VAR-201401-0052
Vulnerability from variot - Updated: 2023-12-18 12:08The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to install Trojan horse firmware by leveraging cleartext credentials in a crafted (1) update or (2) reprogramming action. AirLink Raven X EV-DO is a small 3G network smart modem. AirLink Raven X EV-DO has an information disclosure vulnerability. Because the program fails to use encryption during the update and reprogramming process, the attacker can reprogram the firmware using the username and password stored in clear text. AirLink Raven X EV-DO is prone to an information-disclosure vulnerability Successful exploits will allow attackers to obtain sensitive information, such as user credentials, that may lead to further attacks
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201401-0052",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "raven x ev-do",
"scope": "eq",
"trust": 1.6,
"vendor": "sierrawireless",
"version": "4228_4.0.11.003"
},
{
"model": "raven x ev-do",
"scope": "eq",
"trust": 1.6,
"vendor": "sierrawireless",
"version": "4221_4.0.11.003"
},
{
"model": "airlink mp verizon wifi",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "pinpoint x",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "airlink mp row wifi",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "raven xe",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "raven x ev-do",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "pinpoint xt",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "airlink mp row",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "raven xt",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "airlink mp at\\\u0026t",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "airlink mp telus",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "airlink mp telus wifi",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "airlink mp bell wifi",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "airlink mp sprint wifi",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "airlink mp at\\\u0026t wifi",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "raven x",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "airlink mp verizon",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "airlink mp bell",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "airlink mp sprint",
"scope": "eq",
"trust": 1.0,
"vendor": "sierrawireless",
"version": null
},
{
"model": "airlink mp at\u0026t",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "airlink mp at\u0026t wifi",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "airlink mp bell",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "airlink mp bell wifi",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "airlink mp row",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "airlink mp row wifi",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "airlink mp sprint",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "airlink mp sprint wifi",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "airlink mp telus",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "airlink mp telus wifi",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "airlink mp verizon",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "airlink mp verizon wifi",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "pinpooint x",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "pinpooint xt",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "raven x",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "raven x ev-do",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "raven x ev-do",
"scope": "eq",
"trust": 0.8,
"vendor": "sierra",
"version": "4221_4.0.11.003"
},
{
"model": "raven x ev-do",
"scope": "eq",
"trust": 0.8,
"vendor": "sierra",
"version": "4228_4.0.11.003"
},
{
"model": "raven xe",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "raven xt",
"scope": null,
"trust": 0.8,
"vendor": "sierra",
"version": null
},
{
"model": "wireless airlink raven ev-do 4221 4.0.11.003",
"scope": "eq",
"trust": 0.6,
"vendor": "sierra",
"version": "x"
},
{
"model": "wireless airlink raven ev-do 4228 4.0.11.003",
"scope": "eq",
"trust": 0.6,
"vendor": "sierra",
"version": "x"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00190"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001184"
},
{
"db": "NVD",
"id": "CVE-2013-2819"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-179"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:sierrawireless:raven_x_ev-do_firmware:4221_4.0.11.003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sierrawireless:raven_x_ev-do_firmware:4228_4.0.11.003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:pinpoint_xt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:pinpoint_x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:raven_xt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:raven_xe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:airlink_mp_at\\\u0026t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:airlink_mp_bell:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:airlink_mp_sprint_wifi:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:airlink_mp_verizon_wifi:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:airlink_mp_telus:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:airlink_mp_telus_wifi:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:airlink_mp_row:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:airlink_mp_row_wifi:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:airlink_mp_sprint:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:airlink_mp_at\\\u0026t_wifi:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:airlink_mp_bell_wifi:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:airlink_mp_verizon:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:raven_x_ev-do:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:sierrawireless:raven_x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-2819"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cimation",
