var-201703-0713
Vulnerability from variot
A vulnerability in the web-based GUI of Cisco Mobility Express 1800 Series Access Points could allow an unauthenticated, remote attacker to bypass authentication. The attacker could be granted full administrator privileges. The vulnerability is due to improper implementation of authentication for accessing certain web pages using the GUI interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface of the affected system. A successful exploit could allow the attacker to bypass authentication and perform unauthorized configuration changes or issue control commands to the affected device. This vulnerability affects Cisco Mobility Express 1800 Series Access Points running a software version prior to 8.2.110.0. Cisco Bug IDs: CSCuy68219. Vendors have confirmed this vulnerability Bug ID CSCuy68219 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. This may lead to further attacks. web-based GUI is a web-based graphical user interface used in it.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800 ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800"]
-----BEGIN PGP SIGNATURE-----
iQKBBAEBAgBrBQJYyWWBZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHlvtxAA20Aufg/w2bAsLWks nrc2gUsx8ZfpKwm1IyZbxvvAvk/CKqVpzycMOZQFnlauMp4nSVSA1DrIYnwGxgS9 nW3Gt1yk5J6JlvTTYFCmjcJnqo8dnC9UGs4eKsapCIHEyiOMyWuwk3LNbIVCk9G/ ymtCDf4cv+3380hqJpEOl/tsygmVWtmDAxVWiObX72N2y7XIQwUpGgteHU+ZMn15 kliO/Odtzi6q9qlR6oEMtdoTNEx3+2mDH9hU0snHLBEs66eITmTbYRTuHOw9YiiJ fS83QMzh3d8WsXmK+d4w0gOzvcBznObCt7gIvBo+54asza7kohCMcM1uNQlzg3cT 6j9Fq2/fQTWNRqdDmfF4OHZObR7gHIh9rCNC6jEyf4qtOIrK+MuXRVrxiHW+jUW9 hZ1w/CInZtBSiKsndwA9AJkgaza8anyASjPhOJ0oIMkVoxSndieA3kqcYyixKs8N 7Sl+CLp19QyffeN7SbVSeedefs29VCOrnTmHUT9qIh13/vMlcYUGyHFIhUsTs1Yq FDtjMIAST+bRime9dUpC3bNubSwLz1JuHD2AT/IWPMkCKSQVvd7f+vY+Urur+i96 6PR5oizd/gP6RKL/78wp7DOGCt1ztclmpIdFBxj1LwH5KKP/lBTjvK54NUsUkoL+ +CvKEPjezdvugZOOoo6K2VXf4QY= =Xeal -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201703-0713", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "aironet access point software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.1\\(112.3\\)" }, { "model": "aironet access point software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.1\\(112.4\\)" }, { "model": "aironet access point software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.1\\(15.14\\)" }, { "model": "aironet access point software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.1\\(131.0\\)" }, { "model": "aironet access point software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.1(112.3)" }, { "model": "aironet access point software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.1(112.4)" }, { "model": "aironet access point software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.1(131.0)" }, { "model": "aironet access point software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.1(15.14)" }, { "model": "mobility express access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "18008.2" }, { "model": "mobility express access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "18008.1.10.159" }, { "model": "mobility express access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "18008.1" }, { "model": "mobility express access points", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "18008.2.130.0" } ], "sources": [ { "db": "BID", "id": "96909" }, { "db": "JVNDB", "id": "JVNDB-2017-002639" }, { "db": "NVD", "id": "CVE-2017-3831" }, { "db": "CNNVD", "id": "CNNVD-201703-637" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:aironet_access_point_software:8.1\\(112.3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:aironet_access_point_software:8.1\\(112.4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:aironet_access_point_software:8.1\\(15.14\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:aironet_access_point_software:8.1\\(131.0\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-3831" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Bijay Limbu Senihang of Rigo Information Technology.", "sources": [ { "db": "BID", "id": "96909" } ], "trust": 0.3 }, "cve": "CVE-2017-3831", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2017-3831", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-112034", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-3831", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-3831", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-201703-637", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-112034", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-112034" }, { "db": "JVNDB", "id": "JVNDB-2017-002639" }, { "db": "NVD", "id": "CVE-2017-3831" }, { "db": "CNNVD", "id": "CNNVD-201703-637" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the web-based GUI of Cisco Mobility Express 1800 Series Access Points could allow an unauthenticated, remote attacker to bypass authentication. The attacker could be granted full administrator privileges. The vulnerability is due to improper implementation of authentication for accessing certain web pages using the GUI interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface of the affected system. A successful exploit could allow the attacker to bypass authentication and perform unauthorized configuration changes or issue control commands to the affected device. This vulnerability affects Cisco Mobility Express 