VAR-200912-0340
Vulnerability from variot - Updated: 2024-01-18 22:49Intellicom NetBiter WebSCADA devices use default passwords for the HICP network configuration service, which makes it easier for remote attackers to modify network settings and cause a denial of service. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: this issue was originally reported to be hard-coded passwords, not default passwords. The IntelliCom NetBiter Config HICP configuration utility has a buffer overflow vulnerability that can be triggered by a specially crafted hostname (hn) value. An attacker with network access could exploit this vulnerability to execute arbitrary code with the privileges of the user running NetBiter Config. IntelliCom Provided by NetBiter The password set on the device at the factory may be used by a remote third party. IntelliCom Provided by NetBiter The device is Ethernet and IP To configure network settings HICP The protocol is used. NetBiter The device is factory set HICP The password for can be obtained by methods other than the product documentation.Without changing from the factory password NetBiter When operating the device, the remote third party who obtained the password may change the network settings or change the password. HICP Access to the service may be disrupted. Also, HICP Since passwords are transmitted in clear text, the password may be intercepted by a third party intercepting the communication. Successful exploits may allow attackers to gain privileged access to the device or network; other attacks may also be possible. NOTE: This BID is being retired as it has been determined to not be a vulnerability. The default password and instructions on changing it are detailed in the product documentation. Netbiter Webscada Firmware is prone to a denial-of-service vulnerability
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200912-0340",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 1.9,
"vendor": "intellicom",
"version": "3.13.2"
},
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 1.9,
"vendor": "intellicom",
"version": "3.13.1"
},
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 1.9,
"vendor": "intellicom",
"version": "3.12.4"
},
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 1.9,
"vendor": "intellicom",
"version": "3.30.1"
},
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 1.9,
"vendor": "intellicom",
"version": "3.12.6"
},
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 1.9,
"vendor": "intellicom",
"version": "3.11.2"
},
{
"model": null,
"scope": null,
"trust": 1.6,
"vendor": "intellicom innovation ab",
"version": null
},
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 1.6,
"vendor": "intellicom",
"version": "3.30.2"
},
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 1.6,
"vendor": "intellicom",
"version": "3.20.0"
},
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 1.6,
"vendor": "intellicom",
"version": "3.13.0"
},
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 1.6,
"vendor": "intellicom",
"version": "3.30.0"
},
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 1.3,
"vendor": "intellicom",
"version": "3.11.1"
},
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 1.0,
"vendor": "intellicom",
"version": "3.11.0"
},
{
"model": "netbiter webscada ws100",
"scope": "eq",
"trust": 1.0,
"vendor": "intellicom",
"version": "*"
},
{
"model": "netbiter webscada ws200",
"scope": "eq",
"trust": 1.0,
"vendor": "intellicom",
"version": "*"
},
{
"model": "netbiter webscada",
"scope": null,
"trust": 0.8,
"vendor": "intellicom innovation ab",
"version": null
},
{
"model": "netbiter webscada ws100",
"scope": null,
"trust": 0.8,
"vendor": "intellicom innovation ab",
"version": null
},
{
"model": "netbiter webscada ws200",
"scope": null,
"trust": 0.8,
"vendor": "intellicom innovation ab",
"version": null
},
{
"model": "innovation netbiter webscada ws200",
"scope": "eq",
"trust": 0.3,
"vendor": "intellicom",
"version": "0"
},
{
"model": "innovation netbiter webscada ws100",
"scope": "eq",
"trust": 0.3,
"vendor": "intellicom",
"version": "0"
},
{
"model": "netbiter webscada ws200",
"scope": "eq",
"trust": 0.3,
"vendor": "intellicom",
"version": "0"
},
{
"model": "netbiter webscada ws100",
"scope": "eq",
"trust": 0.3,
"vendor": "intellicom",
"version": "0"
},
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 0.3,
"vendor": "intellicom",
"version": "3.30"
},
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 0.3,
"vendor": "intellicom",
"version": "3.20"
},
{
"model": "netbiter webscada",
"scope": "eq",
"trust": 0.3,
"vendor": "intellicom",
"version": "3.11"
},
{
"model": "netbiter webscada b184",
"scope": "eq",
"trust": 0.3,
"vendor": "intellicom",
"version": "3.30.2"
},
{
"model": "netbiter webscada beta",
"scope": "eq",
"trust": 0.3,
"vendor": "intellicom",
"version": "3.13.0"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#902793"
},
{
"db": "CERT/CC",
"id": "VU#181737"
},
{
"db": "BID",
"id": "37328"
},
{
"db": "BID",
