Vulnerabilites related to mobileiron - sentry
CVE-2014-1409 (GCVE-0-2014-1409)
Vulnerability from cvelistv5
Published
2020-01-08 15:29
Modified
2024-08-06 09:42
Severity ?
CWE
  • n/a
Summary
MobileIron VSP versions prior to 5.9.1 and Sentry versions prior to 5.0 have an authentication bypass vulnerability due to an XML file with obfuscated passwords
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:42:35.307Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2014/Apr/21"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92351"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://packetstormsecurity.com/files/cve/CVE-2014-1409"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "MobileIron VSP versions prior to 5.9.1 and Sentry versions prior to 5.0 have an authentication bypass vulnerability due to an XML file with obfuscated passwords"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-08T15:29:10",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2014/Apr/21"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92351"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://packetstormsecurity.com/files/cve/CVE-2014-1409"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-1409",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MobileIron VSP versions prior to 5.9.1 and Sentry versions prior to 5.0 have an authentication bypass vulnerability due to an XML file with obfuscated passwords"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://seclists.org/fulldisclosure/2014/Apr/21",
              "refsource": "MISC",
              "url": "http://seclists.org/fulldisclosure/2014/Apr/21"
            },
            {
              "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92351",
              "refsource": "MISC",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92351"
            },
            {
              "name": "https://packetstormsecurity.com/files/cve/CVE-2014-1409",
              "refsource": "MISC",
              "url": "https://packetstormsecurity.com/files/cve/CVE-2014-1409"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-1409",
    "datePublished": "2020-01-08T15:29:10",
    "dateReserved": "2014-01-10T00:00:00",
    "dateUpdated": "2024-08-06T09:42:35.307Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-7287 (GCVE-0-2013-7287)
Vulnerability from cvelistv5
Published
2020-02-13 22:09
Modified
2024-08-06 18:01
Severity ?
CWE
  • n/a
Summary
MobileIron VSP < 5.9.1 and Sentry < 5.0 has an insecure encryption scheme.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:01:20.358Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2014/Apr/21"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.securityfocus.com/archive/1/531713"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MobileIron VSP \u003c 5.9.1 and Sentry \u003c 5.0 has an insecure encryption scheme."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-13T22:09:38",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2014/Apr/21"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.securityfocus.com/archive/1/531713"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-7287",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MobileIron VSP \u003c 5.9.1 and Sentry \u003c 5.0 has an insecure encryption scheme."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://seclists.org/fulldisclosure/2014/Apr/21",
              "refsource": "MISC",
              "url": "http://seclists.org/fulldisclosure/2014/Apr/21"
            },
            {
              "name": "https://www.securityfocus.com/archive/1/531713",
              "refsource": "MISC",
              "url": "https://www.securityfocus.com/archive/1/531713"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-7287",
    "datePublished": "2020-02-13T22:09:38",
    "dateReserved": "2014-01-10T00:00:00",
    "dateUpdated": "2024-08-06T18:01:20.358Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-15507 (GCVE-0-2020-15507)
Vulnerability from cvelistv5
Published
2020-07-07 01:42
Modified
2024-08-04 13:15
Severity ?
CWE
  • n/a
Summary
An arbitrary file reading vulnerability in MobileIron Core versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0 that allows remote attackers to read files on the system via unspecified vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T13:15:20.702Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An arbitrary file reading vulnerability in MobileIron Core versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0 that allows remote attackers to read files on the system via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-09-18T16:14:56",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-15507",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An arbitrary file reading vulnerability in MobileIron Core versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0 that allows remote attackers to read files on the system via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available",
              "refsource": "MISC",
              "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
            },
            {
              "name": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available",
              "refsource": "CONFIRM",
              "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-15507",
    "datePublished": "2020-07-07T01:42:44",
    "dateReserved": "2020-07-02T00:00:00",
    "dateUpdated": "2024-08-04T13:15:20.702Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-15506 (GCVE-0-2020-15506)
Vulnerability from cvelistv5
Published
2020-07-07 01:43
Modified
2024-08-04 13:15
Severity ?
CWE
  • n/a
Summary
An authentication bypass vulnerability in MobileIron Core & Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0 that allows remote attackers to bypass authentication mechanisms via unspecified vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T13:15:20.863Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An authentication bypass vulnerability in MobileIron Core \u0026 Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0 that allows remote attackers to bypass authentication mechanisms via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-09-18T16:05:57",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-15506",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An authentication bypass vulnerability in MobileIron Core \u0026 Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0 that allows remote attackers to bypass authentication mechanisms via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available",
              "refsource": "MISC",
              "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
            },
            {
              "name": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available",
              "refsource": "CONFIRM",
              "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-15506",
    "datePublished": "2020-07-07T01:43:13",
    "dateReserved": "2020-07-02T00:00:00",
    "dateUpdated": "2024-08-04T13:15:20.863Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-15505 (GCVE-0-2020-15505)
Vulnerability from cvelistv5
Published
2020-07-07 01:43
Modified
2025-07-30 01:45
Severity ?
CWE
  • n/a
Summary
A remote code execution vulnerability in MobileIron Core & Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0; and Sentry versions 9.7.2 and earlier, and 9.8.0; and Monitor and Reporting Database (RDB) version 2.0.0.1 and earlier that allows remote attackers to execute arbitrary code via unspecified vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T13:15:20.689Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://perchsecurity.com/perch-news/cve-spotlight-mobileiron-rce-cve-2020-15505/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/161097/MobileIron-MDM-Hessian-Based-Java-Deserialization-Remote-Code-Execution.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cwe.mitre.org/data/definitions/41.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2020-15505",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-04T19:51:44.271380Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-11-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-15505"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-706",
                "description": "CWE-706 Use of Incorrectly-Resolved Name or Reference",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-30T01:45:39.572Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "timeline": [
          {
            "lang": "en",
            "time": "2021-11-03T00:00:00+00:00",
            "value": "CVE-2020-15505 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A remote code execution vulnerability in MobileIron Core \u0026 Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0; and Sentry versions 9.7.2 and earlier, and 9.8.0; and Monitor and Reporting Database (RDB) version 2.0.0.1 and earlier that allows remote attackers to execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-10T20:16:14.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://perchsecurity.com/perch-news/cve-spotlight-mobileiron-rce-cve-2020-15505/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/161097/MobileIron-MDM-Hessian-Based-Java-Deserialization-Remote-Code-Execution.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cwe.mitre.org/data/definitions/41.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-15505",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A remote code execution vulnerability in MobileIron Core \u0026 Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0; and Sentry versions 9.7.2 and earlier, and 9.8.0; and Monitor and Reporting Database (RDB) version 2.0.0.1 and earlier that allows remote attackers to execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available",
              "refsource": "MISC",
              "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
            },
            {
              "name": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available",
              "refsource": "CONFIRM",
              "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
            },
            {
              "name": "https://perchsecurity.com/perch-news/cve-spotlight-mobileiron-rce-cve-2020-15505/",
              "refsource": "MISC",
              "url": "https://perchsecurity.com/perch-news/cve-spotlight-mobileiron-rce-cve-2020-15505/"
            },
            {
              "name": "http://packetstormsecurity.com/files/161097/MobileIron-MDM-Hessian-Based-Java-Deserialization-Remote-Code-Execution.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/161097/MobileIron-MDM-Hessian-Based-Java-Deserialization-Remote-Code-Execution.html"
            },
            {
              "name": "https://cwe.mitre.org/data/definitions/41.html",
              "refsource": "MISC",
              "url": "https://cwe.mitre.org/data/definitions/41.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-15505",
    "datePublished": "2020-07-07T01:43:52.000Z",
    "dateReserved": "2020-07-02T00:00:00.000Z",
    "dateUpdated": "2025-07-30T01:45:39.572Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-202001-1337
Vulnerability from variot

