var-201311-0307
Vulnerability from variot

Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not properly maintain the state of password failures, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by entering password guesses within multiple Unlock.exe processes that are running simultaneously. Check Point Media Encryption EPM Explorer is prone to a security-bypass vulnerability. An attacker with physical access may be able to exploit this issue to bypass device locking protection and aid in brute-force attacks; other attacks may also be possible. Check Point Endpoint Security Media Encryption E80.41 and E80.50 are vulnerable. This solution combines firewall, network access control, anti-virus, anti-spyware, data security and other functions to ensure that terminal PCs are free from Web-based threats. The vulnerability is caused by the application not properly saving the expiration state of the password. Failed password limit bypass. Risk: Low to Medium Date: 13.Nov.2013 Author: Pedro Andujar

.: [ INTRO ] :.

.: [ TECHNICAL DESCRIPTION ] :.

When accessing an encrypted removable device from a computer without Endpoint Security installed on it, it should contains the files described below:

DVREM.EPM - Encrypted Portable Media (aka the encrypted volume which contains data) Unlock.exe - EPM Explorer (software which allows you to decrypt and access the content)

Despite other scenarios offers better performance (like attacking the EPM directly), less skilled attackers can take advantage of Unlock.exe to attempt to bruteforce the password.

.: [ ISSUE #1 }:.

Name: Multiple Unlock.exe instances Severity: Low CVE: CVE-2013-5635 CWE-372: Incomplete Internal State Distinction

If password policy sets a limit of 5 failed password attempts before device is locked, executing n instances of Unlock.exe at the same time will allow you to get nx5 password attempts (5 for each instance).

Some controls should be applied to prevent multiple EPM explorers being concurrently executed, or at least synchronization regarding the state of failed password attempts.

.: [ ISSUE #2 }:.

Name: Device link not enforced Severity: Low CVE: CVE-2013-5636 CWE-285: Improper Authorization

Unlock.exe contains some restrictions that forces you to store the EPM file in the top of the directory tree, just after a unit letter and coloms (Ex: X:\DVREM.EPM), so it cannot be inside a folder. But this is not enough and still can be extracted from the removable media and be stored in a different drive.

Allowing Unlock.exe to be executed and access EPM stored on a different device/drive, increase the window of time for attackers which can try to access the information without having the originally encrypted device on their hands.

Additionally everytime the EPM is overwrited by a freshcopy of itself, the failed password attempts is reseted, allowing you to try another 5 times, so you can perform infinite attempts.

This charasteristic open some social engineering attack scenarios, like copying the EPM and Unlock.exe before returning a lent device to it's originall owner or just taking it for few seconds when owner is not paying atention.

Ideally EPM file should be associated to the device ID at its creation time, and EPM explorer should check the device ID (or other unique device identifier) to prevent it opening the EPM in a different location.

.: [ CHANGELOG ] :.

  • 16/Dec/2012: - Issue found
  • 25/Aug/2013: - Vendor contacted
  • 26/Aug/2013: - Vendor Ack
  • 11/Nov/2013: - Vendor finished the Fix for Issue #1 - Issue #2 considered not fixeable
  • 14/Nov/2013: - Public Disclosure

.: [ SOLUTIONS ] :.

Check Point offers an improved client for this issue.

Solution ID: sk96589 https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk96589

.: [ REFERENCES ] :

