var-201710-0749
Vulnerability from variot
Vulnerability in the Oracle Integrated Lights Out Manager (ILOM) component of Oracle Sun Systems Products Suite (subcomponent: System Management). The supported version that is affected is Prior to 3.2.6. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Integrated Lights Out Manager (ILOM). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Integrated Lights Out Manager (ILOM) accessible data. CVSS 3.0 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). The vulnerability can be exploited over the 'HTTP' protocol. Attackers can take advantage of this vulnerability to read data without authorization, affecting the confidentiality of data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0749", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "integrated lights out manager", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "3.2.5" }, { "model": "integrated lights out manager", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "3.2.5" }, { "model": "integrated lights out manager", "scope": "lt", "trust": 0.8, "vendor": "oracle", "version": "3.2.6" }, { "model": "integrated lights out manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.4" }, { "model": "integrated lights out manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.3" }, { "model": "integrated lights out manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2" }, { "model": "integrated lights out manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.1" }, { "model": "integrated lights out manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.0" } ], "sources": [ { "db": "BID", "id": "101445" }, { "db": "JVNDB", "id": "JVNDB-2017-008675" }, { "db": "NVD", "id": "CVE-2017-10194" }, { "db": "CNNVD", "id": "CNNVD-201710-841" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.2.5", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-10194" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Oracle", "sources": [ { "db": "BID", "id": "101445" } ], "trust": 0.3 }, "cve": "CVE-2017-10194", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2017-10194", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-100492", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.2, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.7, "baseSeverity": "Low", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2017-10194", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-10194", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201710-841", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-100492", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2017-10194", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-100492" }, { "db": "VULMON", "id": "CVE-2017-10194" }, { "db": "JVNDB", "id": "JVNDB-2017-008675" }, { "db": "NVD", "id": "CVE-2017-10194" }, { "db": "CNNVD", "id": "CNNVD-201710-841" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability in the Oracle Integrated Lights Out Manager (ILOM) component of Oracle Sun Systems Products Suite (subcomponent: System Management). The supported version that is affected is Prior to 3.2.6. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Integrated Lights Out Manager (ILOM). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Integrated Lights Out Manager (ILOM) accessible data. CVSS 3.0 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). \nThe vulnerability can be exploited over the \u0027HTTP\u0027 protocol. Attackers can take advantage of this vulnerability to read data without authorization, affecting the confidentiality of data", "sources": [ { "db": "NVD", "id": "CVE-2017-10194" }, { "db": "JVNDB", "id": "JVNDB-2017-008675" }, { "db": "BID", "id": "101445" }, { "db": "VULHUB", "id": "VHN-100492" }, { "db": "VULMON", "id": "CVE-2017-10194" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-10194", "trust": 2.9 }, { "db": "BID", "id": "101445", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2017-008675", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201710-841", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-100492", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-10194", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-100492" }, { "db": "VULMON", "id": "CVE-2017-10194" }, { "db": "BID", "id": "101445" }, { "db": "JVNDB", "id": "JVNDB-2017-008675" }, { "db": "NVD", "id": "CVE-2017-10194" }, { "db": "CNNVD", "id": "CNNVD-201710-841" } ] }, "id": "VAR-201710-0749", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-100492" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:29:09.319000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Oracle Critical Patch Update Advisory - October 2017", "trust": 0.8, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "title": "Text Form of Oracle Critical Patch Update - October 2017 Risk Matrices", "trust": 0.8, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017verbose-3236627.html" }, { "title": "Oracle Sun Systems Products Suite Oracle Integrated Lights Out Manager Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=75825" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - October 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=523d3f220a64ff01dd95e064bd37566a" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-10194" }, { "db": "JVNDB", "id": "JVNDB-2017-008675" }, { "db": "CNNVD", "id": "CNNVD-201710-841" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-100492" }, { "db": "JVNDB", "id": "JVNDB-2017-008675" }, { "db": "NVD", "id": "CVE-2017-10194" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "trust": 1.3, "url": "http://www.securityfocus.com/bid/101445" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-10194" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10194" }, { "trust": 0.3, "url": "http://www.oracle.com/index.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/200.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=55628" } ], "sources": [ { "db": "VULHUB", "id": "VHN-100492" }, { "db": "VULMON", "id": "CVE-2017-10194" }, { "db": "BID", "id": "101445" }, { "db": "JVNDB", "id": "JVNDB-2017-008675" }, { "db": "NVD", "id": "CVE-2017-10194" }, { "db": "CNNVD", "id": "CNNVD-201710-841" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-100492" }, { "db": "VULMON", "id": "CVE-2017-10194" }, { "db": "BID", "id": "101445" }, { "db": "JVNDB", "id": "JVNDB-2017-008675" }, { "db": "NVD", "id": "CVE-2017-10194" }, { "db": "CNNVD", "id": "CNNVD-201710-841" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-10-19T00:00:00", "db": "VULHUB", "id": "VHN-100492" }, { "date": "2017-10-19T00:00:00", "db": "VULMON", "id": "CVE-2017-10194" }, { "date": "2017-10-17T00:00:00", "db": "BID", "id": "101445" }, { "date": "2017-10-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-008675" }, { "date": "2017-10-19T17:29:01.200000", "db": "NVD", "id": "CVE-2017-10194" }, { "date": "2017-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201710-841" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-10-24T00:00:00", "db": "VULHUB", "id": "VHN-100492" }, { "date": "2017-10-24T00:00:00", "db": "VULMON", "id": "CVE-2017-10194" }, { "date": "2017-10-17T00:00:00", "db": "BID", "id": "101445" }, { "date": "2017-10-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-008675" }, { "date": "2017-10-24T16:19:33.557000", "db": "NVD", "id": "CVE-2017-10194" }, { "date": "2017-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201710-841" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201710-841" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Oracle Sun Systems Products Suite of Oracle Integrated Lights Out Manager In System Management Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-008675" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201710-841" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.