VAR-201504-0449
Vulnerability from variot - Updated: 2023-12-18 13:44Lenovo ThinkServer RD350, RD450, RD550, RD650, and TD350 servers before 1.26.0 use weak encryption to store (1) user and (2) administrator BIOS passwords, which allows attackers to decrypt the passwords via unspecified vectors. The Lenovo ThinkServer RD350, RD450, RD550, RD650 and TD350 are all rack-mounted server products from Lenovo. An attacker could exploit the vulnerability to crack a password. Multiple Lenovo products are prone to a BIOS password encryption weakness. A security vulnerability exists in several Lenovo ThinkServer product servers. The following products are affected: Lenovo ThinkServer RD350 prior to 1.26.0, RD450 prior to 1.26.0, RD550 prior to 1.26.0, RD650 prior to 1.26.0, TD350 prior to 1.26.0
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201504-0449",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "thinkserver td350",
"scope": "lt",
"trust": 1.4,
"vendor": "lenovo",
"version": "1.26.0"
},
{
"model": "thinkserver rd650",
"scope": "lt",
"trust": 1.4,
"vendor": "lenovo",
"version": "1.26.0"
},
{
"model": "thinkserver rd550",
"scope": "lt",
"trust": 1.4,
"vendor": "lenovo",
"version": "1.26.0"
},
{
"model": "thinkserver rd450",
"scope": "lt",
"trust": 1.4,
"vendor": "lenovo",
"version": "1.26.0"
},
{
"model": "thinkserver rd350",
"scope": "lt",
"trust": 1.4,
"vendor": "lenovo",
"version": "1.26.0"
},
{
"model": "thinkserver rd350",
"scope": "lte",
"trust": 1.0,
"vendor": "lenovo",
"version": "1.25.0"
},
{
"model": "thinkserver rd550",
"scope": "eq",
"trust": 1.0,
"vendor": "lenovo",
"version": "*"
},
{
"model": "thinkserver rd550",
"scope": "lte",
"trust": 1.0,
"vendor": "lenovo",
"version": "1.25.0"
},
{
"model": "thinkserver rd450",
"scope": "eq",
"trust": 1.0,
"vendor": "lenovo",
"version": "*"
},
{
"model": "thinkserver td350",
"scope": "eq",
"trust": 1.0,
"vendor": "lenovo",
"version": "*"
},
{
"model": "thinkserver rd350",
"scope": "eq",
"trust": 1.0,
"vendor": "lenovo",
"version": "*"
},
{
"model": "thinkserver td350",
"scope": "lte",
"trust": 1.0,
"vendor": "lenovo",
"version": "1.25.0"
},
{
"model": "thinkserver rd650",
"scope": "eq",
"trust": 1.0,
"vendor": "lenovo",
"version": "*"
},
{
"model": "thinkserver rd650",
"scope": "lte",
"trust": 1.0,
"vendor": "lenovo",
"version": "1.25.0"
},
{
"model": "thinkserver rd450",
"scope": "lte",
"trust": 1.0,
"vendor": "lenovo",
"version": "1.25.0"
},
{
"model": "thinkserver rd350",
"scope": null,
"trust": 0.8,
"vendor": "lenovo",
"version": null
},
{
"model": "thinkserver rd450",
"scope": null,
"trust": 0.8,
"vendor": "lenovo",
"version": null
},
{
"model": "thinkserver rd550",
"scope": null,
"trust": 0.8,
"vendor": "lenovo",
"version": null
},
{
"model": "thinkserver rd650",
"scope": null,
"trust": 0.8,
"vendor": "lenovo",
"version": null
},
{
"model": "thinkserver td350",
"scope": null,
"trust": 0.8,
"vendor": "lenovo",
"version": null
},
{
"model": "thinkserver rd350",
"scope": "eq",
"trust": 0.6,
"vendor": "lenovo",
"version": "1.25.0"
},
{
"model": "thinkserver rd550",
"scope": "eq",
"trust": 0.6,
"vendor": "lenovo",
"version": "1.25.0"
},
{
"model": "thinkserver rd450",
"scope": "eq",
"trust": 0.6,
"vendor": "lenovo",
"version": "1.25.0"
},
{
"model": "thinkserver rd650",
"scope": "eq",
"trust": 0.6,
"vendor": "lenovo",
"version": "1.25.0"
},
{
"model": "thinkserver td350",
"scope": "eq",
"trust": 0.6,
"vendor": "lenovo",
"version": "1.25.0"
},
{
"model": "thinkserver td350",
"scope": "eq",
"trust": 0.3,
"vendor": "lenovo",
"version": "1.25"
},
{
"model": "thinkserver rd650",
"scope": "eq",
"trust": 0.3,
"vendor": "lenovo",
"version": "1.25"
},
{
"model": "thinkserver rd550",
"scope": "eq",
"trust": 0.3,
"vendor": "lenovo",
"version": "1.25"
},
{
"model": "thinkserver rd450",
"scope": "eq",
"trust": 0.3,
"vendor": "lenovo",
"version": "1.25"
},
{
"model": "thinkserver rd350",
"scope": "eq",
"trust": 0.3,
"vendor": "lenovo",
"version": "1.25"
},
{
"model": "thinkserver td350",
"scope": "ne",
"trust": 0.3,
"vendor": "lenovo",
"version": "1.26"
},
{
"model": "thinkserver rd650",
"scope": "ne",
"trust": 0.3,
"vendor": "lenovo",
"version": "1.26"
},
{
"model": "thinkserver rd550",
"scope": "ne",
"trust": 0.3,
"vendor": "lenovo",
"version": "1.26"
},
{
"model": "thinkserver rd450",
"scope": "ne",
"trust": 0.3,
"vendor": "lenovo",
"version": "1.26"
},
{
"model": "thinkserver rd350",
"scope": "ne",
"trust": 0.3,
"vendor": "lenovo",
"version": "1.26"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02718"
},
{
"db": "BID",
"id": "74198"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002387"
},
{
"db": "NVD",
"id": "CVE-2015-3322"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-371"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:lenovo:thinkserver_rd650_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.25.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:lenovo:thinkserver_rd650:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:lenovo:thinkserver_td350_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.25.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:lenovo:thinkserver_td350:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:lenovo:thinkserver_rd350_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.25.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:lenovo:thinkserver_rd350:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:lenovo:thinkserver_rd550_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.25.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:lenovo:thinkserver_rd550:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:lenovo:thinkserver_rd450_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.25.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:lenovo:thinkserver_rd450:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-3322"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Lenovo",
