VAR-201801-1492
Vulnerability from variot - Updated: 2023-12-18 12:50An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages. PHOENIX CONTACT mGuard The firmware contains a vulnerability related to input validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. \302\240Phoenix Contact mGuard is a security device for unauthorized access and installation of Phoenix Contact's protection system. PHOENIX CONTACT mGuard has unauthorized modification of the vulnerability. Successful exploits will allow local attackers to bypass certain security restrictions. Other attacks are also possible
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201801-1492",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "mguard rs4004 tx\\/dtx",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4004 tx\\/dtx",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard pcie4000 vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard pci4000 vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs2000 tx\\/tx-b",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard pci4000 vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs2000 tx\\/tx-b",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4000 3g vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard delta tx\\/tx vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard delta tx\\/tx vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs4000 3g vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4000 tx\\/tx vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard centerport",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard smart2",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs2005 tx vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs2005 tx vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard smart2 vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4000 tx\\/tx vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs4004 tx\\/dtx vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard gt\\/gt",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard smart2",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard centerport",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs4004 tx\\/dtx vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4000 tx\\/tx",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4000 tx\\/tx",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard gt\\/gt",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard smart2 vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs2000 3g vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs2000 3g vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard core tx vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs4000 tx\\/tx vpn-m",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard core tx vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs2000 4g vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4000 tx\\/tx vpn-m",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs2000 tx\\/tx vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard gt\\/gt vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard gt\\/gt vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4000 tx\\/tx-p",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs2000 4g vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs2000 tx\\/tx vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs4000 4g vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4000 4g vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard pcie4000 vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard delta tx\\/tx",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs4000 tx\\/tx-p",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard delta tx\\/tx",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard centerport",
"scope": null,
"trust": 0.8,
"vendor": "phoenix contact",
"version": null
},
{
"model": "mguard core tx vpn",
"scope": null,
"trust": 0.8,
"vendor": "phoenix contact",
"version": null
},
{
"model": "mguard delta tx/tx",
"scope": null,
"trust": 0.8,
"vendor": "phoenix contact",
"version": null
},
{
"model": "mguard gt/gt",
"scope": null,
"trust": 0.8,
"vendor": "phoenix contact",
"version": null
},
{
"model": "mguard pci4000 vpn",
"scope": null,
"trust": 0.8,
"vendor": "phoenix contact",
"version": null
},
{
"model": "mguard rs2000 tx/tx vpn",
"scope": null,
"trust": 0.8,
"vendor": "phoenix contact",
"version": null
},
{
"model": "mguard smart2",
"scope": null,
"trust": 0.8,
"vendor": "phoenix contact",
"version": null
},
{
"model": "contact mguard",
"scope": "gte",
"trust": 0.6,
"vendor": "phoenix",
"version": "7.2\u003c=8.6.0"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.6"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.5.0"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.4.2"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.4.1"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.4.0"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.3.0"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "7.2"
},
{
"model": "contact mguard",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.6.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard centerport",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs2005 tx vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4000 tx tx",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4000 tx tx vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4000 tx tx vpn m",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4000 tx tx p",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4004 tx dtx",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4004 tx dtx vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard smart2",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard smart2 vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs2000 3g vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard delta tx tx",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4000 3g vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard core tx vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs2000 4g vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4000 4g vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard delta tx tx vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard gt gt",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard gt gt vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard pci4000 vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard pcie4000 vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs2000 tx tx vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs2000 tx tx b",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"db": "BID",
"id": "102907"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "NVD",
"id": "CVE-2018-5441"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_centerport_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_centerport:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_delta_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_delta_tx\\/tx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_delta_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_delta_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_gt\\/gt_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_gt\\/gt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_gt\\/gt_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_gt\\/gt_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_pci4000_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_pcie4000_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs2000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs2000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs2000_tx\\/tx-b_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs2000_tx\\/tx-b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\/tx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\/tx_vpn-m_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\/tx_vpn-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\/tx-p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\/tx-p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4004_tx\\/dtx_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4004_tx\\/dtx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4004_tx\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4004_tx\\/dtx_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_smart2_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_smart2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_smart2_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_core_tx_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-5441"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "PHOENIX CONTACT",
"sources": [
{
"db": "BID",
"id": "102907"
}
],
"trust": 0.3
},
"cve": "CVE-2018-5441",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Local",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 4.6,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2018-5441",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2018-02344",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2018-5441",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-5441",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-02344",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201801-1078",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "NVD",
"id": "CVE-2018-5441"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages. PHOENIX CONTACT mGuard The firmware contains a vulnerability related to input validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. \\302\\240Phoenix Contact mGuard is a security device for unauthorized access and installation of Phoenix Contact\u0027s protection system. PHOENIX CONTACT mGuard has unauthorized modification of the vulnerability. \nSuccessful exploits will allow local attackers to bypass certain security restrictions. Other attacks are also possible",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-5441"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"db": "BID",
"id": "102907"
},
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-5441",
"trust": 3.5
},
{
"db": "ICS CERT",
"id": "ICSA-18-030-01",
"trust": 3.3
},
{
"db": "BID",
"id": "102907",
"trust": 1.9
},
{
"db": "CERT@VDE",
"id": "VDE-2018-001",
"trust": 1.6
},
{
"db": "CNVD",
"id": "CNVD-2018-02344",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896",
"trust": 0.8
},
{
"db": "IVD",
"id": "E2E32A81-39AB-11E9-AA47-000C29342CB1",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"db": "BID",
"id": "102907"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "NVD",
"id": "CVE-2018-5441"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078"
}
]
},
"id": "VAR-201801-1492",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-02344"
}
],
"trust": 1.5
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-02344"
}
]
},
"last_update_date": "2023-12-18T12:50:55.182000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.phoenixcontact.com/online/portal/pc"
},
{
"title": "PHOENIX CONTACT mGuard is not authorized to modify the patch for the vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/115091"
},
{
"title": "PHOENIX CONTACT mGuard Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=78155"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "NVD",
"id": "CVE-2018-5441"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.3,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-030-01"
},
{
"trust": 2.2,
"url": "http://www.securityfocus.com/bid/102907"
},
{
"trust": 1.6,
"url": "https://cert.vde.com/en-us/advisories/vde-2018-001"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5441"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-5441"
},
{
"trust": 0.3,
"url": "https://www.phoenixcontact.com/online/portal/pc"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"db": "BID",
"id": "102907"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "NVD",
"id": "CVE-2018-5441"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"db": "BID",
"id": "102907"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "NVD",
"id": "CVE-2018-5441"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-01-31T00:00:00",
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"date": "2018-01-31T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"date": "2018-01-30T00:00:00",
"db": "BID",
"id": "102907"
},
{
"date": "2018-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"date": "2018-01-30T20:29:00.457000",
"db": "NVD",
"id": "CVE-2018-5441"
},
{
"date": "2018-01-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-1078"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-01-31T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"date": "2018-01-30T00:00:00",
"db": "BID",
"id": "102907"
},
{
"date": "2018-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"date": "2019-10-09T23:41:21.767000",
"db": "NVD",
"id": "CVE-2018-5441"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-1078"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "102907"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "PHOENIX CONTACT mGuard Vulnerability related to input validation in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input validation error",
"sources": [
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.