"id": "79166"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001345"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-402"
},
{
"db": "NVD",
"id": "CVE-2009-4463"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.13.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.13.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.13.0:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.12.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.12.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.30.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.20.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.30.2:b184:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.30.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_firmware:3.11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_ws100:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_ws200:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2009-4463"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ruben Santamarta",
"sources": [
{
"db": "BID",
"id": "37328"
}
],
"trust": 0.3
},
"cve": "CVE-2009-4463",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2009-4463",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-41909",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2009-4463",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#181737",
"trust": 0.8,
"value": "0.48"
},
{
"author": "CNNVD",
"id": "CNNVD-200912-402",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-41909",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2009-4463",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#181737"
},
{
"db": "VULHUB",
"id": "VHN-41909"
},
{
"db": "VULMON",
"id": "CVE-2009-4463"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001345"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-402"
},
{
"db": "NVD",
"id": "CVE-2009-4463"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Intellicom NetBiter WebSCADA devices use default passwords for the HICP network configuration service, which makes it easier for remote attackers to modify network settings and cause a denial of service. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product\u0027s installation documentation. NOTE: this issue was originally reported to be hard-coded passwords, not default passwords. The IntelliCom NetBiter Config HICP configuration utility has a buffer overflow vulnerability that can be triggered by a specially crafted hostname (hn) value. An attacker with network access could exploit this vulnerability to execute arbitrary code with the privileges of the user running NetBiter Config. IntelliCom Provided by NetBiter The password set on the device at the factory may be used by a remote third party. IntelliCom Provided by NetBiter The device is Ethernet and IP To configure network settings HICP The protocol is used. NetBiter The device is factory set HICP The password for can be obtained by methods other than the product documentation.Without changing from the factory password NetBiter When operating the device, the remote third party who obtained the password may change the network settings or change the password. HICP Access to the service may be disrupted. Also, HICP Since passwords are transmitted in clear text, the password may be intercepted by a third party intercepting the communication. \nSuccessful exploits may allow attackers to gain privileged access to the device or network; other attacks may also be possible. \nNOTE: This BID is being retired as it has been determined to not be a vulnerability. The default password and instructions on changing it are detailed in the product documentation. Netbiter Webscada Firmware is prone to a denial-of-service vulnerability",
"sources": [
{
"db": "NVD",
"id": "CVE-2009-4463"
},
{
"db": "CERT/CC",
"id": "VU#902793"
},
{
"db": "CERT/CC",
"id": "VU#181737"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001345"
},
{
"db": "BID",
"id": "37328"
},
{
"db": "BID",
"id": "79166"
},
{
"db": "VULHUB",
"id": "VHN-41909"
},
{
"db": "VULMON",
"id": "CVE-2009-4463"
}
],
"trust": 3.78
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#902793",
"trust": 3.4
},
{
"db": "NVD",
"id": "CVE-2009-4463",
"trust": 2.9
},
{
"db": "OSVDB",
"id": "61506",
"trust": 2.8
},
{
"db": "BID",
"id": "37328",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#181737",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001345",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200912-402",
"trust": 0.7
},
{
"db": "BUGTRAQ",
"id": "20091214 EXPOSING HMS HICP PROTOCOL + INTELLICOM NETBITERCONFIG.EXE REMOTE BUFFER OVERFLOW (NOT PATCHED)",
"trust": 0.6
},
{
"db": "BID",
"id": "79166",
"trust": 0.5
},
{
"db": "VULHUB",
"id": "VHN-41909",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2009-4463",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#902793"
},
{
"db": "CERT/CC",
"id": "VU#181737"
},
{
"db": "VULHUB",
"id": "VHN-41909"
},
{
"db": "VULMON",
"id": "CVE-2009-4463"
},
{
"db": "BID",
"id": "37328"
},
{
"db": "BID",
