Action not permitted
Modal body text goes here.
jvndb-2023-000029
Vulnerability from jvndb
Published
2023-03-31 15:54
Modified
2024-05-27 17:08
Severity ?
Summary
Multiple vulnerabilities in Seiko Solutions SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210
Details
SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210 provided by Seiko Solutions Inc. contain multiple vulnerabilities listed below.
<ul>
<li>Exposure of sensitive information to an unauthorized actor (CWE-200) - CVE-2016-2183
<li>Command injection (CWE-77) - CVE-2022-36556
<li>Unrestricted upload of file with dangerous type (CWE-434) - CVE-2022-36557
<li>Use of hard-coded credentials (CWE-798) - CVE-2022-36558
<li>Command injection (CWE-77) - CVE-2022-36559
<li>Use of hard-coded credentials (CWE-798) - CVE-2022-36560
<li>Improper privilege management (CWE-269) - CVE-2023-22361
<li>Missing authentication for critical function (CWE-306) - CVE-2023-22441
<li>Improper access control (CWE-284) - CVE-2023-23578
<li>Improper following of a certificate's chain of trust (CWE-296) - CVE-2023-23901
<li>Missing authentication for critical function (CWE-306) - CVE-2023-23906
<li>Cleartext storage of sensitive information (CWE-312) - CVE-2023-24586
<li>Cleartext transmission of sensitive information (CWE-319) - CVE-2023-25070
<li>Use of weak credentials (CWE-1391) - CVE-2023-25072
<li>Use of weak credentials (CWE-1391) - CVE-2023-25184
</ul>
The developer states that attacks exploiting CVE-2022-36556 have been observed.
CVE-2023-22441
MASAHIRO IIDA of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2016-2183, CVE-2022-36556, CVE-2022-36557, CVE-2022-36558, CVE-2022-36559, CVE-2022-36560, CVE-2023-22361, CVE-2023-23578, CVE-2023-23901, CVE-2023-23906, CVE-2023-24586, CVE-2023-25070, CVE-2023-25072, CVE-2023-25184
Thomas J. Knudsen and Samy Younsi of NeroTeam Security Labs reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000029.html", "dc:date": "2024-05-27T17:08+09:00", "dcterms:issued": "2023-03-31T15:54+09:00", "dcterms:modified": "2024-05-27T17:08+09:00", "description": "SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210 provided by Seiko Solutions Inc. contain multiple vulnerabilities listed below.\r\n\u003cul\u003e\r\n\u003cli\u003eExposure of sensitive information to an unauthorized actor (CWE-200) - CVE-2016-2183\r\n\u003cli\u003eCommand injection (CWE-77) - CVE-2022-36556\r\n\u003cli\u003eUnrestricted upload of file with dangerous type (CWE-434) - CVE-2022-36557\r\n\u003cli\u003eUse of hard-coded credentials (CWE-798) - CVE-2022-36558\r\n\u003cli\u003eCommand injection (CWE-77) - CVE-2022-36559\r\n\u003cli\u003eUse of hard-coded credentials (CWE-798) - CVE-2022-36560\r\n\u003cli\u003eImproper privilege management (CWE-269) - CVE-2023-22361\r\n\u003cli\u003eMissing authentication for critical function (CWE-306) - CVE-2023-22441\r\n\u003cli\u003eImproper access control (CWE-284) - CVE-2023-23578\r\n\u003cli\u003eImproper following of a certificate\u0027s chain of trust (CWE-296) - CVE-2023-23901\r\n\u003cli\u003eMissing authentication for critical function (CWE-306) - CVE-2023-23906\r\n\u003cli\u003eCleartext storage of sensitive information (CWE-312) - CVE-2023-24586\r\n\u003cli\u003eCleartext transmission of sensitive information (CWE-319) - CVE-2023-25070\r\n\u003cli\u003eUse of weak credentials (CWE-1391) - CVE-2023-25072\r\n\u003cli\u003eUse of weak credentials (CWE-1391) - CVE-2023-25184\r\n\u003c/ul\u003e\r\nThe developer states that attacks exploiting CVE-2022-36556 have been observed.\r\n\r\n\r\nCVE-2023-22441\r\nMASAHIRO IIDA of LAC Co., Ltd. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.\r\n\r\nCVE-2016-2183, CVE-2022-36556, CVE-2022-36557, CVE-2022-36558, CVE-2022-36559, CVE-2022-36560, CVE-2023-22361, CVE-2023-23578, CVE-2023-23901, CVE-2023-23906, CVE-2023-24586, CVE-2023-25070, CVE-2023-25072, CVE-2023-25184\r\nThomas J. Knudsen and Samy Younsi of NeroTeam Security Labs reported these vulnerabilities to JPCERT/CC.\r\nJPCERT/CC coordinated with the developer.", "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000029.html", "sec:cpe": [ { "#text": "cpe:/o:seiko-sol:skybridge_basic_mb-a130_firmware", "@product": "SkyBridge BASIC MB-A130 firmware", "@vendor": "Seiko Solutions Inc.", "@version": "2.2" }, { "#text": "cpe:/o:seiko-sol:skybridge_mb-a100_firmware", "@product": "SkyBridge MB-A100 firmware", "@vendor": "Seiko Solutions Inc.", "@version": "2.2" }, { "#text": "cpe:/o:seiko-sol:skybridge_mb-a110_firmware", "@product": "SkyBridge MB-A110 firmware", "@vendor": "Seiko Solutions Inc.", "@version": "2.2" }, { "#text": "cpe:/o:seiko-sol:skybridge_mb-a200_firmware", "@product": "SkyBridge MB-A200 firmware", "@vendor": "Seiko Solutions Inc.", "@version": "2.2" }, { "#text": "cpe:/o:seiko-sol:skyspider_mb-r210_firmware", "@product": "SkySpider MB-R210 firmware", "@vendor": "Seiko Solutions Inc.", "@version": "2.2" } ], "sec:cvss": [ { "@score": "9.0", "@severity": "High", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:P/A:C", "@version": "2.0" }, { "@score": "8.6", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "@version": "3.0" } ], "sec:identifier": "JVNDB-2023-000029", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN40604023/index.html", "@id": "JVN#40604023", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-22361", "@id": "CVE-2023-22361", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-22441", "@id": "CVE-2023-22441", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-23578", "@id": "CVE-2023-23578", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-23901", "@id": "CVE-2023-23901", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-23906", "@id": "CVE-2023-23906", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-24586", "@id": "CVE-2023-24586", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-25070", "@id": "CVE-2023-25070", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-25072", "@id": "CVE-2023-25072", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-25184", "@id": "CVE-2023-25184", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2016-2183", "@id": "CVE-2016-2183", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-36556", "@id": "CVE-2022-36556", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-36557", "@id": "CVE-2022-36557", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-36558", "@id": "CVE-2022-36558", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-36559", "@id": "CVE-2022-36559", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-36560", "@id": "CVE-2022-36560", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183", "@id": "CVE-2016-2183", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-36556", "@id": "CVE-2022-36556", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-36557", "@id": "CVE-2022-36557", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-36558", "@id": "CVE-2022-36558", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-36559", "@id": "CVE-2022-36559", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-36560", "@id": "CVE-2022-36560", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-22361", "@id": "CVE-2023-22361", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-22441", "@id": "CVE-2023-22441", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-23578", "@id": "CVE-2023-23578", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-23901", "@id": "CVE-2023-23901", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-23906", "@id": "CVE-2023-23906", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-24586", "@id": "CVE-2023-24586", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-25070", "@id": "CVE-2023-25070", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-25072", "@id": "CVE-2023-25072", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-25184", "@id": "CVE-2023-25184", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-200", "@title": "Information Exposure(CWE-200)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-264", "@title": "Permissions(CWE-264)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-287", "@title": "Improper Authentication(CWE-287)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "Multiple vulnerabilities in Seiko Solutions SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210" }
cve-2023-25184
Vulnerability from cvelistv5
Published
2023-05-10 00:00
Modified
2024-08-02 11:18
Severity ?
EPSS score ?
Summary
Use of weak credentials exists in Seiko Solutions SkyBridge and SkySpider series, which may allow a remote unauthenticated attacker to decrypt password for the WebUI of the product. Affected products and versions are as follows: SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier, and SkySpider MB-R210 firmware Ver. 1.01.00 and earlier.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:18:36.052Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN40604023/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SkyBridge MB-A200, SkyBridge BASIC MB-A130, and SkySpider MB-R210", "vendor": "Seiko Solutions Inc.", "versions": [ { "status": "affected", "version": "SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier, and SkySpider MB-R210 firmware Ver. 1.01.00 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Use of weak credentials exists in Seiko Solutions SkyBridge and SkySpider series, which may allow a remote unauthenticated attacker to decrypt password for the WebUI of the product. Affected products and versions are as follows: SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier, and SkySpider MB-R210 firmware Ver. 1.01.00 and earlier." } ], "problemTypes": [ { "descriptions": [ { "description": "Use of weak credentials", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-10T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "url": "https://jvn.jp/en/jp/JVN40604023/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-25184", "datePublished": "2023-05-10T00:00:00", "dateReserved": "2023-03-15T00:00:00", "dateUpdated": "2024-08-02T11:18:36.052Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36560
Vulnerability from cvelistv5
Published
2022-08-29 22:46
Modified
2024-08-03 10:07
Severity ?
