VAR-201705-3542
Vulnerability from variot - Updated: 2023-12-18 13:39A Command Injection issue was discovered in Satel Iberia SenNet Data Logger and Electricity Meters: SenNet Optimal DataLogger V5.37c-1.43c and prior, SenNet Solar Datalogger V5.03-1.56a and prior, and SenNet Multitask Meter V5.21a-1.18b and prior. Successful exploitation of this vulnerability could result in the attacker breaking out of the jailed shell and gaining full access to the system. SatelSenNetOptimalDataLogger, SenNetSolarDatalogger and SenNetMultitaskMeter are products of Satel, Spain. Both SenNetOptimalDataLogger and SenNetSolarDatalogger are data collectors. The SenNetMultitaskMeter is a multi-function meter. There are command injection vulnerabilities in several Satel products. SenNet Data Logger and Electricity Meters are prone to a remote command-injection vulnerability. Successful exploit allows an attacker to execute arbitrary commands in the context of the affected devices
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201705-3542",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "sennet optimal datalogger",
"scope": "lte",
"trust": 1.0,
"vendor": "satel iberia",
"version": "5.37c-1.43c"
},
{
"model": "sennet multitask meter",
"scope": "lte",
"trust": 1.0,
"vendor": "satel iberia",
"version": "5.21a-1.18b"
},
{
"model": "sennet solar datalogger",
"scope": "lte",
"trust": 1.0,
"vendor": "satel iberia",
"version": "5.03-1.56a"
},
{
"model": "sennet multitask meter",
"scope": "lte",
"trust": 0.8,
"vendor": "satel iberia",
"version": "v5.21a-1.18b"
},
{
"model": "sennet optimal datalogger",
"scope": "lte",
"trust": 0.8,
"vendor": "satel iberia",
"version": "v5.37c-1.43c"
},
{
"model": "sennet solar datalogger",
"scope": "lte",
"trust": 0.8,
"vendor": "satel iberia",
"version": "v5.03-1.56a"
},
{
"model": "iberia sennet multitask meter \u003c=v5.21a-1.18b",
"scope": null,
"trust": 0.6,
"vendor": "satel",
"version": null
},
{
"model": "iberia sennet solar datalogger \u003c=v5.03-1.56a",
"scope": null,
"trust": 0.6,
"vendor": "satel",
"version": null
},
{
"model": "iberia sennet optimal datalogger \u003c=v5.37c-1.43c",
"scope": null,
"trust": 0.6,
"vendor": "satel",
"version": null
},
{
"model": "sennet solar datalogger",
"scope": "eq",
"trust": 0.6,
"vendor": "satel iberia",
"version": "5.03-1.56a"
},
{
"model": "sennet multitask meter",
"scope": "eq",
"trust": 0.6,
"vendor": "satel iberia",
"version": "5.21a-1.18b"
},
{
"model": "sennet optimal datalogger",
"scope": "eq",
"trust": 0.6,
"vendor": "satel iberia",
"version": "5.37c-1.43c"
},
{
"model": "iberia sennet solar datalogger 5.03-1.56a",
"scope": null,
"trust": 0.3,
"vendor": "satel",
"version": null
},
{
"model": "iberia sennet optimal datalogger 5.37c-1.43c",
"scope": null,
"trust": 0.3,
"vendor": "satel",
"version": null
},
{
"model": "iberia sennet multitask meter 5.21a-1.18b",
"scope": null,
"trust": 0.3,
"vendor": "satel",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "sennet multitask meter",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "sennet optimal datalogger",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "sennet solar datalogger",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "404d7f07-4689-4f7c-950c-b795eea8b7ee"
},
{
"db": "CNVD",
"id": "CNVD-2017-06954"
},
{
"db": "BID",
"id": "98417"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004293"
},
{
"db": "NVD",
"id": "CVE-2017-6048"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-640"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:satel-iberia:sennet_solar_datalogger:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.03-1.56a",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:satel-iberia:sennet_multitask_meter:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.21a-1.18b",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:satel-iberia:sennet_optimal_datalogger:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.37c-1.43c",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-6048"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Karn Ganeshan",
"sources": [
{
"db": "BID",
"id": "98417"
}
],
"trust": 0.3
},
"cve": "CVE-2017-6048",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2017-6048",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-06954",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "404d7f07-4689-4f7c-950c-b795eea8b7ee",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2017-6048",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-6048",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2017-06954",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201705-640",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "404d7f07-4689-4f7c-950c-b795eea8b7ee",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "404d7f07-4689-4f7c-950c-b795eea8b7ee"
},
{
"db": "CNVD",
"id": "CNVD-2017-06954"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004293"
},
{
"db": "NVD",