1800 Series Access Points running a software version prior to 8.2.110.0. Cisco Bug IDs: CSCuy68219. Vendors have confirmed this vulnerability Bug ID CSCuy68219 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. This may lead to further attacks. web-based GUI is a web-based graphical user interface used in it. \n\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. \n\nThis advisory is available at the following link:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800 [\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800\"]\n\n-----BEGIN PGP SIGNATURE-----\n\niQKBBAEBAgBrBQJYyWWBZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg\nSW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx\nNykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHlvtxAA20Aufg/w2bAsLWks\nnrc2gUsx8ZfpKwm1IyZbxvvAvk/CKqVpzycMOZQFnlauMp4nSVSA1DrIYnwGxgS9\nnW3Gt1yk5J6JlvTTYFCmjcJnqo8dnC9UGs4eKsapCIHEyiOMyWuwk3LNbIVCk9G/\nymtCDf4cv+3380hqJpEOl/tsygmVWtmDAxVWiObX72N2y7XIQwUpGgteHU+ZMn15\nkliO/Odtzi6q9qlR6oEMtdoTNEx3+2mDH9hU0snHLBEs66eITmTbYRTuHOw9YiiJ\nfS83QMzh3d8WsXmK+d4w0gOzvcBznObCt7gIvBo+54asza7kohCMcM1uNQlzg3cT\n6j9Fq2/fQTWNRqdDmfF4OHZObR7gHIh9rCNC6jEyf4qtOIrK+MuXRVrxiHW+jUW9\nhZ1w/CInZtBSiKsndwA9AJkgaza8anyASjPhOJ0oIMkVoxSndieA3kqcYyixKs8N\n7Sl+CLp19QyffeN7SbVSeedefs29VCOrnTmHUT9qIh13/vMlcYUGyHFIhUsTs1Yq\nFDtjMIAST+bRime9dUpC3bNubSwLz1JuHD2AT/IWPMkCKSQVvd7f+vY+Urur+i96\n6PR5oizd/gP6RKL/78wp7DOGCt1ztclmpIdFBxj1LwH5KKP/lBTjvK54NUsUkoL+\n+CvKEPjezdvugZOOoo6K2VXf4QY=\n=Xeal\n-----END PGP SIGNATURE-----\n\n", "sources": [ { "db": "NVD", "id": "CVE-2017-3831" }, { "db": "JVNDB", "id": "JVNDB-2017-002639" }, { "db": "BID", "id": "96909" }, { "db": "VULHUB", "id": "VHN-112034" }, { "db": "PACKETSTORM", "id": "141660" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-112034", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-112034" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-3831", "trust": 2.9 }, { "db": "BID", "id": "96909", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2017-002639", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201703-637", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "141660", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-112034", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-112034" }, { "db": "BID", "id": "96909" }, { "db": "JVNDB", "id": "JVNDB-2017-002639" }, { "db": "PACKETSTORM", "id": "141660" }, { "db": "NVD", "id": "CVE-2017-3831" }, { "db": "CNNVD", "id": "CNNVD-201703-637" } ] }, "id": "VAR-201703-0713", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-112034" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:01:40.534000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20170315-ap1800", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170315-ap1800" }, { "title": "Cisco Mobility Express 1800 Series Access Points Fixes for permission permissions and access control vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=68498" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-002639" }, { "db": "CNNVD", "id": "CNNVD-201703-637" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "CWE-264", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-112034" }, { "db": "JVNDB", "id": "JVNDB-2017-002639" }, { "db": "NVD", "id": "CVE-2017-3831" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170315-ap1800" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/96909" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3831" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-3831" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170315-ap1800\"]" } ], "sources": [ { "db": "VULHUB", "id": "VHN-112034" }, { "db": "BID", "id": "96909" }, { "db": "JVNDB", "id": "JVNDB-2017-002639" }, { "db": "PACKETSTORM", "id": "141660" }, { "db": "NVD", "id": "CVE-2017-3831" }, { "db": "CNNVD", "id": "CNNVD-201703-637" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-112034" }, { "db": "BID", "id": "96909" }, { "db": "JVNDB", "id": "JVNDB-2017-002639" }, { "db": "PACKETSTORM", "id": "141660" }, { "db": "NVD", "id": "CVE-2017-3831" }, { "db": "CNNVD", "id": "CNNVD-201703-637" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-03-15T00:00:00", "db": "VULHUB", "id": "VHN-112034" }, { "date": "2017-03-15T00:00:00", "db": "BID", "id": "96909" }, { "date": "2017-04-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-002639" }, { "date": "2017-03-16T00:05:10", "db": "PACKETSTORM", "id": "141660" }, { "date": "2017-03-15T20:59:00.193000", "db": "NVD", "id": "CVE-2017-3831" }, { "date": "2017-03-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-637" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-112034" }, { "date": "2017-03-16T00:03:00", "db": "BID", "id": "96909" }, { "date": "2017-04-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-002639" }, { "date": "2019-10-09T23:27:39.087000", "db": "NVD", "id": "CVE-2017-3831" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-637" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "141660" }, { "db": "CNNVD", "id": "CNNVD-201703-637" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Mobility Express 1800 Vulnerability related to authorization, authority, and access control in software of series access point", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-002639" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-637" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.