var-201310-0390
Vulnerability from variot
The integrated web server on Siemens SCALANCE X-200 switches with firmware before 4.5.0 and X-200IRT switches with firmware before 5.1.0 does not properly enforce authentication requirements, which allows remote attackers to perform administrative actions via requests to the management interface. The Siemens Scalance X200 is an industrial Ethernet switch from Siemens. SCALANCE X-200 and X-200IRT series switches are prone to an authentication-bypass vulnerability. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and gain administrative access to the affected device. The following products are affected. SCALANCE X-200 running firmware versions prior to 4.5.0 SCALANCE X-200IRT running firmware versions prior to 5.1.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0390", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance x-200 series", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "4.3" }, { "model": "scalance x-200 series", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "4.4" }, { "model": "scalance x-200 series", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "5.0.1" }, { "model": "scalance x-200irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x-200", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x-200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x-200 series", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "4.5.0 (scalance x-200)" }, { "model": "scalance x-200 series", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "5.1.0 (scalance x-200irt)" }, { "model": "scalance x-200irt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-2004.4.9" }, { "model": "scalance x-200irt", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5.0.9" }, { "model": "scalance x-200 series", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5.0.1" }, { "model": "scalance x-200 series", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "4.4" }, { "model": "scalance x-200irt", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x-2000" }, { "model": "scalance x-200irt", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "5.1.2" }, { "model": "scalance x-200irt", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "5.1" }, { "model": "scalance", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "x-2004.5" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x 200 series", "version": "5.0.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x 200", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x 200 series", "version": "4.4" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x 200irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x 200 series", "version": "4.3" } ], "sources": [ { "db": "IVD", "id": "9e35be88-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13553" }, { "db": "BID", "id": "62762" }, { "db": "JVNDB", "id": "JVNDB-2013-004482" }, { "db": "NVD", "id": "CVE-2013-5944" }, { "db": "CNNVD", "id": "CNNVD-201310-059" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x-200_series_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x-200_series_firmware:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x-200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x-200_series_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.0.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x-200irt:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-5944" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Eireann Leverett of IOActive", "sources": [ { "db": "BID", "id": "62762" } ], "trust": 0.3 }, "cve": "CVE-2013-5944", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2013-5944", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2013-13553", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "9e35be88-2352-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-65946", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-5944", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2013-13553", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201310-059", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "9e35be88-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-65946", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2013-5944", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "9e35be88-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13553" }, { "db": "VULHUB", "id": "VHN-65946" }, { "db": "VULMON", "id": "CVE-2013-5944" }, { "db": "JVNDB", "id": "JVNDB-2013-004482" }, { "db": "NVD", "id": "CVE-2013-5944" }, { "db": "CNNVD", "id": "CNNVD-201310-059" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The integrated web server on Siemens SCALANCE X-200 switches with firmware before 4.5.0 and X-200IRT switches with firmware before 5.1.0 does not properly enforce authentication requirements, which allows remote attackers to perform administrative actions via requests to the management interface. The Siemens Scalance X200 is an industrial Ethernet switch from Siemens. SCALANCE X-200 and X-200IRT series switches are prone to an authentication-bypass vulnerability. \nSuccessfully exploiting this issue may allow an attacker to bypass certain security restrictions and gain administrative access to the affected device. \nThe following products are affected. \nSCALANCE X-200 running firmware versions