VAR-201805-0943
Vulnerability from variot - Updated: 2023-12-18 12:28In ATI Systems Emergency Mass Notification Systems (HPSS16, HPSS32, MHPSS, and ALERT4000) devices, a missing encryption of sensitive data vulnerability caused by specially crafted malicious radio transmissions may allow an attacker to remotely trigger false alarms. plural ATI Systems Emergency Mass Notification Systems The device contains cryptographic vulnerabilities.Information may be tampered with. 1. An authentication bypass vulnerability 2. A security-bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. Acoustic HPSS16 and so on are the emergency reporting systems of Acoustic Technology Company in the United States. An encryption issue vulnerability exists in several Acoustic products due to the program's failure to encrypt sensitive data. The following products are affected: Acoustic HPSS16; HPSS32; MHPSS; ALERT4000
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201805-0943",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "hpss32",
"scope": "eq",
"trust": 1.6,
"vendor": "atisystem",
"version": null
},
{
"model": "alert4000",
"scope": "eq",
"trust": 1.6,
"vendor": "atisystem",
"version": null
},
{
"model": "hpss16",
"scope": "eq",
"trust": 1.6,
"vendor": "atisystem",
"version": null
},
{
"model": "mhpss",
"scope": "eq",
"trust": 1.6,
"vendor": "atisystem",
"version": null
},
{
"model": "alert4000",
"scope": null,
"trust": 0.8,
"vendor": "ati",
"version": null
},
{
"model": "hpss16",
"scope": null,
"trust": 0.8,
"vendor": "ati",
"version": null
},
{
"model": "hpss32",
"scope": null,
"trust": 0.8,
"vendor": "ati",
"version": null
},
{
"model": "mhpss",
"scope": null,
"trust": 0.8,
"vendor": "ati",
"version": null
},
{
"model": "systems hpss16",
"scope": null,
"trust": 0.6,
"vendor": "ati",
"version": null
},
{
"model": "systems hpss32",
"scope": null,
"trust": 0.6,
"vendor": "ati",
"version": null
},
{
"model": "systems mhpss",
"scope": null,
"trust": 0.6,
"vendor": "ati",
"version": null
},
{
"model": "systems alert4000",
"scope": null,
"trust": 0.6,
"vendor": "ati",
"version": null
},
{
"model": "systems mhpss",
"scope": "eq",
"trust": 0.3,
"vendor": "ati",
"version": "0"
},
{
"model": "systems hpss32",
"scope": "eq",
"trust": 0.3,
"vendor": "ati",
"version": "0"
},
{
"model": "systems hpss16",
"scope": "eq",
"trust": 0.3,
"vendor": "ati",
"version": "0"
},
{
"model": "systems alert4000",
"scope": "eq",
"trust": 0.3,
"vendor": "ati",
"version": "0"
},
{
"model": "systems hpss16",
"scope": "eq",
"trust": 0.2,
"vendor": "ati",
"version": "*"
},
{
"model": "systems hpss32",
"scope": "eq",
"trust": 0.2,
"vendor": "ati",
"version": "*"
},
{
"model": "systems mhpss",
"scope": "eq",
"trust": 0.2,
"vendor": "ati",
"version": "*"
},
{
"model": "systems alert4000",
"scope": "eq",
"trust": 0.2,
"vendor": "ati",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2ebb602-39ab-11e9-ac93-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07875"
},
{
"db": "BID",
"id": "103721"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005362"
},
{
"db": "NVD",
"id": "CVE-2018-8864"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-872"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:atisystem:hpss16_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:atisystem:hpss16:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:atisystem:hpss32_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:atisystem:hpss32:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:atisystem:mhpss_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:atisystem:mhpss:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:atisystem:alert4000_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:atisystem:alert4000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-8864"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Balint Seeber of Bastille",
"sources": [
{
"db": "BID",
"id": "103721"
}
],
"trust": 0.3
},
"cve": "CVE-2018-8864",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"exploitabilityScore": 5.5,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Adjacent Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 2.9,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2018-8864",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Low",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.2,
"id": "CNVD-2018-07875",
"impactScore": 6.9,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:A/AC:H/Au:N/C:N/I:C/A:N",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.2,
"id": "e2ebb602-39ab-11e9-ac93-000c29342cb1",
"impactScore": 6.9,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:A/AC:H/Au:N/C:N/I:C/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"exploitabilityScore": 5.5,
"id": "VHN-138896",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:A/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.6,
"impactScore": 1.4,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
{
"attackComplexity": "High",
"attackVector": "Adjacent Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 3.1,
"baseSeverity": "Low",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2018-8864",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-8864",
"trust": 1.8,
"value": "LOW"
},
{
"author": "CNVD",
"id": "CNVD-2018-07875",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201805-872",
"trust": 0.6,
"value": "LOW"
},
{
"author": "IVD",
"id": "e2ebb602-39ab-11e9-ac93-000c29342cb1",
"trust": 0.2,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-138896",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2ebb602-39ab-11e9-ac93-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07875"
},
{
"db": "VULHUB",
"id": "VHN-138896"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005362"
},
{
"db": "NVD",
