FKIE_CVE-2012-0364
Vulnerability from fkie_nvd - Published: 2012-02-25 04:21 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco SRP 520 series devices with firmware before 1.1.26 and SRP 520W-U and 540 series devices with firmware before 1.2.4 allow remote attackers to replace the configuration file via an upload request to an unspecified URL, aka Bug ID CSCtw55495.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:small_business_srp520_series_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "453B5DA9-D1B9-4CD3-AE3F-A7C6E8821E4F",
"versionEndIncluding": "1.01.24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:small_business_srp520_series_firmware:1.01.01:*:*:*:*:*:*:*",
"matchCriteriaId": "2B17BD94-F5F8-43BF-AFAE-CDE5459DACDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:small_business_srp520_series_firmware:1.01.09:*:*:*:*:*:*:*",
"matchCriteriaId": "4597EDF6-B782-485A-BA25-2EAD0BCD5F7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:small_business_srp520_series_firmware:1.01.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C437EB08-05E7-4A21-AA47-618AFFEE96BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:small_business_srp520_series_firmware:1.01.19:*:*:*:*:*:*:*",
"matchCriteriaId": "14997944-79D3-4220-9623-2A70D988A180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:small_business_srp520_series_firmware:1.01.23:*:*:*:*:*:*:*",
"matchCriteriaId": "8FDDFB64-7F60-4AA1-B105-E9E042498798",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:small_business_srp521w:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0015C660-EE26-4CDF-BD7D-C72BFB9EAAE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:small_business_srp526w:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA0CB09-45C2-4BF0-B71F-9E7694A8CFD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:small_business_srp527w:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D93AFBA4-A13F-4FED-A16B-07FD4DAEF5BD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:small_business_srp520-u_series_firmware:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C7F14F70-D552-4F5F-AAEC-D1561677321E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:small_business_srp521w-u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5C2E99F-FD47-4EAB-B250-EBF1ADF5ECCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:small_business_srp526w-u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C87E7FFE-51AD-437B-9563-E02C833A7013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:small_business_srp527w-u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BA4EFE62-0B24-4873-983F-20D7C092532C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:small_business_srp540_series_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D807E61A-4509-42C4-804F-6928D85463A7",
"versionEndIncluding": "1.02.01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:small_business_srp540_series_firmware:1.02.00.023:*:*:*:*:*:*:*",
"matchCriteriaId": "6C361AF6-2A14-48FD-8ADB-0F702ECAF29F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:small_business_srp541w:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8731C711-919A-4956-9F23-3575B98D63C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:small_business_srp546w:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46DD8C08-0967-4E65-BB58-45FAFDE32F4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:small_business_srp547w:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD75516-8215-452E-8000-DB1D32D2CAA5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco SRP 520 series devices with firmware before 1.1.26 and SRP 520W-U and 540 series devices with firmware before 1.2.4 allow remote attackers to replace the configuration file via an upload request to an unspecified URL, aka Bug ID CSCtw55495."
},
{
"lang": "es",
"value": "Dispositivos de la serie Cisco SRP 520 con el firmware antes de v1.1.26 y dispositivos de la serie SRP 520W-U y 540 con el firmware anterior a v1.2.4 permite a atacantes remotos reemplazar el archivo de configuraci\u00f3n a trav\u00e9s de una petici\u00f3n de carga a una URL especificada, tambi\u00e9n conocido como Bug ID CSCtw55495."
}
],
"id": "CVE-2012-0364",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-02-25T04:21:42.167",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120223-srp500"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1026736"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120223-srp500"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1026736"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…