VAR-201412-0027
Vulnerability from variot - Updated: 2023-12-18 13:29Emerson Process Management ROC800 RTU with software 3.50 and earlier, DL8000 RTU with software 2.30 and earlier, and ROC800L RTU with software 1.20 and earlier allows remote attackers to execute arbitrary commands via a TCP replay attack. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. http://cwe.mitre.org/data/definitions/77.htmlBy a third party TCP Reflex attack ( Replay attack ) An arbitrary command may be executed via. The ROC800 RTU product is used to perform multiple PLC-like functions on the control device. Emerson Process Management's ROC800, DL8000 and ROC800L have security bypass vulnerabilities. Allows an attacker to bypass authentication and perform unauthorized operations. The following versions are affected: ROC800 3.50 and prior DL8000 2.30 and prior ROC800L 1.20 and prior. Emerson Process Management ROC800 RTU, DL8000 RTU and ROC800L RTU are all remote terminal unit (RTU) products of Emerson Electric (Emerson Electric) in the United States. Function
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201412-0027",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "dl 8000 remote terminal unit",
"scope": "eq",
"trust": 1.6,
"vendor": "emerson",
"version": "2.30"
},
{
"model": "roc 800l remote terminal unit",
"scope": "eq",
"trust": 1.0,
"vendor": "emerson",
"version": null
},
{
"model": "roc 800 remote terminal unit",
"scope": "eq",
"trust": 1.0,
"vendor": "emerson",
"version": null
},
{
"model": "roc 800 remote terminal unit",
"scope": "lte",
"trust": 1.0,
"vendor": "emerson",
"version": "3.50"
},
{
"model": "dl 8000 remote terminal unit",
"scope": "eq",
"trust": 1.0,
"vendor": "emerson",
"version": null
},
{
"model": "roc 800l remote terminal unit",
"scope": "lte",
"trust": 1.0,
"vendor": "emerson",
"version": "1.20"
},
{
"model": "dl8000 rtu",
"scope": null,
"trust": 0.8,
"vendor": "emerson",
"version": null
},
{
"model": "dl8000 rtu",
"scope": "lte",
"trust": 0.8,
"vendor": "emerson",
"version": "2.30"
},
{
"model": "roc800 rtu",
"scope": null,
"trust": 0.8,
"vendor": "emerson",
"version": null
},
{
"model": "roc800 rtu",
"scope": "lte",
"trust": 0.8,
"vendor": "emerson",
"version": "3.50"
},
{
"model": "roc800l rtu",
"scope": null,
"trust": 0.8,
"vendor": "emerson",
"version": null
},
{
"model": "roc800l rtu",
"scope": "lte",
"trust": 0.8,
"vendor": "emerson",
"version": "1.20"
},
{
"model": "electric co roc800l",
"scope": "eq",
"trust": 0.6,
"vendor": "emerson",
"version": "1.20"
},
{
"model": "electric co dl8000",
"scope": "eq",
"trust": 0.6,
"vendor": "emerson",
"version": "2.30"
},
{
"model": "electric co roc800",
"scope": "eq",
"trust": 0.6,
"vendor": "emerson",
"version": "3.50"
},
{
"model": "roc 800l remote terminal unit",
"scope": "eq",
"trust": 0.6,
"vendor": "emerson",
"version": "1.20"
},
{
"model": "roc 800 remote terminal unit",
"scope": "eq",
"trust": 0.6,
"vendor": "emerson",
"version": "3.50"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "roc 800 remote terminal unit",
"version": "3.50"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "dl 8000 remote terminal unit",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "roc 800l remote terminal unit",
"version": "1.20"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "dl 8000 remote terminal unit",
"version": "2.30"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "roc 800l remote terminal unit",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "roc 800 remote terminal unit",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "b2728756-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-08734"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-006701"
},
{
"db": "NVD",
"id": "CVE-2013-2810"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-101"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:emerson:dl_8000_remote_terminal_unit_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:emerson:dl_8000_remote_terminal_unit:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:emerson:roc_800l_remote_terminal_unit_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:emerson:roc_800l_remote_terminal_unit:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:emerson:roc_800_remote_terminal_unit_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.50",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:emerson:roc_800_remote_terminal_unit:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-2810"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Dillon Beresford, Brian Meixell, Marc Ayala and Eric Forner of Cimation",
"sources": [
{
"db": "BID",
"id": "71425"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-101"
}
],
"trust": 0.9
},
"cve": "CVE-2013-2810",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2013-2810",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2014-08734",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "b2728756-2351-11e6-abef-000c29c66e3d",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-62812",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-2810",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2014-08734",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201412-101",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "b2728756-2351-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-62812",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "b2728756-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-08734"
},
{
"db": "VULHUB",
"id": "VHN-62812"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-006701"
},
{
"db": "NVD",
