CVE-2014-3223 (GCVE-0-2014-3223)

Vulnerability from cvelistv5 – Published: 2017-04-02 20:00 – Updated: 2024-08-06 10:35
VLAI?
Summary
Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches.
Severity ?
No CVSS data available.
CWE
  • Y.1731
Assigner
References
Impacted products
Vendor Product Version
n/a S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03 Affected: S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:35:56.984Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/hw-329625"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03"
            }
          ]
        }
      ],
      "datePublic": "2017-03-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Y.1731",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-04-02T19:57:01",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/hw-329625"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2014-3223",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Y.1731"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/hw-329625",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/hw-329625"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2014-3223",
    "datePublished": "2017-04-02T20:00:00",
    "dateReserved": "2014-05-05T00:00:00",
    "dateUpdated": "2024-08-06T10:35:56.984Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9300_firmware:v100r006c00spc500:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"771FA881-8B73-4923-883E-6FB66DC5785B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9300_firmware:v100r006c00spc800:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFDF8C50-BB1B-494F-A66C-6AA43829A1F8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s3300_firmware:v100r006c00spc800:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C32CA848-E4C4-4F45-B770-B0F56B1D803C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s3300_firmware:v100r006c01spc100:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01778409-3E0D-457D-A3A8-7D547B154EF0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s3300_firmware:v100r006c03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C328054-3E5C-4122-AD5B-49A71791D7F6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s2300_firmware:v100r006c00spc800:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9B1ABFF-8054-47E2-A122-BBA45915EC4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s2300_firmware:v100r006c01spc100:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CBBAFAE-0988-4FB5-985F-D9F26F8FB590\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEFF6D05-BC82-4943-9D79-95CBEDD5CD2C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17566603-275F-4E6B-B5D9-4A716EEC03DC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5300_firmware:v100r006c00spc800:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C23B78BC-958A-4F7B-AC41-8F92573CD050\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5300_firmware:v100r006c01spc100:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F131E90-5381-4CC4-B98C-F127A7C9B24E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5300_firmware:v100r006c03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"554D3674-06D0-4B04-9014-F4A5178785DF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6300_firmware:v100r006c00spc800:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59483B72-F057-4274-8C88-FF908AB44F5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6300_firmware:v100r006c01spc100:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"073D332C-3532-4F1E-9885-B5EBFAD04D9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6300_firmware:v100r006c03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F133779-0AA7-468B-9470-075091872D5D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches.\"}, {\"lang\": \"es\", \"value\": \"Huawei S9300 con software en versiones anteriores a V100R006SPH013 y S2300,S3300,S5300,S6300 con software en versiones anteriores a V100R006SPH010 soporte Y.1731 y por lo tanto tener la vulnerabilidad Y.1731 en el procesamiento de paquetes especiales. Ta vulnerabilidad provoca el reinicio de los switches.\"}]",
      "id": "CVE-2014-3223",
      "lastModified": "2024-11-21T02:07:42.830",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2017-04-02T20:59:00.237",
      "references": "[{\"url\": \"http://www.huawei.com/en/psirt/security-advisories/hw-329625\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/hw-329625\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "psirt@huawei.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-19\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2014-3223\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2017-04-02T20:59:00.237\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches.\"},{\"lang\":\"es\",\"value\":\"Huawei S9300 con software en versiones anteriores a V100R006SPH013 y S2300,S3300,S5300,S6300 con software en versiones anteriores a V100R006SPH010 soporte Y.1731 y por lo tanto tener la vulnerabilidad Y.1731 en el procesamiento de paquetes especiales. Ta vulnerabilidad provoca el reinicio de los switches.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-19\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9300_firmware:v100r006c00spc500:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"771FA881-8B73-4923-883E-6FB66DC5785B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9300_firmware:v100r006c00spc800:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFDF8C50-BB1B-494F-A66C-6AA43829A1F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s3300_firmware:v100r006c00spc800:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C32CA848-E4C4-4F45-B770-B0F56B1D803C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s3300_firmware:v100r006c01spc100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01778409-3E0D-457D-A3A8-7D547B154EF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s3300_firmware:v100r006c03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C328054-3E5C-4122-AD5B-49A71791D7F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s2300_firmware:v100r006c00spc800:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9B1ABFF-8054-47E2-A122-BBA45915EC4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s2300_firmware:v100r006c01spc100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CBBAFAE-0988-4FB5-985F-D9F26F8FB590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEFF6D05-BC82-4943-9D79-95CBEDD5CD2C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17566603-275F-4E6B-B5D9-4A716EEC03DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5300_firmware:v100r006c00spc800:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C23B78BC-958A-4F7B-AC41-8F92573CD050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5300_firmware:v100r006c01spc100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F131E90-5381-4CC4-B98C-F127A7C9B24E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5300_firmware:v100r006c03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"554D3674-06D0-4B04-9014-F4A5178785DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6300_firmware:v100r006c00spc800:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59483B72-F057-4274-8C88-FF908AB44F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6300_firmware:v100r006c01spc100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073D332C-3532-4F1E-9885-B5EBFAD04D9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6300_firmware:v100r006c03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F133779-0AA7-468B-9470-075091872D5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/hw-329625\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/hw-329625\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…