VAR-201508-0370

Vulnerability from variot - Updated: 2023-12-18 13:03

Unquoted Windows search path vulnerability in the autorun value in Dell SonicWall NetExtender before 7.5.227 and 8.0.x before 8.0.238, as used in the SRA firmware before 7.5.1.2-40sv and 8.x before 8.0.0.3-23sv, allows local users to gain privileges via a Trojan horse program in the %SYSTEMDRIVE% folder. Supplementary information : CWE Vulnerability type by CWE-428: Unquoted Search Path or Element ( Unquoted search path or element ) Has been identified. http://cwe.mitre.org/data/definitions/428.htmlBy local users %SYSTEMDRIVE% Permissions may be obtained through the folder Trojan program. Dell SonicWall NetExtender is prone to a remote privilege-escalation vulnerability. Remote attackers can exploit this issue to execute arbitrary code with elevated privileges. Dell SonicWall NetExtender is a SonicWALL network security appliance (NSA) thin client of Dell (Dell), which supports secure connections to remote networks, and can run any application, upload and download files, etc. Dell SonicWall NetExtender Unquoted Autorun Privilege Escalation

Vendor Website : http://www.sonicwall.com

INDEX

1. CVE
2. Background
3. Description
4. Affected Products
5. Solution
6. Credit
7. Disclosure Timeline

1. CVE

CVE: 2015-4173

2. BACKGROUND

SonicWALL NetExtender is a transparent software application for users that enables remote users to securely connect to the remote network. With NetExtender, remote users can securely run any application on the remote network. Users can upload and download files, mount network drives, and access resources in the same way as if they were on the local network. The NetExtender connection uses a Point-to-Point Protocol (PPP) connection
  1. Placement of a malicious binary by a potential attacker within the parent path could allow privileged code execution upon administrative login.

4. AFFECTED PRODUCTS

Dell SonicWall NetExtender 7.5.215

5. SOLUTION

Upgrade to firmware version 7.5.1.2 or 8.0.0.3.

6. CREDIT

This vulnerability was discovered by Andrew Smith of Sword & Shield Enterprise Security.

7. DISCLOSURE TIMELINE

5-24-2015 - Vulnerability Discovered/Vendor Informed
5-28-2015 - Vendor Confirmed Report/Vendor Gives Fix Timeline
5-29-2015 - CVE Requested
8-14-2015 - Fix Released and Public Disclosure by Vendor

