CVE-2012-3018 (GCVE-0-2012-3018)
Vulnerability from cvelistv5 – Published: 2012-07-31 10:00 – Updated: 2024-09-16 19:57
VLAI?
Summary
The lockout-recovery feature in the Security Configurator component in ICONICS GENESIS32 9.22 and earlier and BizViz 9.22 and earlier uses an improper encryption algorithm for generation of an authentication code, which allows local users to bypass intended access restrictions and obtain administrative access by predicting a challenge response.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:50:05.589Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-01.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The lockout-recovery feature in the Security Configurator component in ICONICS GENESIS32 9.22 and earlier and BizViz 9.22 and earlier uses an improper encryption algorithm for generation of an authentication code, which allows local users to bypass intended access restrictions and obtain administrative access by predicting a challenge response."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-07-31T10:00:00Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-01.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2012-3018",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The lockout-recovery feature in the Security Configurator component in ICONICS GENESIS32 9.22 and earlier and BizViz 9.22 and earlier uses an improper encryption algorithm for generation of an authentication code, which allows local users to bypass intended access restrictions and obtain administrative access by predicting a challenge response."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-01.pdf",
"refsource": "MISC",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-01.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2012-3018",
"datePublished": "2012-07-31T10:00:00Z",
"dateReserved": "2012-05-30T00:00:00Z",
"dateUpdated": "2024-09-16T19:57:03.646Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:genesis32:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"9.22\", \"matchCriteriaId\": \"5648CCCB-E3B4-4649-BF80-0CBBFF8D25ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:genesis32:8.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DFC8F6B-B298-49A3-BBD8-CDA74785AC0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:genesis32:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E01069E-E059-446B-A0C5-89C37C902D3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:genesis32:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02BE61E1-12E1-46B3-B725-9A73EAD272B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:genesis32:9.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7784C58-C8CF-4631-8171-67D95595FF79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:genesis32:9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F303667-A48E-40D2-9C38-C9C2813020AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:genesis32:9.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86628D9D-4270-4571-A57A-17962BC2027D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:genesis32:9.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EFFA7EA-6775-44B8-88ED-D1B6E4AE259A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:genesis32:9.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CDD1388-8FBF-4B3E-854E-B68D3EB6569B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:bizviz:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"9.22\", \"matchCriteriaId\": \"09717E94-3D2C-48E9-A267-4E75D2F343AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:bizviz:8.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BEF3187-A001-4604-A292-6192678B2AB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:bizviz:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2854F716-ED09-46E8-AF9C-030EADDDB29F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:bizviz:9.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3214375-3D3A-47F9-BE1F-D92102A8C8F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:bizviz:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0585FE5D-0FA5-4E13-AA5E-B5714564A14C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:bizviz:9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E4B6521-EE6D-49FB-B771-830B34613007\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:bizviz:9.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22060866-9121-480B-913A-41616CD94A27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:bizviz:9.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"278C55AD-294C-4D39-8E50-0726CA523A34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iconics:bizviz:9.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B4F2D10-A4DD-4C7C-A5A8-BEDC23A413C2\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The lockout-recovery feature in the Security Configurator component in ICONICS GENESIS32 9.22 and earlier and BizViz 9.22 and earlier uses an improper encryption algorithm for generation of an authentication code, which allows local users to bypass intended access restrictions and obtain administrative access by predicting a challenge response.\"}, {\"lang\": \"es\", \"value\": \"La caracter\\u00edstica lockout-recovery en el componente Security Configurator en ICONICS GENESIS32 v9.22 y anteriores y BizViz v9.22 y anteior usa un algoritmo de cifrado inadecuado para la generaci\\u00f3n de c\\u00f3digo de autenticaci\\u00f3n, lo que permite a usuarios locales evitar las restricciones de acceso establecidas y obtener acceso administrativo prediciendo la respuesta a la solicitud.\"}]",
"id": "CVE-2012-3018",
"lastModified": "2024-11-21T01:40:07.967",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.4, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.4, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2012-07-31T10:45:42.467",
"references": "[{\"url\": \"http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-01.pdf\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-01.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}]",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-310\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2012-3018\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2012-07-31T10:45:42.467\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The lockout-recovery feature in the Security Configurator component in ICONICS GENESIS32 9.22 and earlier and BizViz 9.22 and earlier uses an improper encryption algorithm for generation of an authentication code, which allows local users to bypass intended access restrictions and obtain administrative access by predicting a challenge response.\"},{\"lang\":\"es\",\"value\":\"La caracter\u00edstica lockout-recovery en el componente Security Configurator en ICONICS GENESIS32 v9.22 y anteriores y BizViz v9.22 y anteior usa un algoritmo de cifrado inadecuado para la generaci\u00f3n de c\u00f3digo de autenticaci\u00f3n, lo que permite a usuarios locales evitar las restricciones de acceso establecidas y obtener acceso administrativo prediciendo la respuesta a la solicitud.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":4.4,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:genesis32:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.22\",\"matchCriteriaId\":\"5648CCCB-E3B4-4649-BF80-0CBBFF8D25ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:genesis32:8.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DFC8F6B-B298-49A3-BBD8-CDA74785AC0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:genesis32:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E01069E-E059-446B-A0C5-89C37C902D3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:genesis32:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02BE61E1-12E1-46B3-B725-9A73EAD272B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:genesis32:9.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7784C58-C8CF-4631-8171-67D95595FF79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:genesis32:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F303667-A48E-40D2-9C38-C9C2813020AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:genesis32:9.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86628D9D-4270-4571-A57A-17962BC2027D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:genesis32:9.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EFFA7EA-6775-44B8-88ED-D1B6E4AE259A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:genesis32:9.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CDD1388-8FBF-4B3E-854E-B68D3EB6569B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:bizviz:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.22\",\"matchCriteriaId\":\"09717E94-3D2C-48E9-A267-4E75D2F343AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:bizviz:8.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BEF3187-A001-4604-A292-6192678B2AB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:bizviz:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2854F716-ED09-46E8-AF9C-030EADDDB29F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:bizviz:9.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3214375-3D3A-47F9-BE1F-D92102A8C8F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:bizviz:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0585FE5D-0FA5-4E13-AA5E-B5714564A14C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:bizviz:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4B6521-EE6D-49FB-B771-830B34613007\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:bizviz:9.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22060866-9121-480B-913A-41616CD94A27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:bizviz:9.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"278C55AD-294C-4D39-8E50-0726CA523A34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:bizviz:9.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B4F2D10-A4DD-4C7C-A5A8-BEDC23A413C2\"}]}]}],\"references\":[{\"url\":\"http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-01.pdf\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-01.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…