prior to 4.5.0\nSCALANCE X-200IRT running firmware versions prior to 5.1.0", "sources": [ { "db": "NVD", "id": "CVE-2013-5944" }, { "db": "JVNDB", "id": "JVNDB-2013-004482" }, { "db": "CNVD", "id": "CNVD-2013-13553" }, { "db": "BID", "id": "62762" }, { "db": "IVD", "id": "9e35be88-2352-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-65946" }, { "db": "VULMON", "id": "CVE-2013-5944" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-5944", "trust": 3.7 }, { "db": "SIEMENS", "id": "SSA-176087", "trust": 2.7 }, { "db": "BID", "id": "62762", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201310-059", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2013-13553", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-004482", "trust": 0.8 }, { "db": "IVD", "id": "9E35BE88-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-89659", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-65946", "trust": 0.1 }, { "db": "ICS CERT", "id": "ICSA-13-274-01", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2013-5944", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "9e35be88-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13553" }, { "db": "VULHUB", "id": "VHN-65946" }, { "db": "VULMON", "id": "CVE-2013-5944" }, { "db": "BID", "id": "62762" }, { "db": "JVNDB", "id": "JVNDB-2013-004482" }, { "db": "NVD", "id": "CVE-2013-5944" }, { "db": "CNNVD", "id": "CNNVD-201310-059" } ] }, "id": "VAR-201310-0390", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "9e35be88-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13553" }, { "db": "VULHUB", "id": "VHN-65946" } ], "trust": 1.4816919199999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "9e35be88-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13553" } ] }, "last_update_date": "2023-12-18T13:20:05.009000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-176087", "trust": 0.8, "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-176087.pdf" }, { "title": "Patch for unclear management access vulnerability on the WEB interface of the Siemens SCALANCE X-200 switch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/40012" }, { "title": "Siemens Scalance X-200 Switch unauthorized access vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=109052" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=44f98d989f2a58ed7cb2e4b6335cb180" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13553" }, { "db": "VULMON", "id": "CVE-2013-5944" }, { "db": "JVNDB", "id": "JVNDB-2013-004482" }, { "db": "CNNVD", "id": "CNNVD-201310-059" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65946" }, { "db": "JVNDB", "id": "JVNDB-2013-004482" }, { "db": "NVD", "id": "CVE-2013-5944" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-176087.pdf" }, { "trust": 1.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-176087.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5944" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5944" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=31114" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-13-274-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13553" }, { "db": "VULHUB", "id": "VHN-65946" }, { "db": "VULMON", "id": "CVE-2013-5944" }, { "db": "BID", "id": "62762" }, { "db": "JVNDB", "id": "JVNDB-2013-004482" }, { "db": "NVD", "id": "CVE-2013-5944" }, { "db": "CNNVD", "id": "CNNVD-201310-059" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "9e35be88-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13553" }, { "db": "VULHUB", "id": "VHN-65946" }, { "db": "VULMON", "id": "CVE-2013-5944" }, { "db": "BID", "id": "62762" }, { "db": "JVNDB", "id": "JVNDB-2013-004482" }, { "db": "NVD", "id": "CVE-2013-5944" }, { "db": "CNNVD", "id": "CNNVD-201310-059" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-10T00:00:00", "db": "IVD", "id": "9e35be88-2352-11e6-abef-000c29c66e3d" }, { "date": "2013-10-10T00:00:00", "db": "CNVD", "id": "CNVD-2013-13553" }, { "date": "2013-10-03T00:00:00", "db": "VULHUB", "id": "VHN-65946" }, { "date": "2013-10-03T00:00:00", "db": "VULMON", "id": "CVE-2013-5944" }, { "date": "2013-10-01T00:00:00", "db": "BID", "id": "62762" }, { "date": "2013-10-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004482" }, { "date": "2013-10-03T11:04:43.773000", "db": "NVD", "id": "CVE-2013-5944" }, { "date": "2013-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-059" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-10T00:00:00", "db": "CNVD", "id": "CNVD-2013-13553" }, { "date": "2020-02-10T00:00:00", "db": "VULHUB", "id": "VHN-65946" }, { "date": "2020-02-10T00:00:00", "db": "VULMON", "id": "CVE-2013-5944" }, { "date": "2013-10-01T00:00:00", "db": "BID", "id": "62762" }, { "date": "2013-10-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004482" }, { "date": "2020-02-10T15:15:12.387000", "db": "NVD", "id": "CVE-2013-5944" }, { "date": "2020-02-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-059" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-059" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SCALANCE X-200 and X-200IRT Vulnerability to execute administrator actions in switch firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004482" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-059" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.