EPSS score ?
Summary
Seiko SkyBridge MB-A200 v01.00.04 and below was discovered to contain multiple hard-coded passcodes for root. Attackers are able to access the passcodes at /etc/srapi/config/system.conf and /usr/sbin/ssol-sshd.sh.
References
▼ | URL | Tags |
---|---|---|
https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e | x_refsource_MISC | |
https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:07:34.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Seiko SkyBridge MB-A200 v01.00.04 and below was discovered to contain multiple hard-coded passcodes for root. Attackers are able to access the passcodes at /etc/srapi/config/system.conf and /usr/sbin/ssol-sshd.sh." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-29T22:46:22", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-36560", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Seiko SkyBridge MB-A200 v01.00.04 and below was discovered to contain multiple hard-coded passcodes for root. Attackers are able to access the passcodes at /etc/srapi/config/system.conf and /usr/sbin/ssol-sshd.sh." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e", "refsource": "MISC", "url": "https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e" }, { "name": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/", "refsource": "MISC", "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-36560", "datePublished": "2022-08-29T22:46:22", "dateReserved": "2022-07-25T00:00:00", "dateUpdated": "2024-08-03T10:07:34.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25070
Vulnerability from cvelistv5
Published
2023-05-10 00:00
Modified
2024-08-02 11:11
Severity ?
EPSS score ?
Summary
Cleartext transmission of sensitive information exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier. If the telnet connection is enabled, a remote unauthenticated attacker may eavesdrop on or alter the administrator's communication to the product.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Seiko Solutions Inc. | SkyBridge MB-A100/110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:11:43.918Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN40604023/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SkyBridge MB-A100/110", "vendor": "Seiko Solutions Inc.", "versions": [ { "status": "affected", "version": "firmware Ver. 4.2.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier. If the telnet connection is enabled, a remote unauthenticated attacker may eavesdrop on or alter the administrator\u0027s communication to the product." } ], "problemTypes": [ { "descriptions": [ { "description": "Cleartext transmission of sensitive information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-10T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "url": "https://jvn.jp/en/jp/JVN40604023/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-25070", "datePublished": "2023-05-10T00:00:00", "dateReserved": "2023-03-15T00:00:00", "dateUpdated": "2024-08-02T11:11:43.918Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22441
Vulnerability from cvelistv5
Published
2023-05-10 00:00
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
Missing authentication for critical function exists in Seiko Solutions SkyBridge series, which may allow a remote attacker to obtain or alter the setting information of the product or execute some critical functions without authentication, e.g., rebooting the product. Affected products and versions are as follows: SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, and SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN40604023/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SkyBridge MB-A200 and SkyBridge BASIC MB-A130", "vendor": "Seiko Solutions Inc.", "versions": [ { "status": "affected", "version": "SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, and SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Missing authentication for critical function exists in Seiko Solutions SkyBridge series, which may allow a remote attacker to obtain or alter the setting information of the product or execute some critical functions without authentication, e.g., rebooting the product. Affected products and versions are as follows: SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, and SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier" } ], "problemTypes": [ { "descriptions": [ { "description": "Missing authentication for critical function", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-10T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "url": "https://jvn.jp/en/jp/JVN40604023/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-22441", "datePublished": "2023-05-10T00:00:00", "dateReserved": "2023-03-15T00:00:00", "dateUpdated": "2024-08-02T10:07:06.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25072
Vulnerability from cvelistv5
Published
2023-05-10 00:00
Modified
2024-08-02 11:11
Severity ?
EPSS score ?