"id": "CVE-2018-8864"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-872"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In ATI Systems Emergency Mass Notification Systems (HPSS16, HPSS32, MHPSS, and ALERT4000) devices, a missing encryption of sensitive data vulnerability caused by specially crafted malicious radio transmissions may allow an attacker to remotely trigger false alarms. plural ATI Systems Emergency Mass Notification Systems The device contains cryptographic vulnerabilities.Information may be tampered with. \n1. An authentication bypass vulnerability\n2. A security-bypass vulnerability\nAttackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. Acoustic HPSS16 and so on are the emergency reporting systems of Acoustic Technology Company in the United States. An encryption issue vulnerability exists in several Acoustic products due to the program\u0027s failure to encrypt sensitive data. The following products are affected: Acoustic HPSS16; HPSS32; MHPSS; ALERT4000",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-8864"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005362"
},
{
"db": "CNVD",
"id": "CNVD-2018-07875"
},
{
"db": "BID",
"id": "103721"
},
{
"db": "IVD",
"id": "e2ebb602-39ab-11e9-ac93-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-138896"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-8864",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-18-100-01",
"trust": 3.4
},
{
"db": "BID",
"id": "103721",
"trust": 2.0
},
{
"db": "CNVD",
"id": "CNVD-2018-07875",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201805-872",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005362",
"trust": 0.8
},
{
"db": "IVD",
"id": "E2EBB602-39AB-11E9-AC93-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-138896",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2ebb602-39ab-11e9-ac93-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07875"
},
{
"db": "VULHUB",
"id": "VHN-138896"
},
{
"db": "BID",
"id": "103721"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005362"
},
{
"db": "NVD",
"id": "CVE-2018-8864"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-872"
}
]
},
"id": "VAR-201805-0943",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2ebb602-39ab-11e9-ac93-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07875"
},
{
"db": "VULHUB",
"id": "VHN-138896"
}
],
"trust": 1.775
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e2ebb602-39ab-11e9-ac93-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07875"
}
]
},
"last_update_date": "2023-12-18T12:28:55.661000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Mass Notification Products",
"trust": 0.8,
"url": "https://www.atisystem.com/products/"
},
{
"title": "Patch for ATI Systems Emergency Mass Notification Systems False Alert Vulnerability (CNVD-2018-07875)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/126155"
},
{
"title": "Multiple Acoustic Product encryption problem vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=83715"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-07875"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005362"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-872"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-311",
"trust": 1.1
},
{
"problemtype": "CWE-310",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-138896"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005362"
},
{
"db": "NVD",
"id": "CVE-2018-8864"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-01"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/103721"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8864"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-8864"
},
{
"trust": 0.3,
"url": "https://www.atisystem.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-07875"
},
{
"db": "VULHUB",
"id": "VHN-138896"
},
{
"db": "BID",
"id": "103721"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005362"
},
{
"db": "NVD",
"id": "CVE-2018-8864"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-872"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e2ebb602-39ab-11e9-ac93-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07875"
},
{
"db": "VULHUB",
"id": "VHN-138896"
},
{
"db": "BID",
"id": "103721"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005362"
},
{
"db": "NVD",
"id": "CVE-2018-8864"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-872"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-04-19T00:00:00",
"db": "IVD",
"id": "e2ebb602-39ab-11e9-ac93-000c29342cb1"
},
{
"date": "2018-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07875"
},
{
"date": "2018-05-25T00:00:00",
"db": "VULHUB",
"id": "VHN-138896"
},
{
"date": "2018-04-10T00:00:00",
"db": "BID",
"id": "103721"
},
{
"date": "2018-07-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-005362"
},
{
"date": "2018-05-25T16:29:00.323000",
"db": "NVD",
"id": "CVE-2018-8864"
},
{
"date": "2018-05-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-872"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07875"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-138896"
},
{
"date": "2018-04-10T00:00:00",
"db": "BID",
"id": "103721"
},
{
"date": "2018-07-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-005362"
},
{
"date": "2019-10-09T23:42:58.677000",
"db": "NVD",
"id": "CVE-2018-8864"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-872"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote or local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-872"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural ATI Systems Emergency Mass Notification Systems Cryptographic vulnerabilities in devices",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-005362"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-872"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.