MobileIron VSP versions prior to 5.9.1 and Sentry versions prior to 5.0 have an authentication bypass vulnerability due to an XML file with obfuscated passwords. MobileIron VSP and Sentry Exists in an inadequate protection of credentials.Information may be obtained. MobileIron VSP and Sentry There is a cryptographic strength vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. MobileIron VSP and Sentry are prone to an XPath-injection weakness. An attacker can exploit this issue by manipulating the XPath query logic to gain access to sensitive information that may aid in launching further attacks. MobileIron VSP prior to 5.9.1 and Sentry 5.0 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

Matta Consulting - Matta Advisory
    https://www.trustmatta.com

      MobileIron Multiple Products
   Authentication Bypass Vulnerability

Advisory ID: MATTA-2013-004 CVE reference: CVE-2014-1409, CVE-2013-7286 Affected platforms: VSP and Sentry Version: VSP < 5.9.1 and Sentry < 5.0 Date: 2013-December-19 Security risk: Critical Researcher: Nico Leidecker Vendor Status: Patch released Vulnerability Disclosure Policy: https://www.trustmatta.com/advisories/matta-disclosure-policy-01.txt Permanent URL: https://www.trustmatta.com/advisories/MATTA-2013-004.txt

===================================================================== Description:

During an external penetration test exercise for one of our clients, an authentication bypass vulnerability was found in the administrative interface of a MobileIron deployment. This ultimately allowed us to, gain access to our client's internal network.