"sources": [
{
"db": "BID",
"id": "74198"
}
],
"trust": 0.3
},
"cve": "CVE-2015-3322",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2015-3322",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-02718",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-81283",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-3322",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2015-02718",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201504-371",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-81283",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02718"
},
{
"db": "VULHUB",
"id": "VHN-81283"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002387"
},
{
"db": "NVD",
"id": "CVE-2015-3322"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-371"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Lenovo ThinkServer RD350, RD450, RD550, RD650, and TD350 servers before 1.26.0 use weak encryption to store (1) user and (2) administrator BIOS passwords, which allows attackers to decrypt the passwords via unspecified vectors. The Lenovo ThinkServer RD350, RD450, RD550, RD650 and TD350 are all rack-mounted server products from Lenovo. An attacker could exploit the vulnerability to crack a password. Multiple Lenovo products are prone to a BIOS password encryption weakness. A security vulnerability exists in several Lenovo ThinkServer product servers. The following products are affected: Lenovo ThinkServer RD350 prior to 1.26.0, RD450 prior to 1.26.0, RD550 prior to 1.26.0, RD650 prior to 1.26.0, TD350 prior to 1.26.0",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-3322"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002387"
},
{
"db": "CNVD",
"id": "CNVD-2015-02718"
},
{
"db": "BID",
"id": "74198"
},
{
"db": "VULHUB",
"id": "VHN-81283"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-3322",
"trust": 3.4
},
{
"db": "BID",
"id": "74198",
"trust": 1.4
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002387",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201504-371",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-02718",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-81283",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02718"
},
{
"db": "VULHUB",
"id": "VHN-81283"
},
{
"db": "BID",
"id": "74198"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002387"
},
{
"db": "NVD",
"id": "CVE-2015-3322"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-371"
}
]
},
"id": "VAR-201504-0449",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02718"
},
{
"db": "VULHUB",
"id": "VHN-81283"
}
],
"trust": 0.06999999999999999
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02718"
}
]
},
"last_update_date": "2023-12-18T13:44:20.466000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "LEN-2015-018",
"trust": 0.8,
"url": "http://support.lenovo.com/us/en/product_security/ts_bios_pw"
},
{
"title": "Patches for multiple vulnerabilities in several Lenovo ThinkServer product servers",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/57753"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02718"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002387"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-310",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-81283"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002387"
},
{
"db": "NVD",
"id": "CVE-2015-3322"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "https://support.lenovo.com/us/en/product_security/ts_bios_pw"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/74198"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3322"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3322"
},
{
"trust": 0.3,
"url": "http://www.lenovo.com/ca/en/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02718"
},
{
"db": "VULHUB",
"id": "VHN-81283"
},
{
"db": "BID",
"id": "74198"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002387"
},
{
"db": "NVD",
"id": "CVE-2015-3322"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-371"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-02718"
},
{
"db": "VULHUB",
"id": "VHN-81283"
},
{
"db": "BID",
"id": "74198"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002387"
},
{
"db": "NVD",
"id": "CVE-2015-3322"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-371"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-04-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-02718"
},
{
"date": "2015-04-16T00:00:00",
"db": "VULHUB",
"id": "VHN-81283"
},
{
"date": "2015-03-24T00:00:00",
"db": "BID",
"id": "74198"
},
{
"date": "2015-04-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-002387"
},
{
"date": "2015-04-16T23:59:03.557000",
"db": "NVD",
"id": "CVE-2015-3322"
},
{
"date": "2015-04-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201504-371"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-04-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-02718"
},
{
"date": "2017-01-18T00:00:00",
"db": "VULHUB",
"id": "VHN-81283"
},
{
"date": "2015-03-24T00:00:00",
"db": "BID",
"id": "74198"
},
{
"date": "2015-04-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-002387"
},
{
"date": "2017-01-18T02:59:00.750000",
"db": "NVD",
"id": "CVE-2015-3322"
},
{
"date": "2015-04-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201504-371"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201504-371"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Lenovo ThinkServer Vulnerability in product password decryption",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-002387"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201504-371"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…