Summary
Use of weak credentials exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote unauthenticated attacker to decrypt password for the WebUI of the product.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Seiko Solutions Inc. | SkyBridge MB-A100/110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:11:43.430Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN40604023/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SkyBridge MB-A100/110", "vendor": "Seiko Solutions Inc.", "versions": [ { "status": "affected", "version": "firmware Ver. 4.2.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Use of weak credentials exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote unauthenticated attacker to decrypt password for the WebUI of the product." } ], "problemTypes": [ { "descriptions": [ { "description": "Use of weak credentials", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-10T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "url": "https://jvn.jp/en/jp/JVN40604023/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-25072", "datePublished": "2023-05-10T00:00:00", "dateReserved": "2023-03-15T00:00:00", "dateUpdated": "2024-08-02T11:11:43.430Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36557
Vulnerability from cvelistv5
Published
2022-08-29 22:46
Modified
2024-08-03 10:07
Severity ?
EPSS score ?
Summary
Seiko SkyBridge MB-A100/A110 v4.2.0 and below was discovered to contain an arbitrary file upload vulnerability via the restore backup function. This vulnerability allows attackers to execute arbitrary code via a crafted html file.
References
▼ | URL | Tags |
---|---|---|
https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54 | x_refsource_MISC | |
https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:07:34.470Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Seiko SkyBridge MB-A100/A110 v4.2.0 and below was discovered to contain an arbitrary file upload vulnerability via the restore backup function. This vulnerability allows attackers to execute arbitrary code via a crafted html file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-29T22:46:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-36557", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Seiko SkyBridge MB-A100/A110 v4.2.0 and below was discovered to contain an arbitrary file upload vulnerability via the restore backup function. This vulnerability allows attackers to execute arbitrary code via a crafted html file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54", "refsource": "MISC", "url": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54" }, { "name": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/", "refsource": "MISC", "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-36557", "datePublished": "2022-08-29T22:46:20", "dateReserved": "2022-07-25T00:00:00", "dateUpdated": "2024-08-03T10:07:34.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23901
Vulnerability from cvelistv5
Published
2023-05-10 00:00
Modified
2024-08-02 10:42
Severity ?
EPSS score ?
Summary
Improper following of a certificate's chain of trust exists in SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, and SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier, which may allow a remote unauthenticated attacker to eavesdrop on or alter the communication sent to the WebUI of the product.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:42:27.068Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN40604023/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SkyBridge MB-A200 and SkyBridge BASIC MB-A130", "vendor": "Seiko Solutions Inc.", "versions": [ { "status": "affected", "version": "SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, and SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper following of a certificate\u0027s chain of trust exists in SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, and SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier, which may allow a remote unauthenticated attacker to eavesdrop on or alter the communication sent to the WebUI of the product." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper following of a certificate\u0027s chain of trust", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-10T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "url": "https://jvn.jp/en/jp/JVN40604023/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-23901", "datePublished": "2023-05-10T00:00:00", "dateReserved": "2023-03-15T00:00:00", "dateUpdated": "2024-08-02T10:42:27.068Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36558
Vulnerability from cvelistv5
Published
2022-08-29 22:46
Modified
2024-08-03 10:07
Severity ?
EPSS score ?
Summary
Seiko SkyBridge MB-A100/A110 v4.2.0 and below implements a hard-coded passcode for the root account. Attackers are able to access the passcord via the file /etc/ciel.cfg.
References
▼ | URL | Tags |
---|---|---|
https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54 | x_refsource_MISC | |
https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:07:34.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Seiko SkyBridge MB-A100/A110 v4.2.0 and below implements a hard-coded passcode for the root account. Attackers are able to access the passcord via the file /etc/ciel.cfg." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-29T22:46:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-36558", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Seiko SkyBridge MB-A100/A110 v4.2.0 and below implements a hard-coded passcode for the root account. Attackers are able to access the passcord via the file /etc/ciel.cfg." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54", "refsource": "MISC", "url": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54" }, { "name": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/", "refsource": "MISC", "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-36558", "datePublished": "2022-08-29T22:46:21", "dateReserved": "2022-07-25T00:00:00", "dateUpdated": "2024-08-03T10:07:34.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36556
Vulnerability from cvelistv5
Published
2022-08-29 22:46
Modified
2024-08-03 10:07
Severity ?
EPSS score ?
Summary
Seiko SkyBridge MB-A100/A110 v4.2.0 and below was discovered to contain a command injection vulnerability via the ipAddress parameter at 07system08execute_ping_01.