The 'j_username' parameter of the script at https:///mics/j_spring_security_check is vulnerable to blind XPath Injection, allowing an unauthenticated attacker to retrieve the underlying XML document.

This XML document is an excerpt of the configuration file of the device. It contains obfuscated passwords and, depending on configuration, might contain domain credentials and allow the attacker to reposition both internally and on any of the attached devices. This vulnerability has been assigned CVE-2014-1409.

The password obfuscation algorithm is known and has already been documented [1]... AES-ECB-PKCS1.5 with a known, shared key. While we won't release a full-featured exploit for the vulnerability, we will release a PoC to confirm whether the hashes are indeed vulnerable. The vendor has confirmed that a stronger encryption method is used since release 5.7. This vulnerability has been assigned CVE-2013-7286.

[1] https://www.hackinparis.com/sites/hackinparis.com/files/MDM-HIP_2013.pdf NB: A second insecure encryption scheme is described in [1], MITRE has assigned CVE-2013-7287 to that separate vulnerability. ===================================================================== Base64 encoded script to confirm whether the hash provided is vulnerable to CVE-2013-7286:

IyEvdXNyL2Jpbi9lbnYgcHl0aG9uCiMKIyAgTW9iaWxlSXJvbiB1c2VzIEFFUy1FQ0ItUEtDUzEu NSAod2l0aCBhIGtub3duIGtleSkKIyB0byBzdG9yZSBjcmVkZW50aWFscy4uLiBXaGF0IGEgYnJp bGxpYW50IGlkZWEhCiMKIyBUaGlzIHNjcmlwdCBpcyBhYm91dCBjaGVja2luZyB3aGV0aGVyIHRo ZSBwcm92aWRlZAojIGhhc2ggaXMgdnVsbmVyYWJsZSB0byBDVkUtMjAxMy03Mjg2IG9yIG5vdC4K IwojIE5leHRHZW4kIH4gMjAxMwoKaW1wb3J0IHN5cwppbXBvcnQgYmluYXNjaWkKaW1wb3J0IGhh c2hsaWIKaW1wb3J0IHN0cmluZwpmcm9tIENyeXB0by5DaXBoZXIgaW1wb3J0IEFFUwoKaWYgbGVu KHN5cy5hcmd2KTwyOiAgICAKIHN5cy5leGl0KCdVc2FnZTogLi9DVkUtMjAxMy03Mjg2LnB5IDxi YXNlNjRlbmNvZGVkIGJsb2I +JykKCkJTID0gOAp1bnBhZCA9IGxhbWJkYSBzIDogc1swOi1vcmQo c1stMV0pXQoKaWYgX19uYW1lX189PSAiX19tYWluX18iOgogICAgIyBHZW5lcmF0ZSB0aGUgbWFz dGVyIGtleS4uLgogICAgIyBZZXMuIEl0J3Mgbm90IGEgdHlwbyEKICAgIHBocmFzZSA9ICdIYWt1 bmEgbWF0YXRhIHdoYXQgYSB3b2RlcmZ1bCBwaHJhc2UnCiAgICBtID0gaGFzaGxpYi5zaGExKCkK ICAgIG0udXBkYXRlKHBocmFzZSkKIyBXZSBvbmx5IHdhbnQgdGhlIDE2IGZpcnN0IGJ5dGVzICgx MjhiaXQga2V5LCAxNjBiaXQgaGFzaCBmdW5jdGlvbikKICAgIGtleSA9IG0uZGlnZXN0KClbOjE2 XQogICAgY2lwaGVydGV4dCA9IGJpbmFzY2lpLmEyYl9iYXNlNjQoc3lzLmFyZ3ZbMV0pCiAgICBj aXBoZXIgPSBBRVMubmV3KGtleSwgQUVTLk1PREVfRUNCKSAKICAgIHBsYWludGV4dCA9IHVucGFk KGNpcGhlci5kZWNyeXB0KGNpcGhlcnRleHQpKQogICAgdnVsbmVyYWJsZSA9IGxlbihwbGFpbnRl eHQpID4gMCBhbmQgYWxsKGMgaW4gc3RyaW5nLnByaW50YWJsZSBmb3IgYyBpbiBwbGFpbnRleHQp CiAgICBwcmludCAnJXNWVUxORVJBQkxFIFRPIENWRS0yMDEzLTcyODYnICUgKCcnIGlmIHZ1bG5l cmFibGUgZWxzZSAnTk9UICcpCg==

===================================================================== Impact

Successful exploitation allows an unauthenticated attacker to take over the device and potentially any device attached to it as well as the Active Directory Domain it might be linked to.

