VAR-201607-0387

Vulnerability from variot - Updated: 2023-12-18 13:09

Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 does not invalidate credentials upon a logout action, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation. Rockwell Automation FactoryTalk EnergyMetrix Contains a vulnerability that allows access rights to be obtained. Supplementary information : CWE Vulnerability type by CWE-285: Improper Authorization ( Inappropriate authentication ) Has been identified. http://cwe.mitre.org/data/definitions/285.htmlA third party may gain access by using an unattended workstation. Rockwell Automation FactoryTalk EnergyMetrix is a Web-based software management package for capturing, analyzing, storing, and sharing energy data from Rockwell Automation. Rockwell Automation FactoryTalk EnergyMetrix is prone to multiple security vulnerabilities. An attacker may exploit these issues to perform unauthorized actions or to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201607-0387",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "factorytalk energrymetrix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "2.10.00"
      },
      {
        "model": "factorytalk energymetrix",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "2.20.00"
      },
      {
        "model": "automation factorytalk energymetrix",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "2.20.00"
      },
      {
        "model": "factorytalk energrymetrix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "2.10.00"
      },
      {
        "model": "automation factorytalk energymetrix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "2.10"
      },
      {
        "model": "automation factorytalk energymetrix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "2.30"
      },
      {
        "model": "automation factorytalk energymetrix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "2.20"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "factorytalk energrymetrix",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "BID",
        "id": "92135"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:rockwellautomation:factorytalk_energrymetrix:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.10.00",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rockwell Automation",
    "sources": [
      {
        "db": "BID",
        "id": "92135"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2016-4531",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2016-4531",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-05947",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-93350",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "LOW",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 3.9,
            "impactScore": 3.4,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "Low",
            "baseScore": 7.3,
            "baseSeverity": "High",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2016-4531",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2016-4531",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-05947",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201607-1015",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-93350",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93350"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 does not invalidate credentials upon a logout action, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation. Rockwell Automation FactoryTalk EnergyMetrix Contains a vulnerability that allows access rights to be obtained. Supplementary information : CWE Vulnerability type by CWE-285: Improper Authorization ( Inappropriate authentication ) Has been identified. http://cwe.mitre.org/data/definitions/285.htmlA third party may gain access by using an unattended workstation. Rockwell Automation FactoryTalk EnergyMetrix is a Web-based software management package for capturing, analyzing, storing, and sharing energy data from Rockwell Automation. Rockwell Automation FactoryTalk EnergyMetrix is prone to multiple security vulnerabilities. \nAn attacker may exploit these issues to perform unauthorized actions or to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "BID",
        "id": "92135"
      },
      {
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93350"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-4531",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-173-03",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "92135",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "FCEC3AA8-7B6B-4D5F-A5EC-8AE0369B645F",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-93350",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93350"
      },
      {
        "db": "BID",
        "id": "92135"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      }
    ]
  },
  "id": "VAR-201607-0387",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93350"
      }
    ],
    "trust": 1.54285713
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:09:02.982000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "FactoryTalk EnergyMetrix",
        "trust": 0.8,
        "url": "http://www.rockwellautomation.com/rockwellsoftware/products/factorytalk-energymetrix.page"
      },
      {
        "title": "Find Downloads",
        "trust": 0.8,
        "url": "http://compatibility.rockwellautomation.com/pages/multiproductdownload.aspx?famid=1\u0026crumb=112"
      },
      {
        "title": "Patch for Rockwell Automation FactoryTalk EnergyMetrix Privilege Escalation Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/80038"
      },
      {
        "title": "Rockwell Automation FactoryTalk EnergyMetrix Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=63344"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-285",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-93350"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-173-03"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/92135"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4531"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4531"
      },
      {
        "trust": 0.3,
        "url": "http://www.rockwellautomation.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93350"
      },
      {
        "db": "BID",
        "id": "92135"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93350"
      },
      {
        "db": "BID",
        "id": "92135"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-08-03T00:00:00",
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "date": "2016-08-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "date": "2016-07-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-93350"
      },
      {
        "date": "2016-07-26T00:00:00",
        "db": "BID",
        "id": "92135"
      },
      {
        "date": "2016-08-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "date": "2016-07-28T02:02:12.700000",
        "db": "NVD",
        "id": "CVE-2016-4531"
      },
      {
        "date": "2016-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-08-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "date": "2016-11-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-93350"
      },
      {
        "date": "2016-07-26T00:00:00",
        "db": "BID",
        "id": "92135"
      },
      {
        "date": "2016-08-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "date": "2016-11-28T20:18:39.493000",
        "db": "NVD",
        "id": "CVE-2016-4531"
      },
      {
        "date": "2016-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rockwell Automation FactoryTalk EnergyMetrix Vulnerabilities that gain access",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…