References
▼ | URL | Tags |
---|---|---|
https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54 | x_refsource_MISC | |
https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:07:34.530Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Seiko SkyBridge MB-A100/A110 v4.2.0 and below was discovered to contain a command injection vulnerability via the ipAddress parameter at 07system08execute_ping_01." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-29T22:46:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-36556", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Seiko SkyBridge MB-A100/A110 v4.2.0 and below was discovered to contain a command injection vulnerability via the ipAddress parameter at 07system08execute_ping_01." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54", "refsource": "MISC", "url": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54" }, { "name": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/", "refsource": "MISC", "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-36556", "datePublished": "2022-08-29T22:46:19", "dateReserved": "2022-07-25T00:00:00", "dateUpdated": "2024-08-03T10:07:34.530Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2183
Vulnerability from cvelistv5
Published
2016-09-01 00:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.753Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2017:3113", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3113" }, { "name": "RHSA-2017:0338", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/tns-2016-20" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03765en_us" }, { "name": "GLSA-201612-16", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-16" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" }, { "tags": [ "x_transferred" ], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415" }, { "name": "RHSA-2017:3240", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3240" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/tns-2016-16" }, { "name": "RHSA-2017:2709", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2709" }, { "name": "92630", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92630" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/tns-2016-21" }, { "tags": [ "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10171" }, { "name": "RHSA-2017:3239", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3239" }, { "name": "42091", "tags": [ "exploit", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/42091/" }, { "name": "GLSA-201701-65", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "name": "1036696", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036696" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20160915-0001/" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us" }, { "name": "GLSA-201707-01", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "name": "95568", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/95568" }, { "name": "RHSA-2017:3114", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3114" }, { "tags": [ "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa133" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/tns-2017-09" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116" }, { "name": "RHSA-2017:1216", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "tags": [ "x_transferred" ], "url": "https://wiki.opendaylight.org/view/Security_Advisories" }, { "name": "RHSA-2017:2710", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2710" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984" }, { "name": "[tls] 20091120 RC4+3DES rekeying - long-lived TLS connections", "tags": [ "mailing-list", "x_transferred" ], "url": "https://www.ietf.org/mail-archive/web/tls/current/msg04560.html" }, { "name": "RHSA-2018:2123", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2123" }, { "name": "RHSA-2017:0337", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "name": "RHSA-2017:2708", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2708" }, { "name": "RHSA-2017:0336", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "name": "SUSE-SU-2016:2470", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388" }, { "name": "RHSA-2017:0462", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0462.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448" }, { "tags": [ "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759" }, { "tags": [ "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10215" }, { "name": "SUSE-SU-2017:2700", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" }, { "name": "20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/540341/100/0/threaded" }, { "name": "USN-3087-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3087-1" }, { "name": "SUSE-SU-2016:2469", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05385680" }, { "name": "openSUSE-SU-2016:2537", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" }, { "name": "20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded" }, { "name": "USN-3087-2", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3087-2" }, { "name": "20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded" }, { "tags": [ "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10197" }, { "tags": [ "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10186" }, { "name": "SUSE-SU-2017:2699", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" }, { "name": "20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05390849" }, { "name": "openSUSE-SU-2016:2407", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" }, { "tags": [ "x_transferred" ], "url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613" }, { "name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Jul/31" }, { "name": "USN-3194-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3194-1" }, { "name": "SUSE-SU-2016:2458", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" }, { "name": "20181113 [security bulletin] MFSBGN03831 rev. - Service Management Automation, remote disclosure of information", "tags": [ "mailing-list", "x_transferred" ], "url": "https://seclists.org/bugtraq/2018/Nov/21" }, { "tags": [ "x_transferred" ], "url": "https://support.f5.com/csp/article/K13167034" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05390722" }, { "name": "20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/542005/100/0/threaded" }, { "name": "DSA-3673", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3673" }, { "name": "openSUSE-SU-2016:2391", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" }, { "name": "USN-3372-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3372-1" }, { "name": "openSUSE-SU-2018:0458", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" }, { "name": "SUSE-SU-2017:0460", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" }, { "name": "SUSE-SU-2017:0490", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" }, { "name": "USN-3270-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3270-1" }, { "name": "20170214 [security bulletin] HPESBGN03697 rev.1 - HPE Business Service Management (BSM), Remote Disclosure of Information", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded" }, { "tags": [ "x_transferred" ], "url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178" }, { "name": "SUSE-SU-2016:2387", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" }, { "name": "20170529 SSD Advisory - IBM Informix Dynamic Server and Informix Open Admin Tool Multiple Vulnerabilities", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/May/105" }, { "name": "openSUSE-SU-2017:0513", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05302448" }, { "name": "20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/539885/100/0/threaded" }, { "name": "openSUSE-SU-2017:0374", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05369415" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html" }, { "name": "SUSE-SU-2016:2468", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" }, { "name": "SUSE-SU-2017:0346", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" }, { "name": "openSUSE-SU-2016:2496", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" }, { "name": "USN-3198-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3198-1" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/May/105" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05369403" }, { "name": "20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/541104/100/0/threaded" }, { "name": "SUSE-SU-2017:1444", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" }, { "name": "SUSE-SU-2016:2394", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" }, { "name": "20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded" }, { "name": "USN-3179-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3179-1" }, { "tags": [ "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en" }, { "name": "RHSA-2019:1245", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1245" }, { "name": "RHSA-2019:2859", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2859" }, { "name": "RHSA-2020:0451", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0451" }, { "tags": [ "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10310" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "tags": [ "x_transferred" ], "url": "https://sweet32.info/" }, { "tags": [ "x_transferred" ], "url": "http://www.splunk.com/view/SP-CAAAPUE" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383" }, { "tags": [ "x_transferred" ], "url": "https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/articles/2548661" }, { "tags": [ "x_transferred" ], "url": "https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue" }, { "tags": [ "x_transferred" ], "url": "http://www.splunk.com/view/SP-CAAAPSV" }, { "tags": [ "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633" }, { "tags": [ "x_transferred" ], "url": "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/" }, { "tags": [ "x_transferred" ], "url": "https://www.sigsac.org/ccs/CCS2016/accepted-papers/" }, { "tags": [ "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21991482" }, { "tags": [ "x_transferred" ], "url": "https://www.openssl.org/blog/blog/2016/08/24/sweet32/" }, { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2016-2183" }, { "tags": [ "x_transferred" ], "url": "https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/" }, { "tags": [ "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html" }, { "tags": [ "x_transferred" ], "url": "https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/" }, { "tags": [ "x_transferred" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008" }, { "tags": [ "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2017:3113", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3113" }, { "name": "RHSA-2017:0338", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "url": "https://www.tenable.com/security/tns-2016-20" }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03765en_us" }, { "name": "GLSA-201612-16", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201612-16" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" }, { "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415" }, { "name": "RHSA-2017:3240", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3240" }, { "url": "https://www.tenable.com/security/tns-2016-16" }, { "name": "RHSA-2017:2709", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2709" }, { "name": "92630", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/92630" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499" }, { "url": "https://www.tenable.com/security/tns-2016-21" }, { "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10171" }, { "name": "RHSA-2017:3239", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3239" }, { "name": "42091", "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/42091/" }, { "name": "GLSA-201701-65", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "name": "1036696", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1036696" }, { "url": "https://security.netapp.com/advisory/ntap-20160915-0001/" }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us" }, { "name": "GLSA-201707-01", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "name": "95568", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/95568" }, { "name": "RHSA-2017:3114", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3114" }, { "url": "https://bto.bluecoat.com/security-advisory/sa133" }, { "url": "https://www.tenable.com/security/tns-2017-09" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116" }, { "name": "RHSA-2017:1216", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "url": "https://wiki.opendaylight.org/view/Security_Advisories" }, { "name": "RHSA-2017:2710", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2710" }, { "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984" }, { "name": "[tls] 20091120 RC4+3DES rekeying - long-lived TLS connections", "tags": [ "mailing-list" ], "url": "https://www.ietf.org/mail-archive/web/tls/current/msg04560.html" }, { "name": "RHSA-2018:2123", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2123" }, { "name": "RHSA-2017:0337", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "name": "RHSA-2017:2708", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2708" }, { "name": "RHSA-2017:0336", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "name": "SUSE-SU-2016:2470", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388" }, { "name": "RHSA-2017:0462", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0462.html" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448" }, { "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759" }, { "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10215" }, { "name": "SUSE-SU-2017:2700", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" }, { "name": "20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities", "tags": [ "mailing-list" ], "url": "http://www.securityfocus.com/archive/1/540341/100/0/threaded" }, { "name": "USN-3087-1", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-3087-1" }, { "name": "SUSE-SU-2016:2469", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05385680" }, { "name": "openSUSE-SU-2016:2537", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" }, { "name": "20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information", "tags": [ "mailing-list" ], "url": "http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded" }, { "name": "USN-3087-2", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-3087-2" }, { "name": "20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information", "tags": [ "mailing-list" ], "url": "http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded" }, { "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10197" }, { "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10186" }, { "name": "SUSE-SU-2017:2699", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" }, { "name": "20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information", "tags": [ "mailing-list" ], "url": "http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded" }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05390849" }, { "name": "openSUSE-SU-2016:2407", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" }, { "url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613" }, { "name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2017/Jul/31" }, { "name": "USN-3194-1", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-3194-1" }, { "name": "SUSE-SU-2016:2458", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" }, { "name": "20181113 [security bulletin] MFSBGN03831 rev. - Service Management Automation, remote disclosure of information", "tags": [ "mailing-list" ], "url": "https://seclists.org/bugtraq/2018/Nov/21" }, { "url": "https://support.f5.com/csp/article/K13167034" }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05390722" }, { "name": "20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information", "tags": [ "mailing-list" ], "url": "http://www.securityfocus.com/archive/1/542005/100/0/threaded" }, { "name": "DSA-3673", "tags": [ "vendor-advisory" ], "url": "http://www.debian.org/security/2016/dsa-3673" }, { "name": "openSUSE-SU-2016:2391", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" }, { "name": "USN-3372-1", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-3372-1" }, { "name": "openSUSE-SU-2018:0458", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" }, { "name": "SUSE-SU-2017:0460", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" }, { "name": "SUSE-SU-2017:0490", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" }, { "name": "USN-3270-1", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-3270-1" }, { "name": "20170214 [security bulletin] HPESBGN03697 rev.1 - HPE Business Service Management (BSM), Remote Disclosure of Information", "tags": [ "mailing-list" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded" }, { "url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178" }, { "name": "SUSE-SU-2016:2387", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" }, { "name": "20170529 SSD Advisory - IBM Informix Dynamic Server and Informix Open Admin Tool Multiple Vulnerabilities", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2017/May/105" }, { "name": "openSUSE-SU-2017:0513", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05302448" }, { "name": "20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information", "tags": [ "mailing-list" ], "url": "http://www.securityfocus.com/archive/1/539885/100/0/threaded" }, { "name": "openSUSE-SU-2017:0374", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05369415" }, { "url": "http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html" }, { "name": "SUSE-SU-2016:2468", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" }, { "name": "SUSE-SU-2017:0346", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" }, { "name": "openSUSE-SU-2016:2496", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" }, { "name": "USN-3198-1", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-3198-1" }, { "url": "http://seclists.org/fulldisclosure/2017/May/105" }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05369403" }, { "name": "20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information", "tags": [ "mailing-list" ], "url": "http://www.securityfocus.com/archive/1/541104/100/0/threaded" }, { "name": "SUSE-SU-2017:1444", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" }, { "name": "SUSE-SU-2016:2394", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" }, { "name": "20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities", "tags": [ "mailing-list" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded" }, { "name": "USN-3179-1", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-3179-1" }, { "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en" }, { "name": "RHSA-2019:1245", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1245" }, { "name": "RHSA-2019:2859", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2859" }, { "name": "RHSA-2020:0451", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0451" }, { "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10310" }, { "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "url": "https://sweet32.info/" }, { "url": "http://www.splunk.com/view/SP-CAAAPUE" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383" }, { "url": "https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/" }, { "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "url": "https://access.redhat.com/articles/2548661" }, { "url": "https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue" }, { "url": "http://www.splunk.com/view/SP-CAAAPSV" }, { "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039" }, { "url": "https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633" }, { "url": "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/" }, { "url": "https://www.sigsac.org/ccs/CCS2016/accepted-papers/" }, { "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21991482" }, { "url": "https://www.openssl.org/blog/blog/2016/08/24/sweet32/" }, { "url": "https://access.redhat.com/security/cve/cve-2016-2183" }, { "url": "https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/" }, { "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02" }, { "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html" }, { "url": "https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/" }, { "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008" }, { "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697" }, { "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2183", "datePublished": "2016-09-01T00:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.753Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-24586
Vulnerability from cvelistv5
Published
2023-05-10 00:00
Modified
2024-08-02 11:03
Severity ?
EPSS score ?