===================================================================== Versions affected:

    • Sentry Standalone < 5
    • VSP < 5.9.1

===================================================================== Workaround:

Restrict access to the MICS service (administrative interface) to specific hosts: MICS Portal -> Security -> Portal ACLs -> System Manager Portal ACL

===================================================================== Credits

This vulnerability was discovered by Nico Leidecker from Matta Consulting.

===================================================================== History

19-12-13 initial discovery 30-12-13 client has mitigated the vulnerability 30-12-13 initial attempt to contact the vendor 30-12-13 reply from the vendor 31-12-13 a draft of this advisory is sent to the vendor 03-01-14 vendor can't reproduce / ask for more details 03-01-14 more details are sent 07-01-14 vendor recognize that there is a bug but dissmisses it as a security vulnerability 07-01-14 more details are sent 14-01-14 a week lapsed, no reply... we chase it up 14-01-14 vendor reply: they're working on a response 15-01-14 vendor respond: reclassify the bug as a security issue, indicate that they indend on fixing the bug in the Q1 release, provide a workaround and ask for us to hold on releasing the advisory until the release is published 15-01-14 we agree to a deadline extension, send the CVEs MITRE has assigned ... 19-02-14 vendor release 5.9.1 (but doesn't let us know) ... 31-03-14 vendor indicate that the release of VSP 6 is delayed but the bugs have been fixed in 5.9.1 02-04-14 release of this advisory

===================================================================== About Matta

Matta is a privately held company with Headquarters in London, and a European office in Amsterdam. Established in 2001, Matta operates in Europe, Asia, the Middle East and North America using a respected team of senior consultants. Matta is an accredited provider of Tiger Scheme training and conducts regular research.

https://www.trustmatta.com https://www.trustmatta.com/training.html https://www.trustmatta.com/network-penetration-testing.html https://www.trustmatta.com/vulnerability-assessment.html

===================================================================== Disclaimer and Copyright

Copyright (c) 2014 Matta Consulting Limited. All rights reserved. This advisory may be distributed as long as its distribution is free-of-charge and proper credit is given.

