VAR-200908-0021
Vulnerability from variot - Updated: 2023-12-18 12:14Siemens SpeedStream 5200 with NetPort Software 1.1 allows remote attackers to bypass authentication via an invalid Host header, possibly involving a trailing dot in the hostname. Siemens SpeedStream 5200 are prone to an authentication-bypass vulnerability that may allow attackers to gain unauthorized administrative access to a router's administration interface. SpeedStream 5200 is an ADSL router suitable for small and medium enterprises. ----------------------------------------------------------------------
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/
TITLE: Siemens SpeedStream 5200 "Host" Header Authentication Bypass
SECUNIA ADVISORY ID: SA32635
VERIFY ADVISORY: http://secunia.com/advisories/32635/
CRITICAL: Less critical
IMPACT: Security Bypass
WHERE:
From local network
OPERATING SYSTEM: Siemens SpeedStream 5200 http://secunia.com/advisories/product/20486/
DESCRIPTION: hkm has reported a vulnerability in Siemens SpeedStream 5200, which can be exploited by malicious people to bypass certain security restrictions.
The vulnerability is caused due to an error in the authentication process when processing HTTP "Host" headers. This can be exploited to bypass authentication and e.g. download the router configuration via an HTTP request containing a wrong "Host" header.
SOLUTION: Restrict access to the affected device.
PROVIDED AND/OR DISCOVERED BY: hkm
ORIGINAL ADVISORY: http://milw0rm.com/exploits/7055
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200908-0021",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "netport software",
"scope": "eq",
"trust": 1.8,
"vendor": "john doe",
"version": "1.1"
},
{
"model": "speedstream 5200",
"scope": "eq",
"trust": 1.6,
"vendor": "siemens",
"version": null
},
{
"model": "speedstream 5200",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "speedstream",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "52000"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "speedstream 5200",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "netport",
"version": "1.1"
}
],
"sources": [
{
"db": "IVD",
"id": "f0bc2b0a-23cb-11e6-abef-000c29c66e3d"
},
{
"db": "BID",
"id": "32203"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-004315"
},
{
"db": "NVD",
"id": "CVE-2008-6916"
},
{
"db": "CNNVD",
"id": "CNNVD-200908-045"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:speedstream_5200:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:john_doe:netport_software:1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2008-6916"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "hkm hkm@hakim.ws",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200908-045"
}
],
"trust": 0.6
},
"cve": "CVE-2008-6916",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2008-6916",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "f0bc2b0a-23cb-11e6-abef-000c29c66e3d",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-37041",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2008-6916",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-200908-045",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "f0bc2b0a-23cb-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-37041",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "f0bc2b0a-23cb-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-37041"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-004315"
},
{
"db": "NVD",
"id": "CVE-2008-6916"
},
{
"db": "CNNVD",
"id": "CNNVD-200908-045"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens SpeedStream 5200 with NetPort Software 1.1 allows remote attackers to bypass authentication via an invalid Host header, possibly involving a trailing dot in the hostname. Siemens SpeedStream 5200 are prone to an authentication-bypass vulnerability that may allow attackers to gain unauthorized administrative access to a router\u0027s administration interface. SpeedStream 5200 is an ADSL router suitable for small and medium enterprises. ----------------------------------------------------------------------\n\nDo you need accurate and reliable IDS / IPS / AV detection rules?\n\nGet in-depth vulnerability details:\nhttp://secunia.com/binary_analysis/sample_analysis/\n\n----------------------------------------------------------------------\n\nTITLE:\nSiemens SpeedStream 5200 \"Host\" Header Authentication Bypass\n\nSECUNIA ADVISORY ID:\nSA32635\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/32635/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSecurity Bypass\n\nWHERE:\n\u003eFrom local network\n\nOPERATING SYSTEM:\nSiemens SpeedStream 5200\nhttp://secunia.com/advisories/product/20486/\n\nDESCRIPTION:\nhkm has reported a vulnerability in Siemens SpeedStream 5200, which\ncan be exploited by malicious people to bypass certain security\nrestrictions. \n\nThe vulnerability is caused due to an error in the authentication\nprocess when processing HTTP \"Host\" headers. This can be exploited to\nbypass authentication and e.g. download the router configuration via\nan HTTP request containing a wrong \"Host\" header. \n\nSOLUTION:\nRestrict access to the affected device. \n\nPROVIDED AND/OR DISCOVERED BY:\nhkm\n\nORIGINAL ADVISORY:\nhttp://milw0rm.com/exploits/7055\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2008-6916"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-004315"