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201311-0307",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "endpoint security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "checkpoint",
        "version": "e80.41"
      },
      {
        "model": "endpoint security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "checkpoint",
        "version": "e80.30"
      },
      {
        "model": "endpoint security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "checkpoint",
        "version": "e80"
      },
      {
        "model": "endpoint security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "checkpoint",
        "version": "e80.20"
      },
      {
        "model": "endpoint security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "checkpoint",
        "version": "e80.10"
      },
      {
        "model": "endpoint security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "checkpoint",
        "version": "e80.40"
      },
      {
        "model": "endpoint security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "checkpoint",
        "version": "e80.50"
      },
      {
        "model": "endpoint security",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "check point",
        "version": "e80.50"
      },
      {
        "model": "point software endpoint security media encryption e80.50",
        "scope": null,
        "trust": 0.3,
        "vendor": "check",
        "version": null
      },
      {
        "model": "point software endpoint security media encryption e80.41",
        "scope": null,
        "trust": 0.3,
        "vendor": "check",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "64026"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005338"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5635"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201311-478"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:checkpoint:endpoint_security:e80.40:-:vpn_blade:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:checkpoint:endpoint_security:e80.41:-:vpn_blade:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:checkpoint:endpoint_security:e80.50:-:vpn_blade:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:checkpoint:endpoint_security:e80:-:vpn_blade:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:checkpoint:endpoint_security:e80.20:-:vpn_blade:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:checkpoint:endpoint_security:e80.10:-:vpn_blade:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:checkpoint:endpoint_security:e80.30:-:vpn_blade:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-5635"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Pedro Andujar",
    "sources": [
      {
        "db": "BID",
        "id": "64026"
      },
      {
        "db": "PACKETSTORM",
        "id": "124019"
      }
    ],
    "trust": 0.4
  },
  "cve": "CVE-2013-5635",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.4,
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 3.3,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2013-5635",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.4,
            "id": "VHN-65637",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:M/AU:N/C:P/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-5635",
            "trust": 1.8,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201311-478",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-65637",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-65637"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005338"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5635"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201311-478"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not properly maintain the state of password failures, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by entering password guesses within multiple Unlock.exe processes that are running simultaneously. Check Point Media Encryption EPM Explorer is prone to a security-bypass vulnerability. \nAn attacker with physical access may be able to exploit this issue to bypass device locking protection and aid in brute-force attacks; other attacks may also be possible. \nCheck Point Endpoint Security Media Encryption E80.41 and E80.50 are vulnerable. This solution combines firewall, network access control, anti-virus, anti-spyware, data security and other functions to ensure that terminal PCs are free from Web-based threats. The vulnerability is caused by the application not properly saving the expiration state of the password. Failed password limit bypass. \n    Risk:   Low to Medium\n    Date:   13.Nov.2013\n  Author:   Pedro Andujar\n   \n            \t\n.: [ INTRO ] :. \n\n\n.: [ TECHNICAL DESCRIPTION ] :. \n\nWhen accessing an encrypted removable device from a computer without Endpoint Security installed on it, \nit should contains the files described below:\n\nDVREM.EPM - Encrypted Portable Media (aka the encrypted volume which contains data)\nUnlock.exe - EPM Explorer (software which allows you to decrypt and access the content)\n\nDespite other scenarios offers better performance (like attacking the EPM directly), less skilled attackers \ncan take advantage of Unlock.exe to attempt to bruteforce the password. \n\n\n.: [ ISSUE #1 }:. \n\nName: Multiple Unlock.exe instances \nSeverity: Low\nCVE: CVE-2013-5635\nCWE-372: Incomplete Internal State Distinction\n\nIf password policy sets a limit of 5 failed password attempts before device is locked, executing n instances \nof Unlock.exe at the same time will allow you to get nx5 password attempts (5 for each instance). \n\nSome controls should be applied to prevent multiple EPM explorers being concurrently executed, or at least \nsynchronization regarding the state of failed password attempts. \n\n\n\n.: [ ISSUE #2 }:. \n\nName: Device link not enforced\nSeverity: Low\nCVE: CVE-2013-5636\nCWE-285: Improper Authorization\n\nUnlock.exe contains some restrictions that forces you to store the EPM file in the top of the directory tree,\njust after a unit letter and coloms (Ex: X:\\DVREM.EPM), so it cannot be inside a folder. But this is not enough\nand still can be extracted from the removable media and be stored in a different drive. \n\nAllowing Unlock.exe to be executed and access EPM stored on a different device/drive, increase the window\nof time for attackers which can try to access the information without