"id": "79166"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001345"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-402"
},
{
"db": "NVD",
"id": "CVE-2009-4463"
}
]
},
"id": "VAR-200912-0340",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-41909"
}
],
"trust": 0.01
},
"last_update_date": "2024-01-18T22:49:38.783000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "ISFR-4404-0008",
"trust": 0.8,
"url": "http://support.intellicom.se/getfile.cfm?fid=151\u0026fpid=113"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2010-001345"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-255",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41909"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001345"
},
{
"db": "NVD",
"id": "CVE-2009-4463"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.9,
"url": "http://reversemode.com/index.php?option=com_content\u0026task=view\u0026id=65\u0026itemid=1"
},
{
"trust": 2.8,
"url": "http://blog.48bits.com/?p=781"
},
{
"trust": 2.7,
"url": "http://www.kb.cert.org/vuls/id/902793"
},
{
"trust": 2.6,
"url": "http://support.intellicom.se/getfile.cfm?fid=151"
},
{
"trust": 2.0,
"url": "http://www.osvdb.org/61506"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/archive/1/508449/100/0/threaded"
},
{
"trust": 0.9,
"url": "http://www.securityfocus.com/archive/1/archive/1/508449/100/0/threaded"
},
{
"trust": 0.8,
"url": "http://osvdb.com/show/osvdb/61506"
},
{
"trust": 0.8,
"url": "http://www.hms.se/products/prodindex.shtml"
},
{
"trust": 0.8,
"url": "http://www.anybus.com/products/abxsstech.shtml"
},
{
"trust": 0.8,
"url": "http://support.intellicom.se/news.cfm?nwid=33"
},
{
"trust": 0.8,
"url": "http://support.intellicom.se/getfile.cfm?fid=150"
},
{
"trust": 0.8,
"url": "http://www.securityfocus.com/bid/37328"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4463"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu902793/"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4463"
},
{
"trust": 0.3,
"url": "http://www.intellicom.se/"
},
{
"trust": 0.3,
"url": "http://www.intellicom.se/webscada.cfm"
},
{
"trust": 0.3,
"url": "/archive/1/508449"
},
{
"trust": 0.1,
"url": "http://reversemode.com/index.php?option=com_content\u0026amp;task=view\u0026amp;id=65\u0026amp;itemid=1"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/255.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.securityfocus.com/bid/79166"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#902793"
},
{
"db": "CERT/CC",
"id": "VU#181737"
},
{
"db": "VULHUB",
"id": "VHN-41909"
},
{
"db": "VULMON",
"id": "CVE-2009-4463"
},
{
"db": "BID",
"id": "37328"
},
{
"db": "BID",
"id": "79166"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001345"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-402"
},
{
"db": "NVD",
"id": "CVE-2009-4463"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#902793"
},
{
"db": "CERT/CC",
"id": "VU#181737"
},
{
"db": "VULHUB",
"id": "VHN-41909"
},
{
"db": "VULMON",
"id": "CVE-2009-4463"
},
{
"db": "BID",
"id": "37328"
},
{
"db": "BID",
"id": "79166"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-001345"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-402"
},
{
"db": "NVD",
"id": "CVE-2009-4463"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-04-06T00:00:00",
"db": "CERT/CC",
"id": "VU#902793"
},
{
"date": "2010-03-24T00:00:00",
"db": "CERT/CC",
"id": "VU#181737"
},
{
"date": "2009-12-30T00:00:00",
"db": "VULHUB",
"id": "VHN-41909"
},
{
"date": "2009-12-30T00:00:00",
"db": "VULMON",
"id": "CVE-2009-4463"
},
{
"date": "2009-12-14T00:00:00",
"db": "BID",
"id": "37328"
},
{
"date": "2009-12-30T00:00:00",
"db": "BID",
"id": "79166"
},
{
"date": "2010-04-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2010-001345"
},
{
"date": "2009-12-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200912-402"
},
{
"date": "2009-12-30T20:00:01.170000",
"db": "NVD",
"id": "CVE-2009-4463"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-04-29T00:00:00",
"db": "CERT/CC",
"id": "VU#902793"
},
{
"date": "2010-03-26T00:00:00",
"db": "CERT/CC",
"id": "VU#181737"
},
{
"date": "2018-10-10T00:00:00",
"db": "VULHUB",
"id": "VHN-41909"
},
{
"date": "2018-10-10T00:00:00",
"db": "VULMON",
"id": "CVE-2009-4463"
},
{
"date": "2010-04-06T17:32:00",
"db": "BID",
"id": "37328"
},
{
"date": "2009-12-30T00:00:00",
"db": "BID",
"id": "79166"
},
{
"date": "2010-04-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2010-001345"
},
{
"date": "2011-07-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200912-402"
},
{
"date": "2018-10-10T19:49:13.103000",
"db": "NVD",
"id": "CVE-2009-4463"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "37328"
},
{
"db": "BID",
"id": "79166"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "IntelliCom NetBiter devices have default HICP passwords",
"sources": [
{
"db": "CERT/CC",
"id": "VU#902793"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "trust management",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200912-402"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.