.651.5, Shift 4G before 2.77.651.3, EVO 3D before 2.17.651.5, EVO View 4G before 2.23.651.1, Vivid before 3.26.502.56, and Hero does not restrict localhost access to TCP port 2479, which allows remote attackers to (1) send SMS messages, (2) obtain the Network Access Identifier (NAI) and its password, or trigger (3) popup messages or (4) tones via a crafted application that leverages the android.permission.INTERNET permission.\"}, {\"lang\": \"es\", \"value\": \"El servicio HTC IQRD para Android en HTC EVO 4G antes de v4.67.651.3, EVO Design 4G antes de v2.12.651.5, Shift 4G antes de v2.77.651.3, EVO 3D antes de v2.17.651.5, EVO View 4G antes de v2.23.651.1, Vivid antes de v3.26.502.56, y Hero no restringe el acceso a localhost en el puerto TCP 2479, lo que permite a atacantes remotos (1) enviar mensajes SMS, (2) obtener el identificador de acceso a la red (NAI) y su contrase\\u00f1a, o lanzar (3) mensajes emergentes o (4) tonos a trav\\u00e9s de una aplicaci\\u00f3n modificada que aprovecha el permiso android.permission.INTERNET.\"}]",
      "id": "CVE-2012-2217",
      "lastModified": "2024-11-21T01:38:43.533",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:N\", \"baseScore\": 6.4, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2012-05-01T14:55:01.673",
      "references": "[{\"url\": \"http://archives.neohapsis.com/archives/bugtraq/2012-04/0176.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/53187\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vsecurity.com/resources/advisory/20120420-1/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/75080\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://archives.neohapsis.com/archives/bugtraq/2012-04/0176.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/53187\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vsecurity.com/resources/advisory/20120420-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/75080\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-2217\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2012-05-01T14:55:01.673\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The HTC IQRD service for Android on the HTC EVO 4G before 4.67.651.3, EVO Design 4G before 2.12.651.5, Shift 4G before 2.77.651.3, EVO 3D before 2.17.651.5, EVO View 4G before 2.23.651.1, Vivid before 3.26.502.56, and Hero does not restrict localhost access to TCP port 2479, which allows remote attackers to (1) send SMS messages, (2) obtain the Network Access Identifier (NAI) and its password, or trigger (3) popup messages or (4) tones via a crafted application that leverages the android.permission.INTERNET permission.\"},{\"lang\":\"es\",\"value\":\"El servicio HTC IQRD para Android en HTC EVO 4G antes de v4.67.651.3, EVO Design 4G antes de v2.12.651.5, Shift 4G antes de v2.77.651.3, EVO 3D antes de v2.17.651.5, EVO View 4G antes de v2.23.651.1, Vivid antes de v3.26.502.56, y Hero no restringe el acceso a localhost en el puerto TCP 2479, lo que permite a atacantes remotos (1) enviar mensajes SMS, (2) obtener el identificador de acceso a la red (NAI) y su contrase\u00f1a, o lanzar (3) mensajes emergentes o (4) tonos a trav\u00e9s de una aplicaci\u00f3n modificada que aprovecha el permiso android.permission.INTERNET.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:N\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_4g_software:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.54.651.1\",\"matchCriteriaId\":\"E815F275-7BB3-4E14-92F3-3D52A72CBE7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_4g_software:1.32.651.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4654D8F-7355-4141-BD39-0A8ED38F437C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_4g_software:1.47.651.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0662E7B8-A831-4167-BEB9-9DD3CCF9F97F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_4g_software:3.26.651.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A367B3F-5ADC-422B-A032-D82CD50D761F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_4g_software:3.29.651.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B0AA96D-7810-43C3-996F-3BC01B4F6D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_4g_software:3.30.651.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02E8E505-CCEA-4052-AF9B-C5EF58DBCBD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_4g_software:3.30.651.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FD9E9AA-3DF7-4787-982F-8A0E651DF94D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_4g_software:3.70.651.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D22BA87-3334-4939-B42E-0B3611E8B862\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_4g_software:4.22.651.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2408E95-7BFA-4D58-9FDA-9FF05DB2B5C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_4g_software:4.24.651.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6179012-8E51-4BFC-9592-BFA6AAE803D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_4g_software:4.53.651.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BCEC1AC-7CCA-409B-8346-35D9A2251FB6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:htc:evo_4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1368A8C3-7F80-4DC4-9ADF-AC69E44CB9FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:htc:evo_4g:gri40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF9842B1-3735-48CC-9163-36253B9C5AF6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_design_4g_software:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.19.651.1\",\"matchCriteriaId\":\"7310B73E-B908-4A7D-8495-77454E87BAC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_design_4g_software:1.19.651.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A33CE59-A315-4013-BE89-67EA077B7175\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:htc:evo_design_4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11B01216-33EC-40A7-9781-2900BCEA15A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:shift_4g_software:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.76.651.6\",\"matchCriteriaId\":\"2253FDBF-228A-4D3F-ABF9-7AFF03207D99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:shift_4g_software:1.17.651.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB8920D7-3F96-4D13-BDFC-353E841BBE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:shift_4g_software:2.75.651.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28DA32A0-818E-4442-B22B-A9BEC5052D96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:shift_4g_software:2.75.651.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4407EE19-DE46-49BC-8CBA-D810B084EAD9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:htc:shift_4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2741C50D-A992-49D9-8FC5-A782AE65B0AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_3d_software:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.08.651.3\",\"matchCriteriaId\":\"8197CEE7-054D-4840-B67C-A25B44068A7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_3d_software:1.11.651.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77844462-3FA7-4C46-AFB5-61DD250711AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_3d_software:1.13.651.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F8636AB-44E1-4135-A13D-975E09812C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_3d_software:2.08.651.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"693681CD-E6E7-43D5-BC65-78828BDD4A6C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:htc:evo_3d:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8C77876-DC0F-42CB-B795-0BB5A0A7559A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:htc:evo_3d:gri40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04CE53C2-E91D-4E99-820A-D06BA1BBAAD3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_view_4g_software:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.22.651.2\",\"matchCriteriaId\":\"7DD5920B-2C35-47B7-A54B-05C214556404\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:evo_view_4g_software:1.22.651.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCF81B72-FC57-4979-A44E-CA1BDDE07910\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:htc:evo_view_4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDF0CF5D-A1CC-4703-9E93-04C7C8219CD4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:vivid_software:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.26.502\",\"matchCriteriaId\":\"91416F0F-82A0-42FA-831C-FF61ADFAE7EF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:htc:vivid:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"977B55E8-22F3-47A9-876D-D0E858118FC3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:hero_software:1.29.651.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7178F17C-1CEF-419F-B7D0-85145807C2BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:hero_software:1.56.651.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77BAD23A-A63F-47A4-9378-BA45A1327C48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:hero_software:2.27.651.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F01536FC-F034-47F8-951E-26C87B40B311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:hero_software:2.27.651.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FC961A5-EC4B-4D4B-8465-35C2CC104751\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:hero_software:2.31.651.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F56F7E-D65F-4532-8CE1-D434B5BAF8CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:htc:hero_software:2.32.651.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69E23E10-885D-4D8E-B98C-1007CD8C7AD9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:htc:hero:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831A21A7-B190-408D-B220-6A5A023725A7\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2012-04/0176.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/53187\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vsecurity.com/resources/advisory/20120420-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/75080\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2012-04/0176.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/53187\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vsecurity.com/resources/advisory/20120420-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/75080\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…