having the originally encrypted device on \ntheir hands. \n\nAdditionally everytime the EPM is overwrited by a freshcopy of itself, the failed password attempts is reseted,\nallowing you to try another 5 times, so you can perform infinite attempts. \n\nThis charasteristic open some social engineering attack scenarios, like copying the EPM and Unlock.exe before \nreturning a lent device to it\u0027s originall owner or just taking it for few seconds when owner is not paying atention. \n\nIdeally EPM file should be associated to the device ID at its creation time, and EPM explorer should check\nthe device ID (or other unique device identifier) to prevent it opening the EPM in a different location. \n\n\n\n.: [ CHANGELOG ] :. \n\n  * 16/Dec/2012:   - Issue found\n  * 25/Aug/2013:   - Vendor contacted\n  * 26/Aug/2013:   - Vendor Ack\n  * 11/Nov/2013:   - Vendor finished the Fix for Issue #1\n                   - Issue #2 considered not fixeable\n  * 14/Nov/2013:   - Public Disclosure\n\n\n\n.: [ SOLUTIONS ] :. \n\nCheck Point offers an improved client for this issue. \n\nSolution ID: sk96589\nhttps://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk96589\n\n\n\n.: [ REFERENCES ] :",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-5635"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005338"
      },
      {
        "db": "BID",
        "id": "64026"
      },
      {
        "db": "VULHUB",
        "id": "VHN-65637"
      },
      {
        "db": "PACKETSTORM",
        "id": "124019"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-5635",
        "trust": 2.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005338",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201311-478",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "64026",
        "trust": 0.4
      },
      {
        "db": "PACKETSTORM",
        "id": "124019",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-65637",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-65637"
      },
      {
        "db": "BID",
        "id": "64026"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005338"
      },
      {
        "db": "PACKETSTORM",
        "id": "124019"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5635"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201311-478"
      }
    ]
  },
  "id": "VAR-201311-0307",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-65637"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:58:05.367000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Check Point response to Media Encryption EPM Explorer lockout bypass (sk96589)",
        "trust": 0.8,
        "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk96589"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005338"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-65637"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005338"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5635"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://www.digitalsec.net/stuff/explt+advs/checkpoint_endpoint_epm_explorer.txt"
      },
      {
        "trust": 2.0,
        "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk96589"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5635"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5635"
      },
      {
        "trust": 0.3,
        "url": "http://www.checkpoint.com/index.html"
      },
      {
        "trust": 0.1,
        "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026amp;solutionid=sk96589"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5635"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5636"
      },
      {
        "trust": 0.1,
        "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsecurityalerts"
      },
      {
        "trust": 0.1,
        "url": "http://downloads.checkpoint.com/dc/download.htm?id=10580"
      },
      {
        "trust": 0.1,
        "url": "http://www.digitalsec.net/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-65637"
      },
      {
        "db": "BID",
        "id": "64026"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005338"
      },
      {
        "db": "PACKETSTORM",
        "id": "124019"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5635"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201311-478"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-65637"
      },
      {
        "db": "BID",
        "id": "64026"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005338"
      },
      {
        "db": "PACKETSTORM",
        "id": "124019"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5635"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201311-478"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-11-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-65637"
      },
      {
        "date": "2013-11-14T00:00:00",
        "db": "BID",
        "id": "64026"
      },
      {
        "date": "2013-12-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005338"
      },
      {
        "date": "2013-11-14T15:55:55",
        "db": "PACKETSTORM",
        "id": "124019"
      },
      {
        "date": "2013-11-30T11:43:54.570000",
        "db": "NVD",
        "id": "CVE-2013-5635"
      },
      {
        "date": "2013-11-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201311-478"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-12-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-65637"
      },
      {
        "date": "2013-11-14T00:00:00",
        "db": "BID",
        "id": "64026"
      },
      {
        "date": "2013-12-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005338"
      },
      {
        "date": "2013-12-02T16:20:21.507000",
        "db": "NVD",
        "id": "CVE-2013-5635"
      },
      {
        "date": "2013-12-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201311-478"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "64026"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201311-478"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Check Point Endpoint Security of  Media Encryption EPM Explorer Vulnerabilities that bypass device locking protection mechanisms",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005338"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "trust management",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201311-478"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.