VAR-201807-0338
Vulnerability from variot - Updated: 2023-12-18 13:13Martem TELEM GW6 and GWM devices with firmware 2018.04.18-linux_4-01-601cb47 and prior allow the creation of new connections to one or more IOAs, without closing them properly, which may cause a denial of service within the industrial process control channel. Martem TELEM GW6 and GWM The device firmware contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Martem specializes in providing distribution network monitoring remote control systems, and its customers include distribution companies and industrial and transportation companies with their own power grids. Multiple Martem Products are prone to the following security vulnerabilities. 1. An security bypass vulnerability. 2. A denial-of-service vulnerability. 3. An cross-site scripting vulnerability. Attackers can exploit these issues to bypass certain security restrictions to perform unauthorized actions, steal cookie-based authentication credentials, to execute arbitrary scripts in the context of the web browser. Failed exploit attempts will result in a denial-of-service condition. The following products are affected: GW6 Version 2018.04.18-linux_4-01-601cb47 and prior. GWM Version 2018.04.18-linux_4-01-601cb47 and prior. Both Martem GW6 and GWM are data processor products of Estonian Martem Company
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201807-0338",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "telem-gwm",
"scope": "lte",
"trust": 1.0,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem-gw6",
"scope": "lte",
"trust": 1.0,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem gw6",
"scope": "lte",
"trust": 0.8,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem gwm",
"scope": "lte",
"trust": 0.8,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "gw6 \u003c=2018.04.18-linux 4-01-601cb47",
"scope": null,
"trust": 0.6,
"vendor": "martem",
"version": null
},
{
"model": "gwm \u003c=2018.04.18-linux 4-01-601cb47",
"scope": null,
"trust": 0.6,
"vendor": "martem",
"version": null
},
{
"model": "telem gw6",
"scope": "eq",
"trust": 0.6,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem gwm",
"scope": "eq",
"trust": 0.6,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "gwm 2018.04.18-linux 4-0",
"scope": null,
"trust": 0.3,
"vendor": "martem",
"version": null
},
{
"model": "gw6 2018.04.18-linux 4-0",
"scope": null,
"trust": 0.3,
"vendor": "martem",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "telem gwm",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "telem gw6",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:martem:telem-gwm_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2018.04.18-linux_4-01-601cb47",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:martem:telem-gwm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:martem:telem-gw6_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2018.04.18-linux_4-01-601cb47",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:martem:telem-gw6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-10607"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Latvia,Bernhards Blumbergs and Arturs Danilevics of CERT.LV",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
],
"trust": 0.6
},
"cve": "CVE-2018-10607",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2018-10607",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-10590",
"impactScore": 7.8,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1",
"impactScore": 7.8,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-120383",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2018-10607",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-10607",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-10590",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201805-1161",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-120383",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"db": "VULHUB",
"id": "VHN-120383"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Martem TELEM GW6 and GWM devices with firmware 2018.04.18-linux_4-01-601cb47 and prior allow the creation of new connections to one or more IOAs, without closing them properly, which may cause a denial of service within the industrial process control channel. Martem TELEM GW6 and GWM The device firmware contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Martem specializes in providing distribution network monitoring remote control systems, and its customers include distribution companies and industrial and transportation companies with their own power grids. Multiple Martem Products are prone to the following security vulnerabilities. \n1. An security bypass vulnerability. \n2. A denial-of-service vulnerability. \n3. An cross-site scripting vulnerability. \nAttackers can exploit these issues to bypass certain security restrictions to perform unauthorized actions, steal cookie-based authentication credentials, to execute arbitrary scripts in the context of the web browser. Failed exploit attempts will result in a denial-of-service condition. \nThe following products are affected:\nGW6 Version 2018.04.18-linux_4-01-601cb47 and prior. \nGWM Version 2018.04.18-linux_4-01-601cb47 and prior. Both Martem GW6 and GWM are data processor products of Estonian Martem Company",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-120383"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-10607",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-18-142-01",
"trust": 3.4
},
{
"db": "BID",
"id": "104286",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2018-10590",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779",
"trust": 0.8
},
{
"db": "IVD",
"id": "E2F09800-39AB-11E9-BD1B-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-120383",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"db": "VULHUB",
"id": "VHN-120383"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"id": "VAR-201807-0338",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"db": "VULHUB",
"id": "VHN-120383"
}
],
"trust": 1.9
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
}
]
},
"last_update_date": "2023-12-18T13:13:47.719000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SA1805184",
"trust": 0.8,
"url": "https://martem.eu/csa/martem_csa_telem_1805184.pdf"
},
{
"title": "Martem GW6 and GWM Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=80638"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-400",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-120383"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "NVD",
"id": "CVE-2018-10607"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-142-01"
},
{
"trust": 2.0,
"url": "http://martem.eu/csa/martem_csa_telem_1805184.pdf"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/104286"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10607"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-10607"
},
{
"trust": 0.3,
"url": "http://martem.ee/"
},
{
"trust": 0.3,
"url": "http://martem.eu/csa/martem_csa_telem_1805182.pdf"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"db": "VULHUB",
"id": "VHN-120383"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"db": "VULHUB",
"id": "VHN-120383"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-05-30T00:00:00",
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"date": "2018-05-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"date": "2018-07-31T00:00:00",
"db": "VULHUB",
"id": "VHN-120383"
},
{
"date": "2018-05-22T00:00:00",
"db": "BID",
"id": "104286"
},
{
"date": "2018-10-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"date": "2018-07-31T17:29:00.327000",
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"date": "2018-06-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-05-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-120383"
},
{
"date": "2018-05-22T00:00:00",
"db": "BID",
"id": "104286"
},
{
"date": "2018-10-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"date": "2021-06-23T14:21:44.137000",
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Martem TELEM-GW6/GWM Denial of service vulnerability",
"sources": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Resource management error",
"sources": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.