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201508-0370",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "netextender",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "8.0"
      },
      {
        "model": "netextender",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "8.0.238"
      },
      {
        "model": "netextender",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "7.5.227"
      },
      {
        "model": "sonicwall netextender",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.0.0.3"
      },
      {
        "model": "sonicwall netextender",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.x"
      },
      {
        "model": "netextender",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sonicwall",
        "version": "8.0.0.0"
      },
      {
        "model": "netextender",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sonicwall",
        "version": "8.0.0.2"
      },
      {
        "model": "netextender",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sonicwall",
        "version": "8.0.0.1"
      },
      {
        "model": "netextender",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sonicwall",
        "version": "7.5.1.1"
      },
      {
        "model": "sonicwall netextender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "7.5.215"
      },
      {
        "model": "sonicwall netextender",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dell",
        "version": "8.0.0.3"
      },
      {
        "model": "sonicwall netextender",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dell",
        "version": "7.5.1.2"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "76461"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004497"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-4173"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-544"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:*",
                "cpe_name": [],
                "versionEndExcluding": "7.5.227",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:*",
                "cpe_name": [],
                "versionEndExcluding": "8.0.238",
                "versionStartIncluding": "8.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-4173"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Andrew Smith of Sword \u0026 Shield Enterprise Security.",
    "sources": [
      {
        "db": "BID",
        "id": "76461"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-4173",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 4.4,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2015-4173",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "VHN-82134",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULMON",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "CVE-2015-4173",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-4173",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201508-544",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-82134",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2015-4173",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-82134"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-4173"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004497"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-4173"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-544"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unquoted Windows search path vulnerability in the autorun value in Dell SonicWall NetExtender before 7.5.227 and 8.0.x before 8.0.238, as used in the SRA firmware before 7.5.1.2-40sv and 8.x before 8.0.0.3-23sv, allows local users to gain privileges via a Trojan horse program in the %SYSTEMDRIVE% folder. Supplementary information : CWE Vulnerability type by CWE-428: Unquoted Search Path or Element ( Unquoted search path or element ) Has been identified. http://cwe.mitre.org/data/definitions/428.htmlBy local users %SYSTEMDRIVE% Permissions may be obtained through the folder Trojan program. Dell SonicWall NetExtender is prone to a remote privilege-escalation vulnerability. \nRemote attackers can exploit this issue to execute arbitrary code with elevated privileges. Dell SonicWall NetExtender is a SonicWALL network security appliance (NSA) thin client of Dell (Dell), which supports secure connections to remote networks, and can run any application, upload and download files, etc. Dell SonicWall NetExtender Unquoted Autorun Privilege Escalation\n\nVendor Website : http://www.sonicwall.com\n\nINDEX\n---------------------------------------\n    1. CVE\n    2. Background\n    3. Description\n    4. Affected Products\n    5. Solution\n    6. Credit\n    7. Disclosure Timeline\n\n1. CVE\n---------------------------------------\n    CVE: 2015-4173\n\n\n2. BACKGROUND\n---------------------------------------\n    SonicWALL NetExtender is a transparent software application for users that enables remote users to securely connect to the remote network. With NetExtender, remote users can securely run any application on the remote network. Users can upload and download files, mount network drives, and access resources in the same way as if they were on the local network. The NetExtender connection uses a Point-to-Point Protocol (PPP) connection\n\n\n3. Placement of a malicious binary by a potential attacker within the parent path could allow privileged code execution upon administrative login. \n\n\n4. AFFECTED PRODUCTS\n---------------------------------------\n    Dell SonicWall NetExtender 7.5.215\n\n\n5. SOLUTION\n---------------------------------------\n    Upgrade to firmware version 7.5.1.2 or 8.0.0.3. \n\n\n6. CREDIT\n---------------------------------------\n    This vulnerability was discovered by Andrew Smith of Sword \u0026 Shield Enterprise Security. \n\n\n7. DISCLOSURE TIMELINE\n---------------------------------------\n    5-24-2015 - Vulnerability Discovered/Vendor Informed\n    5-28-2015 - Vendor Confirmed Report/Vendor Gives Fix Timeline\n    5-29-2015 - CVE Requested\n    8-14-2015 - Fix Released and Public Disclosure by Vendor\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-4173"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004497"
      },
      {
        "db": "BID",
        "id": "76461"
      },
      {
        "db": "VULHUB",
        "id": "VHN-82134"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-4173"
      },
      {
        "db": "PACKETSTORM",
        "id": "133302"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-4173",
        "trust": 3.0
      },
      {
        "db": "PACKETSTORM",
        "id": "133302",
        "trust": 2.7
      },
      {
        "db": "SECTRACK",
        "id": "1033417",
        "trust": 1.2
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004497",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-544",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "76461",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-82134",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-4173",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-82134"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-4173"
      },
      {
        "db": "BID",
        "id": "76461"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004497"
      },
      {
        "db": "PACKETSTORM",
        "id": "133302"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-4173"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-544"
      }
    ]
  },
  "id": "VAR-201508-0370",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-82134"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:03:22.579000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Dell SonicWALL Notice Concerning Privilege Escalation Vulnerability in the Windows NetExtender client (CVE-2015-4173)",
        "trust": 0.8,
        "url": "https://support.software.dell.com/ja-jp/product-notification/157537?productname=sonicwall%20netextender"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.sonicwall.com/japan/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004497"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-428",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-82134"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004497"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-4173"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://packetstormsecurity.com/files/133302/dell-sonicwall-netextender-7.5.215-privilege-escalation.html"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/536303/100/0/threaded"
      },
      {
        "trust": 1.2,
        "url": "https://support.software.dell.com/product-notification/157537"
      },
      {
        "trust": 1.2,
        "url": "http://www.securitytracker.com/id/1033417"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4173"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4173"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/536303/100/0/threaded"
      },
      {
        "trust": 0.3,
        "url": "https://support.software.dell.com/sonicwall-netextender/windows"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/bugtraq/2015/aug/60"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/428.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4173"
      },
      {
        "trust": 0.1,
        "url": "http://www.sonicwall.com"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-82134"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-4173"
      },
      {
        "db": "BID",
        "id": "76461"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004497"
      },
      {
        "db": "PACKETSTORM",
        "id": "133302"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-4173"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-544"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-82134"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-4173"
      },
      {
        "db": "BID",
        "id": "76461"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004497"
      },
      {
        "db": "PACKETSTORM",
        "id": "133302"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-4173"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-544"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-08-26T00:00:00",
        "db": "VULHUB",
        "id": "VHN-82134"
      },
      {
        "date": "2015-08-26T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-4173"
      },
      {
        "date": "2015-08-24T00:00:00",
        "db": "BID",
        "id": "76461"
      },
      {
        "date": "2015-08-31T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-004497"
      },
      {
        "date": "2015-08-25T01:06:02",
        "db": "PACKETSTORM",
        "id": "133302"
      },
      {
        "date": "2015-08-26T19:59:06.690000",
        "db": "NVD",
        "id": "CVE-2015-4173"
      },
      {
        "date": "2015-08-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201508-544"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-08-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-82134"
      },
      {
        "date": "2020-08-05T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-4173"
      },
      {
        "date": "2015-08-24T00:00:00",
        "db": "BID",
        "id": "76461"
      },
      {
        "date": "2015-08-31T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-004497"
      },
      {
        "date": "2020-08-05T15:04:21.490000",
        "db": "NVD",
        "id": "CVE-2015-4173"
      },
      {
        "date": "2015-08-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201508-544"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-544"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Dell SonicWall NetExtender Firmware  autorun Vulnerability that can be obtained privilege in the value of",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004497"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "76461"
      }
    ],
    "trust": 0.3
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…