VAR-201712-0255
Vulnerability from variot - Updated: 2023-12-18 14:05An Improper Input Validation issue was discovered in Rockwell Automation FactoryTalk Alarms and Events, Version 2.90 and earlier. An unauthenticated attacker with remote access to a network with FactoryTalk Alarms and Events can send a specially crafted set of packets packet to Port 403/TCP (the history archiver service), causing the service to either stall or terminate. Rockwell Automation is a solution provider for industrial automation, control and information technology. An attacker can exploit this issue to cause denial-of-service condition. FactoryTalk Alarms and Events 2.90 and prior are vulnerable. Rockwell Automation Studio 5000 Logix Designer, FactoryTalk View SE and FactoryTalk Services are all products of Rockwell Automation, USA. Rockwell Automation Studio 5000 Logix Designer is an application program used to configure and maintain the controller; FactoryTalk View SE is a set of human-machine interface software; FactoryTalk Services is a set of production and performance management platform. The following products and versions are affected: Rockwell Automation Studio 5000 Logix Designer 24 and later, FactoryTalk View SE version 5.00, FactoryTalk Services
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201712-0255",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "factorytalk alarms and events",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "2.90"
},
{
"model": "factorytalk alarms and events",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "2.90"
},
{
"model": "automation factorytalk alarms and event",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "2.90"
},
{
"model": "automation studio logix designer",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "5000\u003e=24"
},
{
"model": "automation factorytalk view se",
"scope": "gte",
"trust": 0.6,
"vendor": "rockwell",
"version": "5.00"
},
{
"model": "automation factorytalk services",
"scope": null,
"trust": 0.6,
"vendor": "rockwell",
"version": null
},
{
"model": "factorytalk alarms and events",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "2.90"
},
{
"model": "automation studio logix designer",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "500024"
},
{
"model": "automation factorytalk view se",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5.00"
},
{
"model": "automation factorytalk services",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk alarms and events",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "2.90"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "factorytalk alarms and events",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2df0bcf-39ab-11e9-ac47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2017-36876"
},
{
"db": "BID",
"id": "102114"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011691"
},
{
"db": "NVD",
"id": "CVE-2017-14022"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1253"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:factorytalk_alarms_and_events:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.90",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-14022"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A major Oil and Gas company",
"sources": [
{
"db": "BID",
"id": "102114"
}
],
"trust": 0.3
},
"cve": "CVE-2017-14022",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2017-14022",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-36876",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "e2df0bcf-39ab-11e9-ac47-000c29342cb1",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-104703",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2017-14022",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-14022",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2017-36876",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201708-1253",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "e2df0bcf-39ab-11e9-ac47-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-104703",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2df0bcf-39ab-11e9-ac47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2017-36876"
},
{
"db": "VULHUB",
"id": "VHN-104703"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011691"
},
{
"db": "NVD",
"id": "CVE-2017-14022"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1253"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An Improper Input Validation issue was discovered in Rockwell Automation FactoryTalk Alarms and Events, Version 2.90 and earlier. An unauthenticated attacker with remote access to a network with FactoryTalk Alarms and Events can send a specially crafted set of packets packet to Port 403/TCP (the history archiver service), causing the service to either stall or terminate. Rockwell Automation is a solution provider for industrial automation, control and information technology. \nAn attacker can exploit this issue to cause denial-of-service condition. \nFactoryTalk Alarms and Events 2.90 and prior are vulnerable. Rockwell Automation Studio 5000 Logix Designer, FactoryTalk View SE and FactoryTalk Services are all products of Rockwell Automation, USA. Rockwell Automation Studio 5000 Logix Designer is an application program used to configure and maintain the controller; FactoryTalk View SE is a set of human-machine interface software; FactoryTalk Services is a set of production and performance management platform. The following products and versions are affected: Rockwell Automation Studio 5000 Logix Designer 24 and later, FactoryTalk View SE version 5.00, FactoryTalk Services",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-14022"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011691"
},
{
"db": "CNVD",
"id": "CNVD-2017-36876"
},
{
"db": "BID",
"id": "102114"
},
{
"db": "IVD",
"id": "e2df0bcf-39ab-11e9-ac47-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-104703"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-14022",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-17-341-02",
"trust": 3.4
},
{
"db": "BID",
"id": "102114",
"trust": 2.6
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1253",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-36876",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011691",
"trust": 0.8
},
{
"db": "IVD",
"id": "E2DF0BCF-39AB-11E9-AC47-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-104703",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2df0bcf-39ab-11e9-ac47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2017-36876"
},
{
"db": "VULHUB",
"id": "VHN-104703"
},
{
"db": "BID",
"id": "102114"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011691"
},
{
"db": "NVD",
"id": "CVE-2017-14022"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1253"
}
]
},
"id": "VAR-201712-0255",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2df0bcf-39ab-11e9-ac47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2017-36876"
},
{
"db": "VULHUB",
"id": "VHN-104703"
}
],
"trust": 1.7152777675
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e2df0bcf-39ab-11e9-ac47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2017-36876"
}
]
},
"last_update_date": "2023-12-18T14:05:37.143000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.rockwellautomation.com/"
},
{
"title": "Rockwell Automation FactoryTalk Alarms and Events Denial of Service Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/109845"
},
{
"title": "Multiple Rockwell Automation product FactoryTalk Alarms and Events Enter the fix for the verification vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=100014"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-36876"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011691"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1253"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-104703"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011691"
},
{
"db": "NVD",
"id": "CVE-2017-14022"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-341-02"
},
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/102114"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14022"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-14022"
},
{
"trust": 0.3,
"url": "http://www.rockwellautomation.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-36876"
},
{
"db": "VULHUB",
"id": "VHN-104703"
},
{
"db": "BID",
"id": "102114"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011691"
},
{
"db": "NVD",
"id": "CVE-2017-14022"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1253"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e2df0bcf-39ab-11e9-ac47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2017-36876"
},
{
"db": "VULHUB",
"id": "VHN-104703"
},
{
"db": "BID",
"id": "102114"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011691"
},
{
"db": "NVD",
"id": "CVE-2017-14022"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1253"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-12T00:00:00",
"db": "IVD",
"id": "e2df0bcf-39ab-11e9-ac47-000c29342cb1"
},
{
"date": "2017-12-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-36876"
},
{
"date": "2017-12-23T00:00:00",
"db": "VULHUB",
"id": "VHN-104703"
},
{
"date": "2017-12-07T00:00:00",
"db": "BID",
"id": "102114"
},
{
"date": "2018-01-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-011691"
},
{
"date": "2017-12-23T00:29:13.230000",
"db": "NVD",
"id": "CVE-2017-14022"
},
{
"date": "2017-08-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201708-1253"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-36876"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-104703"
},
{
"date": "2017-12-19T22:01:00",
"db": "BID",
"id": "102114"
},
{
"date": "2018-01-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-011691"
},
{
"date": "2019-10-09T23:23:45.077000",
"db": "NVD",
"id": "CVE-2017-14022"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201708-1253"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201708-1253"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rockwell Automation FactoryTalk Alarms and Events Denial of service vulnerability",
"sources": [
{
"db": "IVD",
"id": "e2df0bcf-39ab-11e9-ac47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2017-36876"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input validation error",
"sources": [
{
"db": "IVD",
"id": "e2df0bcf-39ab-11e9-ac47-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1253"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.