The information provided in this advisory is provided "as is" without warranty of any kind. Matta Consulting disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Matta Consulting or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Matta Consulting or its suppliers have been advised of the possibility of such damages. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQEcBAEBCAAGBQJTO/cTAAoJELJDQjn66kB28ysIAILzCnK9mifpyjswSKOJPzUi EgcexJdVIjWZf32gLi202YCHJkiIXNGfG390HrWMQZZWU2l+lEb4cMb4NH8xsjzg 06GbBnrRzBcE35dhO3C0aHuPFh7MRQzbRM4mVyPg1ViUlM7Lb9kQBoD6xdS4gZ09 SaNAdm44WrvGiFAO8yuT56cjHZ1ZYfr+iHQjxY7UIrvmzKKSvMnvv13Fy2CIrRPe zk7QLfyxszbR/eo+HOroNhHAPnfl8Mu0Y/1ihFTJF96irCPuejR7v9WzqlJxRfZB ZQJCKnz1c9cCDPxNY9GliBKT0FlkLX+IOVP/TF40jT7Zk6f+cWgOXcghlgnyunA= =XxBr -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202001-1337",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sentry",
        "scope": "lt",
        "trust": 1.8,
        "vendor": "mobileiron",
        "version": "5.0"
      },
      {
        "model": "virtual smartphone platform",
        "scope": "lt",
        "trust": 1.8,
        "vendor": "mobileiron",
        "version": "5.9.1"
      },
      {
        "model": "virtual smartphone platform",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mobileiron",
        "version": "5.9.1"
      },
      {
        "model": "sentry",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apache",
        "version": "5.0"
      },
      {
        "model": "sentry",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mobileiron",
        "version": "5.0"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008778"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1409"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:apache:sentry",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:mobileiron:virtual_smartphone_platform",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Nico Leidecker",
    "sources": [
      {
        "db": "BID",
        "id": "66595"
      },
      {
        "db": "PACKETSTORM",
        "id": "125990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-538"
      }
    ],
    "trust": 1.0
  },
  "cve": "CVE-2014-1409",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2014-1409",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-007270",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-007257",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2014-1409",
            "impactScore": 5.2,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-007270",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 9.1,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2014-1409",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-007257",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2014-1409",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2013-007270",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "NVD",
            "id": "CVE-2014-1409",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2013-007257",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201406-538",
            "trust": 0.6,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008778"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-538"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1409"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "MobileIron VSP versions prior to 5.9.1 and Sentry versions prior to 5.0 have an authentication bypass vulnerability due to an XML file with obfuscated passwords. MobileIron VSP and Sentry Exists in an inadequate protection of credentials.Information may be obtained. MobileIron VSP and Sentry There is a cryptographic strength vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. MobileIron VSP and Sentry are prone to an XPath-injection weakness. \nAn attacker can exploit this issue by   manipulating the XPath query  logic   to gain access to sensitive information that may aid in  launching further attacks. \nMobileIron VSP prior to 5.9.1 and Sentry 5.0 are vulnerable. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n\n\tMatta Consulting - Matta Advisory\n\t    https://www.trustmatta.com\n\n          MobileIron Multiple Products\n       Authentication Bypass Vulnerability\n\nAdvisory ID: MATTA-2013-004\nCVE reference: CVE-2014-1409, CVE-2013-7286\nAffected platforms: VSP and Sentry\nVersion: VSP \u003c 5.9.1 and Sentry \u003c 5.0\nDate: 2013-December-19\nSecurity risk: Critical\nResearcher: Nico Leidecker \nVendor Status: Patch released\nVulnerability Disclosure Policy:\n https://www.trustmatta.com/advisories/matta-disclosure-policy-01.txt\nPermanent URL:\n https://www.trustmatta.com/advisories/MATTA-2013-004.txt\n\n=====================================================================\nDescription:\n\nDuring an external penetration test exercise for one of our clients,\n an authentication bypass vulnerability was found in the\n administrative interface of a MobileIron deployment. This ultimately\n allowed us to, gain access to our client\u0027s internal network. \n\nThe \u0027j_username\u0027 parameter of the script at\nhttps://\u003ctarget\u003e/mics/j_spring_security_check is vulnerable to blind\n XPath Injection, allowing an unauthenticated attacker to retrieve the\n underlying XML document. \n\nThis XML document is an excerpt of the configuration file of the\n device. It contains obfuscated passwords and, depending on\n configuration, might contain domain credentials and allow the\n attacker to reposition both internally and on any of the attached\n devices. \n This vulnerability has been assigned CVE-2014-1409. \n\nThe password obfuscation algorithm is known and has already been\n documented [1]... AES-ECB-PKCS1.5 with a known, shared key. While we\n won\u0027t release a full-featured exploit for the vulnerability, we will\n release a PoC to confirm whether the hashes are indeed vulnerable. \n The vendor has confirmed that a stronger encryption method is used\n since release 5.7. \n This vulnerability has been assigned CVE-2013-7286. \n\n[1] \nhttps://www.hackinparis.com/sites/hackinparis.com/files/MDM-HIP_2013.pdf\nNB: A second insecure encryption scheme is described in [1], MITRE has\n assigned CVE-2013-7287 to that separate vulnerability. \n=====================================================================\nBase64 encoded script to confirm whether the hash provided is\n  vulnerable to CVE-2013-7286:\n\nIyEvdXNyL2Jpbi9lbnYgcHl0aG9uCiMKIyAgTW9iaWxlSXJvbiB1c2VzIEFFUy1FQ0ItUEtDUzEu\nNSAod2l0aCBhIGtub3duIGtleSkKIyB0byBzdG9yZSBjcmVkZW50aWFscy4uLiBXaGF0IGEgYnJp\nbGxpYW50IGlkZWEhCiMKIyBUaGlzIHNjcmlwdCBpcyBhYm91dCBjaGVja2luZyB3aGV0aGVyIHRo\nZSBwcm92aWRlZAojIGhhc2ggaXMgdnVsbmVyYWJsZSB0byBDVkUtMjAxMy03Mjg2IG9yIG5vdC4K\nIwojIE5leHRHZW4kIH4gMjAxMwoKaW1wb3J0IHN5cwppbXBvcnQgYmluYXNjaWkKaW1wb3J0IGhh\nc2hsaWIKaW1wb3J0IHN0cmluZwpmcm9tIENyeXB0by5DaXBoZXIgaW1wb3J0IEFFUwoKaWYgbGVu\nKHN5cy5hcmd2KTwyOiAgICAKIHN5cy5leGl0KCdVc2FnZTogLi9DVkUtMjAxMy03Mjg2LnB5IDxi\nYXNlNjRlbmNvZGVkIGJsb2I\n+JykKCkJTID0gOAp1bnBhZCA9IGxhbWJkYSBzIDogc1swOi1vcmQo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\ncmFibGUgZWxzZSAnTk9UICcpCg==\n\n=====================================================================\nImpact\n\nSuccessful exploitation allows an unauthenticated attacker to take\n over the device and potentially any device attached to it as well\n as the Active Directory Domain it might be linked to. \n\n=====================================================================\nVersions affected:\n\n- - Sentry Standalone \u003c 5\n- - VSP \u003c 5.9.1\n\n=====================================================================\nWorkaround:\n\nRestrict access to the MICS service (administrative interface) to\n specific hosts:\nMICS Portal -\u003e Security -\u003e Portal ACLs -\u003e System Manager Portal ACL\n\n=====================================================================\nCredits\n\nThis vulnerability was discovered by Nico Leidecker from Matta\n Consulting. \n\n=====================================================================\nHistory\n\n19-12-13 initial discovery\n30-12-13 client has mitigated the vulnerability\n30-12-13 initial attempt to contact the vendor\n30-12-13 reply from the vendor\n31-12-13 a draft of this advisory is sent to the vendor\n03-01-14 vendor can\u0027t reproduce / ask for more details\n03-01-14 more details are sent\n07-01-14 vendor recognize that there is a bug but dissmisses it as a\n security vulnerability\n07-01-14 more details are sent\n14-01-14 a week lapsed, no reply... we chase it up\n14-01-14 vendor reply: they\u0027re working on a response\n15-01-14 vendor respond: reclassify the bug as a security issue,\n indicate that they indend on fixing the bug in the Q1 release,\n provide a workaround and ask for us to hold on releasing the\n advisory until the release is published\n15-01-14 we agree to a deadline extension, send the CVEs MITRE has\n assigned\n... \n19-02-14 vendor release 5.9.1 (but doesn\u0027t let us know)\n... \n31-03-14 vendor indicate that the release of VSP 6 is delayed but \n the bugs have been fixed in 5.9.1\n02-04-14 release of this advisory\n\n=====================================================================\nAbout Matta\n\nMatta is a privately held company with Headquarters in London, and a\n European office in Amsterdam.   