Summary
Cleartext storage of sensitive information exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote authenticated attacker to obtain an APN credential for the product.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Seiko Solutions Inc. | SkyBridge MB-A100/110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:03:18.788Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN40604023/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SkyBridge MB-A100/110", "vendor": "Seiko Solutions Inc.", "versions": [ { "status": "affected", "version": "firmware Ver. 4.2.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Cleartext storage of sensitive information exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote authenticated attacker to obtain an APN credential for the product." } ], "problemTypes": [ { "descriptions": [ { "description": "Cleartext storage of sensitive information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-10T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "url": "https://jvn.jp/en/jp/JVN40604023/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-24586", "datePublished": "2023-05-10T00:00:00", "dateReserved": "2023-03-15T00:00:00", "dateUpdated": "2024-08-02T11:03:18.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23578
Vulnerability from cvelistv5
Published
2023-05-10 00:00
Modified
2024-08-02 10:35
Severity ?
EPSS score ?
Summary
Improper access control vulnerability in SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier allows a remote unauthenticated attacker to connect to the product's ADB port.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Seiko Solutions Inc. | SkyBridge MB-A200 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:35:33.394Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN40604023/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SkyBridge MB-A200", "vendor": "Seiko Solutions Inc.", "versions": [ { "status": "affected", "version": "firmware Ver. 01.00.05 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper access control vulnerability in SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier allows a remote unauthenticated attacker to connect to the product\u0027s ADB port." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper access control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-10T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "url": "https://jvn.jp/en/jp/JVN40604023/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-23578", "datePublished": "2023-05-10T00:00:00", "dateReserved": "2023-03-15T00:00:00", "dateUpdated": "2024-08-02T10:35:33.394Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36559
Vulnerability from cvelistv5
Published
2022-08-29 22:46
Modified
2024-08-03 10:07
Severity ?
EPSS score ?
Summary
Seiko SkyBridge MB-A200 v01.00.04 and below was discovered to contain a command injection vulnerability via the Ping parameter at ping_exec.cgi.
References
▼ | URL | Tags |
---|---|---|
https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e | x_refsource_MISC | |
https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:07:34.470Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Seiko SkyBridge MB-A200 v01.00.04 and below was discovered to contain a command injection vulnerability via the Ping parameter at ping_exec.cgi." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-29T22:46:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-36559", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Seiko SkyBridge MB-A200 v01.00.04 and below was discovered to contain a command injection vulnerability via the Ping parameter at ping_exec.cgi." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e", "refsource": "MISC", "url": "https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e" }, { "name": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/", "refsource": "MISC", "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-36559", "datePublished": "2022-08-29T22:46:21", "dateReserved": "2022-07-25T00:00:00", "dateUpdated": "2024-08-03T10:07:34.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22361
Vulnerability from cvelistv5
Published
2023-05-10 00:00
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
Improper privilege management vulnerability in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier allows a remote authenticated attacker to alter a WebUI password of the product.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Seiko Solutions Inc. | SkyBridge MB-A100/110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.262Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN40604023/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SkyBridge MB-A100/110", "vendor": "Seiko Solutions Inc.", "versions": [ { "status": "affected", "version": "firmware Ver. 4.2.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper privilege management vulnerability in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier allows a remote authenticated attacker to alter a WebUI password of the product." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper privilege management", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-10T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "url": "https://jvn.jp/en/jp/JVN40604023/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-22361", "datePublished": "2023-05-10T00:00:00", "dateReserved": "2023-03-15T00:00:00", "dateUpdated": "2024-08-02T10:07:06.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23906
Vulnerability from cvelistv5
Published
2023-05-10 00:00
Modified
2024-08-02 10:42
Severity ?
EPSS score ?
Summary
Missing authentication for critical function exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote unauthenticated attacker to execute some critical functions without authentication, e.g., rebooting the product.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Seiko Solutions Inc. | SkyBridge MB-A100/110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:42:27.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "tags": [ "x_transferred" ], "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN40604023/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SkyBridge MB-A100/110", "vendor": "Seiko Solutions Inc.", "versions": [ { "status": "affected", "version": "firmware Ver. 4.2.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Missing authentication for critical function exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote unauthenticated attacker to execute some critical functions without authentication, e.g., rebooting the product." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing authentication for critical function", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-10T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.seiko-sol.co.jp/archives/73969/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/" }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/" }, { "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/" }, { "url": "https://jvn.jp/en/jp/JVN40604023/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-23906", "datePublished": "2023-05-10T00:00:00", "dateReserved": "2023-03-15T00:00:00", "dateUpdated": "2024-08-02T10:42:27.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.