"id": "CVE-2017-6048"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-640"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A Command Injection issue was discovered in Satel Iberia SenNet Data Logger and Electricity Meters: SenNet Optimal DataLogger V5.37c-1.43c and prior, SenNet Solar Datalogger V5.03-1.56a and prior, and SenNet Multitask Meter V5.21a-1.18b and prior. Successful exploitation of this vulnerability could result in the attacker breaking out of the jailed shell and gaining full access to the system. SatelSenNetOptimalDataLogger, SenNetSolarDatalogger and SenNetMultitaskMeter are products of Satel, Spain. Both SenNetOptimalDataLogger and SenNetSolarDatalogger are data collectors. The SenNetMultitaskMeter is a multi-function meter. There are command injection vulnerabilities in several Satel products. SenNet Data Logger and Electricity Meters are prone to a remote command-injection vulnerability. \nSuccessful exploit allows an attacker to execute arbitrary commands in the context of the affected devices",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-6048"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004293"
},
{
"db": "CNVD",
"id": "CNVD-2017-06954"
},
{
"db": "BID",
"id": "98417"
},
{
"db": "IVD",
"id": "404d7f07-4689-4f7c-950c-b795eea8b7ee"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-6048",
"trust": 3.5
},
{
"db": "ICS CERT",
"id": "ICSA-17-131-02",
"trust": 3.3
},
{
"db": "CNVD",
"id": "CNVD-2017-06954",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201705-640",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004293",
"trust": 0.8
},
{
"db": "BID",
"id": "98417",
"trust": 0.3
},
{
"db": "IVD",
"id": "404D7F07-4689-4F7C-950C-B795EEA8B7EE",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "404d7f07-4689-4f7c-950c-b795eea8b7ee"
},
{
"db": "CNVD",
"id": "CNVD-2017-06954"
},
{
"db": "BID",
"id": "98417"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004293"
},
{
"db": "NVD",
"id": "CVE-2017-6048"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-640"
}
]
},
"id": "VAR-201705-3542",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "404d7f07-4689-4f7c-950c-b795eea8b7ee"
},
{
"db": "CNVD",
"id": "CNVD-2017-06954"
}
],
"trust": 1.55
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "404d7f07-4689-4f7c-950c-b795eea8b7ee"
},
{
"db": "CNVD",
"id": "CNVD-2017-06954"
}
]
},
"last_update_date": "2023-12-18T13:39:00.286000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.satel-iberia.com/"
},
{
"title": "Patches for various Satel product command injection vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/93947"
},
{
"title": "Multiple Satel Product Command Injection Vulnerability Fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=70110"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-06954"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004293"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-640"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-77",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-004293"
},
{
"db": "NVD",
"id": "CVE-2017-6048"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.3,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-131-02"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6048"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6048"
},
{
"trust": 0.3,
"url": "http://www.sennetmonitoring.com/en/dataloggers/"
},
{
"trust": 0.3,
"url": "http://www.sennetmonitoring.com/en/electricity-meters/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-06954"
},
{
"db": "BID",
"id": "98417"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004293"
},
{
"db": "NVD",
"id": "CVE-2017-6048"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-640"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "404d7f07-4689-4f7c-950c-b795eea8b7ee"
},
{
"db": "CNVD",
"id": "CNVD-2017-06954"
},
{
"db": "BID",
"id": "98417"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004293"
},
{
"db": "NVD",
"id": "CVE-2017-6048"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-640"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-05-18T00:00:00",
"db": "IVD",
"id": "404d7f07-4689-4f7c-950c-b795eea8b7ee"
},
{
"date": "2017-05-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-06954"
},
{
"date": "2017-05-11T00:00:00",
"db": "BID",
"id": "98417"
},
{
"date": "2017-06-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-004293"
},
{
"date": "2017-05-19T03:29:00.543000",
"db": "NVD",
"id": "CVE-2017-6048"
},
{
"date": "2017-05-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201705-640"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-05-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-06954"
},
{
"date": "2017-05-11T00:00:00",
"db": "BID",
"id": "98417"
},
{
"date": "2017-06-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-004293"
},
{
"date": "2019-10-09T23:28:38.310000",
"db": "NVD",
"id": "CVE-2017-6048"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201705-640"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201705-640"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Satel Iberia of SenNet Data Logger and Electricity Meters Command injection vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-004293"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Command injection",
"sources": [
{
"db": "IVD",
"id": "404d7f07-4689-4f7c-950c-b795eea8b7ee"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-640"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.