Established in 2001, Matta operates\n in Europe, Asia, the Middle East and North America using a respected\n team of senior consultants.  Matta is an accredited provider of\n Tiger Scheme training and conducts regular research. \n\nhttps://www.trustmatta.com\nhttps://www.trustmatta.com/training.html\nhttps://www.trustmatta.com/network-penetration-testing.html\nhttps://www.trustmatta.com/vulnerability-assessment.html\n\n=====================================================================\nDisclaimer and Copyright\n\nCopyright (c) 2014 Matta Consulting Limited. All rights reserved. \nThis advisory may be distributed as long as its distribution is\n free-of-charge and proper credit is given. \n\nThe information provided in this advisory is provided \"as is\" without\n warranty of any kind. Matta Consulting disclaims all warranties,\n either express or implied, including the warranties of\n merchantability and fitness for a particular purpose. In no event\n shall Matta Consulting or its suppliers be liable for any damages\n whatsoever including direct, indirect, incidental, consequential,\n loss of business profits or special damages, even if Matta\n Consulting or its suppliers have been advised of the possibility\n of such damages. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQEcBAEBCAAGBQJTO/cTAAoJELJDQjn66kB28ysIAILzCnK9mifpyjswSKOJPzUi\nEgcexJdVIjWZf32gLi202YCHJkiIXNGfG390HrWMQZZWU2l+lEb4cMb4NH8xsjzg\n06GbBnrRzBcE35dhO3C0aHuPFh7MRQzbRM4mVyPg1ViUlM7Lb9kQBoD6xdS4gZ09\nSaNAdm44WrvGiFAO8yuT56cjHZ1ZYfr+iHQjxY7UIrvmzKKSvMnvv13Fy2CIrRPe\nzk7QLfyxszbR/eo+HOroNhHAPnfl8Mu0Y/1ihFTJF96irCPuejR7v9WzqlJxRfZB\nZQJCKnz1c9cCDPxNY9GliBKT0FlkLX+IOVP/TF40jT7Zk6f+cWgOXcghlgnyunA=\n=XxBr\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-1409"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008778"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "BID",
        "id": "66595"
      },
      {
        "db": "PACKETSTORM",
        "id": "125990"
      }
    ],
    "trust": 3.42
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-1409",
        "trust": 4.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008778",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-538",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "66595",
        "trust": 0.3
      },
      {
        "db": "PACKETSTORM",
        "id": "125990",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "66595"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008778"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "PACKETSTORM",
        "id": "125990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-538"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1409"
      }
    ]
  },
  "id": "VAR-202001-1337",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.26666668
  },
  "last_update_date": "2024-11-23T22:37:32.417000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 1.6,
        "url": "https://www.mobileiron.com/"
      },
      {
        "title": "Apache Sentry",
        "trust": 0.8,
        "url": "https://sentry.apache.org/"
      },
      {
        "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
        "trust": 0.8,
        "url": "https://www.mobileiron.com/ja"
      },
      {
        "title": "MobileIron VSP  and Sentry\u2018j_username\u2019 parameter XPath Repair measures for injecting vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=106626"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008778"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-538"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-91",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-522",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-326",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008778"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1409"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.2,
        "url": "http://seclists.org/fulldisclosure/2014/apr/21"
      },
      {
        "trust": 2.4,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92351"
      },
      {
        "trust": 1.6,
        "url": "https://packetstormsecurity.com/files/cve/cve-2014-1409"
      },
      {
        "trust": 1.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1409"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-7286"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-7286"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1409"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-7287"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-7287"
      },
      {
        "trust": 0.1,
        "url": "https://www.trustmatta.com"
      },
      {
        "trust": 0.1,
        "url": "https://www.trustmatta.com/network-penetration-testing.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.trustmatta.com/training.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.hackinparis.com/sites/hackinparis.com/files/mdm-hip_2013.pdf"
      },
      {
        "trust": 0.1,
        "url": "https://www.trustmatta.com/advisories/matta-2013-004.txt"
      },
      {
        "trust": 0.1,
        "url": "https://www.trustmatta.com/vulnerability-assessment.html"
      },
      {
        "trust": 0.1,
        "url": "https://\u003ctarget\u003e/mics/j_spring_security_check"
      },
      {
        "trust": 0.1,
        "url": "https://www.trustmatta.com/advisories/matta-disclosure-policy-01.txt"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008778"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "PACKETSTORM",
        "id": "125990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-538"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1409"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "66595"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008778"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "PACKETSTORM",
        "id": "125990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-538"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1409"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-04-02T00:00:00",
        "db": "BID",
        "id": "66595"
      },
      {
        "date": "2020-03-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "date": "2020-01-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-008778"
      },
      {
        "date": "2020-03-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "date": "2014-04-02T17:22:22",
        "db": "PACKETSTORM",
        "id": "125990"
      },
      {
        "date": "2014-04-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201406-538"
      },
      {
        "date": "2020-01-08T16:15:10.170000",
        "db": "NVD",
        "id": "CVE-2014-1409"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-04-02T00:00:00",
        "db": "BID",
        "id": "66595"
      },
      {
        "date": "2020-03-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "date": "2020-01-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-008778"
      },
      {
        "date": "2020-03-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "date": "2020-01-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201406-538"
      },
      {
        "date": "2024-11-21T02:04:14.387000",
        "db": "NVD",
        "id": "CVE-2014-1409"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-538"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "MobileIron VSP and  Sentry Vulnerability regarding inadequate protection of credentials in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-538"
      }
    ],
    "trust": 0.6
  }
}

