cve-2018-7994
Vulnerability from cvelistv5
Published
2018-07-31 14:00
Modified
2024-08-05 06:37
Severity ?
Summary
Some Huawei products IPS Module V500R001C50; NGFW Module V500R001C50; V500R002C10; NIP6300 V500R001C50; NIP6600 V500R001C50; NIP6800 V500R001C50; Secospace USG6600 V500R001C50; USG9500 V500R001C50 have a memory leak vulnerability. The software does not release allocated memory properly when processing Protal questionnaire. A remote attacker could send a lot questionnaires to the device, successful exploit could cause the device to reboot since running out of memory.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T06:37:59.640Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180704-01-firewall-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6600; USG9500",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "IPS Module V500R001C50"
            },
            {
              "status": "affected",
              "version": "NGFW Module V500R001C50"
            },
            {
              "status": "affected",
              "version": "V500R002C10"
            },
            {
              "status": "affected",
              "version": "NIP6300 V500R001C50"
            },
            {
              "status": "affected",
              "version": "NIP6600 V500R001C50"
            },
            {
              "status": "affected",
              "version": "NIP6800 V500R001C50"
            },
            {
              "status": "affected",
              "version": "Secospace USG6600 V500R001C50"
            },
            {
              "status": "affected",
              "version": "USG9500 V500R001C50"
            }
          ]
        }
      ],
      "datePublic": "2018-07-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Some Huawei products IPS Module V500R001C50; NGFW Module V500R001C50; V500R002C10; NIP6300 V500R001C50; NIP6600 V500R001C50; NIP6800 V500R001C50; Secospace USG6600 V500R001C50; USG9500 V500R001C50 have a memory leak vulnerability. The software does not release allocated memory properly when processing Protal questionnaire. A remote attacker could send a lot questionnaires to the device, successful exploit could cause the device to reboot since running out of memory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "memory leak",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-31T13:57:01",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180704-01-firewall-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2018-7994",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6600; USG9500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IPS Module V500R001C50"
                          },
                          {
                            "version_value": "NGFW Module V500R001C50"
                          },
                          {
                            "version_value": "V500R002C10"
                          },
                          {
                            "version_value": "NIP6300 V500R001C50"
                          },
                          {
                            "version_value": "NIP6600 V500R001C50"
                          },
                          {
                            "version_value": "NIP6800 V500R001C50"
                          },
                          {
                            "version_value": "Secospace USG6600 V500R001C50"
                          },
                          {
                            "version_value": "USG9500 V500R001C50"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Some Huawei products IPS Module V500R001C50; NGFW Module V500R001C50; V500R002C10; NIP6300 V500R001C50; NIP6600 V500R001C50; NIP6800 V500R001C50; Secospace USG6600 V500R001C50; USG9500 V500R001C50 have a memory leak vulnerability. The software does not release allocated memory properly when processing Protal questionnaire. A remote attacker could send a lot questionnaires to the device, successful exploit could cause the device to reboot since running out of memory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "memory leak"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180704-01-firewall-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180704-01-firewall-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2018-7994",
    "datePublished": "2018-07-31T14:00:00",
    "dateReserved": "2018-03-09T00:00:00",
    "dateUpdated": "2024-08-05T06:37:59.640Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ips_module:v500r001c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FD82635-8B95-498D-8AB7-1254F133B6DB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BAD43A3-730A-4ABC-89F0-DF93A06AA60F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ngfw_module:v500r001c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5314BBA-E919-45C1-BCF5-BC2D07E199CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ngfw_module:v500r002c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C433D71F-2631-458F-ACF3-0134D93D5C01\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:nip6300:v500r001c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94B5F4E5-0508-4491-9B84-FFAE79514419\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E054182-CE33-45E3-8595-159A75BA5162\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:nip6600:v500r001c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A297C6B-313D-483A-93D0-82DFD66C4FC9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE8CA649-7AE1-497C-869B-B4DD315F342C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:nip6800:v500r001c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8103D4D1-C933-4BF4-A0E2-F63C0A63DEAD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"875441DD-575F-4F4D-A6BD-23C38641D330\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:secospace_usg6600:v500r001c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52DEBDDA-79D1-4525-A59C-6D725B477FEB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE469876-F873-4705-9760-097AE840A818\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:usg9500:v500r001c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DCD7D64-F06A-4BA5-92CF-BBD0737E031B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B6064BB-5E62-4D70-B933-05B5426EEE9C\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Some