"sources": [
{
"db": "BID",
"id": "64702"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-179"
}
],
"trust": 0.9
},
"cve": "CVE-2013-2819",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2013-2819",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CNVD-2014-00190",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-62821",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-2819",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2014-00190",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201401-179",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-62821",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00190"
},
{
"db": "VULHUB",
"id": "VHN-62821"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001184"
},
{
"db": "NVD",
"id": "CVE-2013-2819"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-179"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to install Trojan horse firmware by leveraging cleartext credentials in a crafted (1) update or (2) reprogramming action. AirLink Raven X EV-DO is a small 3G network smart modem. AirLink Raven X EV-DO has an information disclosure vulnerability. Because the program fails to use encryption during the update and reprogramming process, the attacker can reprogram the firmware using the username and password stored in clear text. AirLink Raven X EV-DO is prone to an information-disclosure vulnerability\nSuccessful exploits will allow attackers to obtain sensitive information, such as user credentials, that may lead to further attacks",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-2819"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001184"
},
{
"db": "CNVD",
"id": "CNVD-2014-00190"
},
{
"db": "BID",
"id": "64702"
},
{
"db": "VULHUB",
"id": "VHN-62821"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-2819",
"trust": 3.4
},
{
"db": "ICS CERT",
"id": "ICSA-14-007-01A",
"trust": 2.5
},
{
"db": "BID",
"id": "64702",
"trust": 1.6
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001184",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201401-179",
"trust": 0.7
},
{
"db": "ICS CERT",
"id": "ICSA-14-007-01",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2014-00190",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-62821",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00190"
},
{
"db": "VULHUB",
"id": "VHN-62821"
},
{
"db": "BID",
"id": "64702"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001184"
},
{
"db": "NVD",
"id": "CVE-2013-2819"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-179"
}
]
},
"id": "VAR-201401-0052",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00190"
},
{
"db": "VULHUB",
"id": "VHN-62821"
}
],
"trust": 1.7
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00190"
}
]
},
"last_update_date": "2023-12-18T12:08:54.442000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "AirLink RavenSecurity Vulnerability",
"trust": 0.8,
"url": "http://www.sierrawireless.com/resources/support/airlink/docs/raven%20security%20vulnerability%202014-01-10.pdf"
},
{
"title": "AirLink Raven X EV-DO Information Disclosure Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/42227"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00190"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001184"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-255",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-62821"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001184"
},
{
"db": "NVD",
"id": "CVE-2013-2819"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-14-007-01a"
},
{
"trust": 1.7,
"url": "http://www.sierrawireless.com/resources/support/airlink/docs/raven%20security%20vulnerability%202014-01-10.pdf"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2819"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2819"
},
{
"trust": 0.6,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-14-007-01"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/64702"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00190"
},
{
"db": "VULHUB",
"id": "VHN-62821"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001184"
},
{
"db": "NVD",
"id": "CVE-2013-2819"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-179"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2014-00190"
},
{
"db": "VULHUB",
"id": "VHN-62821"
},
{
"db": "BID",
"id": "64702"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001184"
},
{
"db": "NVD",
"id": "CVE-2013-2819"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-179"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-01-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-00190"
},
{
"date": "2014-01-15T00:00:00",
"db": "VULHUB",
"id": "VHN-62821"
},
{
"date": "2014-01-07T00:00:00",
"db": "BID",
"id": "64702"
},
{
"date": "2014-01-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-001184"
},
{
"date": "2014-01-15T16:08:13.017000",
"db": "NVD",
"id": "CVE-2013-2819"
},
{
"date": "2014-01-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201401-179"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-01-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-00190"
},
{
"date": "2014-01-16T00:00:00",
"db": "VULHUB",
"id": "VHN-62821"
},
{
"date": "2014-07-25T00:47:00",
"db": "BID",
"id": "64702"
},
{
"date": "2014-01-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-001184"
},
{
"date": "2014-01-16T16:44:54.317000",
"db": "NVD",
"id": "CVE-2013-2819"
},
{
"date": "2014-01-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201401-179"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201401-179"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Sierra Wireless AirLink Raven X EV-DO Gateway Trojan Firmware Installation Vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-001184"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "trust management",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201401-179"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…