var-202002-0804
Vulnerability from variot

MobileIron VSP < 5.9.1 and Sentry < 5.0 has an insecure encryption scheme. MobileIron VSP and Sentry There is a cryptographic strength vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202002-0804",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sentry",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "mobileiron",
        "version": "5.0"
      },
      {
        "model": "virtual smartphone platform",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "mobileiron",
        "version": "5.9.1"
      },
      {
        "model": "sentry",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mobileiron",
        "version": "5.0"
      },
      {
        "model": "virtual smartphone platform",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mobileiron",
        "version": "5.9.1"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7287"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:mobileiron:sentry",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:mobileiron:virtual_smartphone_platform",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      }
    ]
  },
  "cve": "CVE-2013-7287",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2013-7287",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-007257",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2013-7287",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-007257",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-7287",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2013-007257",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202002-783",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-783"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7287"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "MobileIron VSP \u003c 5.9.1 and Sentry \u003c 5.0 has an insecure encryption scheme. MobileIron VSP and Sentry There is a cryptographic strength vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-7287"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-7287",
        "trust": 2.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-783",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-783"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7287"
      }
    ]
  },
  "id": "VAR-202002-0804",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.26666668
  },
  "last_update_date": "2024-11-23T22:37:32.455000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
        "trust": 0.8,
        "url": "https://www.mobileiron.com/ja"
      },
      {
        "title": "MobileIron VSP  and Sentry Fixes for encryption problem vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110524"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-783"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-326",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7287"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://seclists.org/fulldisclosure/2014/apr/21"
      },
      {
        "trust": 1.6,
        "url": "https://www.securityfocus.com/archive/1/531713"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-7287"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-7287"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-783"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7287"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-783"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7287"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "date": "2020-02-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202002-783"
      },
      {
        "date": "2020-02-13T23:15:12.057000",
        "db": "NVD",
        "id": "CVE-2013-7287"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      },
      {
        "date": "2021-01-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202002-783"
      },
      {
        "date": "2024-11-21T02:00:39.693000",
        "db": "NVD",
        "id": "CVE-2013-7287"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-783"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "MobileIron VSP and  Sentry Cryptographic strength vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007257"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-783"
      }
    ],
    "trust": 0.6
  }
}