Huawei products IPS Module V500R001C50; NGFW Module V500R001C50; V500R002C10; NIP6300 V500R001C50; NIP6600 V500R001C50; NIP6800 V500R001C50; Secospace USG6600 V500R001C50; USG9500 V500R001C50 have a memory leak vulnerability. The software does not release allocated memory properly when processing Protal questionnaire. A remote attacker could send a lot questionnaires to the device, successful exploit could cause the device to reboot since running out of memory.\"}, {\"lang\": \"es\", \"value\": \"Algunos productos Huawei IPS Module V500R001C50; NGFW Module V500R001C50; V500R002C10; NIP6300 V500R001C50; NIP6600 V500R001C50; NIP6800 V500R001C50; Secospace USG6600 V500R001C50; USG9500 V500R001C50 tienen una vulnerabilidad de filtrado de memoria. El software no libera la memoria asignada correctamente al procesar el cuestionario Protal. Un atacante remoto podr\\u00eda enviar muchos cuestionarios al dispositivo; su explotaci\\u00f3n con \\u00e9xito podr\\u00eda provocar que el dispositivo se reinicie, ya que se quedar\\u00eda sin memoria.\"}]",
      "id": "CVE-2018-7994",
      "lastModified": "2024-11-21T04:13:02.963",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2018-07-31T14:29:01.167",
      "references": "[{\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180704-01-firewall-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180704-01-firewall-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "psirt@huawei.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-772\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2018-7994\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2018-07-31T14:29:01.167\",\"lastModified\":\"2024-11-21T04:13:02.963\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Some Huawei products IPS Module V500R001C50; NGFW Module V500R001C50; V500R002C10; NIP6300 V500R001C50; NIP6600 V500R001C50; NIP6800 V500R001C50; Secospace USG6600 V500R001C50; USG9500 V500R001C50 have a memory leak vulnerability. The software does not release allocated memory properly when processing Protal questionnaire. A remote attacker could send a lot questionnaires to the device, successful exploit could cause the device to reboot since running out of memory.\"},{\"lang\":\"es\",\"value\":\"Algunos productos Huawei IPS Module V500R001C50; NGFW Module V500R001C50; V500R002C10; NIP6300 V500R001C50; NIP6600 V500R001C50; NIP6800 V500R001C50; Secospace USG6600 V500R001C50; USG9500 V500R001C50 tienen una vulnerabilidad de filtrado de memoria. El software no libera la memoria asignada correctamente al procesar el cuestionario Protal. Un atacante remoto podr\u00eda enviar muchos cuestionarios al dispositivo; su explotaci\u00f3n con \u00e9xito podr\u00eda provocar que el dispositivo se reinicie, ya que se quedar\u00eda sin memoria.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-772\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ips_module:v500r001c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FD82635-8B95-498D-8AB7-1254F133B6DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BAD43A3-730A-4ABC-89F0-DF93A06AA60F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ngfw_module:v500r001c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5314BBA-E919-45C1-BCF5-BC2D07E199CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ngfw_module:v500r002c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C433D71F-2631-458F-ACF3-0134D93D5C01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:nip6300:v500r001c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94B5F4E5-0508-4491-9B84-FFAE79514419\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E054182-CE33-45E3-8595-159A75BA5162\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:nip6600:v500r001c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A297C6B-313D-483A-93D0-82DFD66C4FC9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE8CA649-7AE1-497C-869B-B4DD315F342C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:nip6800:v500r001c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8103D4D1-C933-4BF4-A0E2-F63C0A63DEAD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"875441DD-575F-4F4D-A6BD-23C38641D330\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6600:v500r001c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52DEBDDA-79D1-4525-A59C-6D725B477FEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE469876-F873-4705-9760-097AE840A818\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:usg9500:v500r001c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DCD7D64-F06A-4BA5-92CF-BBD0737E031B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B6064BB-5E62-4D70-B933-05B5426EEE9C\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180704-01-firewall-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180704-01-firewall-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.