},
{
"db": "BID",
"id": "32203"
},
{
"db": "IVD",
"id": "f0bc2b0a-23cb-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-37041"
},
{
"db": "PACKETSTORM",
"id": "71907"
}
],
"trust": 2.25
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-37041",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-37041"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2008-6916",
"trust": 3.0
},
{
"db": "BID",
"id": "32203",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "32635",
"trust": 1.9
},
{
"db": "EXPLOIT-DB",
"id": "7055",
"trust": 1.8
},
{
"db": "OSVDB",
"id": "49870",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-200908-045",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2009-004315",
"trust": 0.8
},
{
"db": "MILW0RM",
"id": "7055",
"trust": 0.6
},
{
"db": "XF",
"id": "5200",
"trust": 0.6
},
{
"db": "XF",
"id": "46508",
"trust": 0.6
},
{
"db": "IVD",
"id": "F0BC2B0A-23CB-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-37041",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "71907",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "f0bc2b0a-23cb-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-37041"
},
{
"db": "BID",
"id": "32203"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-004315"
},
{
"db": "PACKETSTORM",
"id": "71907"
},
{
"db": "NVD",
"id": "CVE-2008-6916"
},
{
"db": "CNNVD",
"id": "CNNVD-200908-045"
}
]
},
"id": "VAR-200908-0021",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "f0bc2b0a-23cb-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-37041"
}
],
"trust": 0.03
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "f0bc2b0a-23cb-11e6-abef-000c29c66e3d"
}
]
},
"last_update_date": "2023-12-18T12:14:10.809000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "NetPort Software",
"trust": 0.8,
"url": "http://www.denmansoft.com/netport.shtml"
},
{
"title": "Siemens SpeedStream 5200",
"trust": 0.8,
"url": "http://www.siemens.com.tr/web/261,1394,1,1/siemens_tr/microsite__adsl/urunler/speedstream_5200"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-004315"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-37041"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-004315"
},
{
"db": "NVD",
"id": "CVE-2008-6916"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/32203"
},
{
"trust": 1.7,
"url": "http://osvdb.org/49870"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/32635"
},
{
"trust": 1.1,
"url": "https://www.exploit-db.com/exploits/7055"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46508"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-6916"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-6916"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/46508"
},
{
"trust": 0.6,
"url": "http://www.milw0rm.com/exploits/7055"
},
{
"trust": 0.3,
"url": "http://subscriber.communications.siemens.com/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/product/20486/"
},
{
"trust": 0.1,
"url": "http://secunia.com/binary_analysis/sample_analysis/"
},
{
"trust": 0.1,
"url": "http://milw0rm.com/exploits/7055"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/32635/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-37041"
},
{
"db": "BID",
"id": "32203"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-004315"
},
{
"db": "PACKETSTORM",
"id": "71907"
},
{
"db": "NVD",
"id": "CVE-2008-6916"
},
{
"db": "CNNVD",
"id": "CNNVD-200908-045"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "f0bc2b0a-23cb-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-37041"
},
{
"db": "BID",
"id": "32203"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-004315"
},
{
"db": "PACKETSTORM",
"id": "71907"
},
{
"db": "NVD",
"id": "CVE-2008-6916"
},
{
"db": "CNNVD",
"id": "CNNVD-200908-045"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2008-11-07T00:00:00",
"db": "IVD",
"id": "f0bc2b0a-23cb-11e6-abef-000c29c66e3d"
},
{
"date": "2009-08-07T00:00:00",
"db": "VULHUB",
"id": "VHN-37041"
},
{
"date": "2008-11-07T00:00:00",
"db": "BID",
"id": "32203"
},
{
"date": "2012-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-004315"
},
{
"date": "2008-11-13T23:51:17",
"db": "PACKETSTORM",
"id": "71907"
},
{
"date": "2009-08-07T19:00:01.017000",
"db": "NVD",
"id": "CVE-2008-6916"
},
{
"date": "2008-11-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200908-045"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-09-29T00:00:00",
"db": "VULHUB",
"id": "VHN-37041"
},
{
"date": "2015-04-16T17:51:00",
"db": "BID",
"id": "32203"
},
{
"date": "2012-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-004315"
},
{
"date": "2017-09-29T01:33:24.870000",
"db": "NVD",
"id": "CVE-2008-6916"
},
{
"date": "2009-08-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200908-045"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200908-045"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "NetPort Software Comes with Siemens SpeedStream 5200 Vulnerabilities that bypass authentication",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-004315"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200908-045"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.