"id": "CVE-2013-2810"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-101"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Emerson Process Management ROC800 RTU with software 3.50 and earlier, DL8000 RTU with software 2.30 and earlier, and ROC800L RTU with software 1.20 and earlier allows remote attackers to execute arbitrary commands via a TCP replay attack. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. http://cwe.mitre.org/data/definitions/77.htmlBy a third party TCP Reflex attack ( Replay attack ) An arbitrary command may be executed via. The ROC800 RTU product is used to perform multiple PLC-like functions on the control device. Emerson Process Management\u0027s ROC800, DL8000 and ROC800L have security bypass vulnerabilities. Allows an attacker to bypass authentication and perform unauthorized operations. \nThe following versions are affected:\nROC800 3.50 and prior\nDL8000 2.30 and prior\nROC800L 1.20 and prior. Emerson Process Management ROC800 RTU, DL8000 RTU and ROC800L RTU are all remote terminal unit (RTU) products of Emerson Electric (Emerson Electric) in the United States. Function",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-2810"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-006701"
},
{
"db": "CNVD",
"id": "CNVD-2014-08734"
},
{
"db": "BID",
"id": "71425"
},
{
"db": "IVD",
"id": "b2728756-2351-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-62812"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-2810",
"trust": 3.6
},
{
"db": "BID",
"id": "71425",
"trust": 2.6
},
{
"db": "ICS CERT",
"id": "ICSA-13-259-01A",
"trust": 2.5
},
{
"db": "CNNVD",
"id": "CNNVD-201412-101",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2014-08734",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-006701",
"trust": 0.8
},
{
"db": "XF",
"id": "99131",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "28611",
"trust": 0.6
},
{
"db": "IVD",
"id": "B2728756-2351-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-62812",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "b2728756-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-08734"
},
{
"db": "VULHUB",
"id": "VHN-62812"
},
{
"db": "BID",
"id": "71425"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-006701"
},
{
"db": "NVD",
"id": "CVE-2013-2810"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-101"
}
]
},
"id": "VAR-201412-0027",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "b2728756-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-08734"
},
{
"db": "VULHUB",
"id": "VHN-62812"
}
],
"trust": 1.9
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "b2728756-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-08734"
}
]
},
"last_update_date": "2023-12-18T13:29:39.360000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "\u65e5\u672c\u30a8\u30de\u30bd\u30f3\u682a\u5f0f\u4f1a\u793e",
"trust": 0.8,
"url": "http://www.emerson.co.jp/index.html"
},
{
"title": "Multiple Emerson Process Management RTUs security bypass vulnerability patches",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/52477"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-08734"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-006701"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-77",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-62812"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-006701"
},
{
"db": "NVD",
"id": "CVE-2013-2810"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-13-259-01a"
},
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/71425"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99131"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2810"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2810"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/99131"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/28611"
},
{
"trust": 0.3,
"url": "http://www2.emersonprocess.com/en-us/brands/deltav/pages/index.aspx"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-08734"
},
{
"db": "VULHUB",
"id": "VHN-62812"
},
{
"db": "BID",
"id": "71425"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-006701"
},
{
"db": "NVD",
"id": "CVE-2013-2810"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-101"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "b2728756-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-08734"
},
{
"db": "VULHUB",
"id": "VHN-62812"
},
{
"db": "BID",
"id": "71425"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-006701"
},
{
"db": "NVD",
"id": "CVE-2013-2810"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-101"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-12-05T00:00:00",
"db": "IVD",
"id": "b2728756-2351-11e6-abef-000c29c66e3d"
},
{
"date": "2014-12-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-08734"
},
{
"date": "2014-12-08T00:00:00",
"db": "VULHUB",
"id": "VHN-62812"
},
{
"date": "2014-12-03T00:00:00",
"db": "BID",
"id": "71425"
},
{
"date": "2014-12-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-006701"
},
{
"date": "2014-12-08T11:59:00.077000",
"db": "NVD",
"id": "CVE-2013-2810"
},
{
"date": "2014-12-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201412-101"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-12-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-08734"
},
{
"date": "2017-08-29T00:00:00",
"db": "VULHUB",
"id": "VHN-62812"
},
{
"date": "2014-12-24T00:55:00",
"db": "BID",
"id": "71425"
},
{
"date": "2014-12-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-006701"
},
{
"date": "2017-08-29T01:33:17.277000",
"db": "NVD",
"id": "CVE-2013-2810"
},
{
"date": "2014-12-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201412-101"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201412-101"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Emerson Process Management RTU Vulnerability to execute arbitrary commands in product software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-006701"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "71425"
}
],
"trust": 0.3
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.