var-202002-0803
Vulnerability from variot

MobileIron VSP < 5.9.1 and Sentry < 5.0 has a weak password obfuscation algorithm. MobileIron VSP and Sentry Exists in an inadequate protection of credentials.Information may be obtained. The MobileIron Virtual Smartphone Platform (VSP) and Sentry are products of MobileIron. VSP is a virtual smartphone platform. Sentry is a smart gateway product. An attacker could exploit the vulnerability to view encrypted data for sensitive information. MobileIron VSP and Sentry are prone to a security weakness that may allow attackers to obtain sensitive information. This may lead to other attacks. MobileIron VSP prior to 5.9.1 and Sentry 5.0 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

Matta Consulting - Matta Advisory
    https://www.trustmatta.com

      MobileIron Multiple Products
   Authentication Bypass Vulnerability

Advisory ID: MATTA-2013-004 CVE reference: CVE-2014-1409, CVE-2013-7286 Affected platforms: VSP and Sentry Version: VSP < 5.9.1 and Sentry < 5.0 Date: 2013-December-19 Security risk: Critical Researcher: Nico Leidecker Vendor Status: Patch released Vulnerability Disclosure Policy: https://www.trustmatta.com/advisories/matta-disclosure-policy-01.txt Permanent URL: https://www.trustmatta.com/advisories/MATTA-2013-004.txt

===================================================================== Description:

During an external penetration test exercise for one of our clients, an authentication bypass vulnerability was found in the administrative interface of a MobileIron deployment. This ultimately allowed us to, gain access to our client's internal network.

The 'j_username' parameter of the script at https:///mics/j_spring_security_check is vulnerable to blind XPath Injection, allowing an unauthenticated attacker to retrieve the underlying XML document.

This XML document is an excerpt of the configuration file of the device. It contains obfuscated passwords and, depending on configuration, might contain domain credentials and allow the attacker to reposition both internally and on any of the attached devices. This vulnerability has been assigned CVE-2014-1409. AES-ECB-PKCS1.5 with a known, shared key. While we won't release a full-featured exploit for the vulnerability, we will release a PoC to confirm whether the hashes are indeed vulnerable. The vendor has confirmed that a stronger encryption method is used since release 5.7. This vulnerability has been assigned CVE-2013-7286.

[1] https://www.hackinparis.com/sites/hackinparis.com/files/MDM-HIP_2013.pdf NB: A second insecure encryption scheme is described in [1], MITRE has assigned CVE-2013-7287 to that separate vulnerability. ===================================================================== Base64 encoded script to confirm whether the hash provided is vulnerable to CVE-2013-7286:

IyEvdXNyL2Jpbi9lbnYgcHl0aG9uCiMKIyAgTW9iaWxlSXJvbiB1c2VzIEFFUy1FQ0ItUEtDUzEu NSAod2l0aCBhIGtub3duIGtleSkKIyB0byBzdG9yZSBjcmVkZW50aWFscy4uLiBXaGF0IGEgYnJp bGxpYW50IGlkZWEhCiMKIyBUaGlzIHNjcmlwdCBpcyBhYm91dCBjaGVja2luZyB3aGV0aGVyIHRo ZSBwcm92aWRlZAojIGhhc2ggaXMgdnVsbmVyYWJsZSB0byBDVkUtMjAxMy03Mjg2IG9yIG5vdC4K IwojIE5leHRHZW4kIH4gMjAxMwoKaW1wb3J0IHN5cwppbXBvcnQgYmluYXNjaWkKaW1wb3J0IGhh c2hsaWIKaW1wb3J0IHN0cmluZwpmcm9tIENyeXB0by5DaXBoZXIgaW1wb3J0IEFFUwoKaWYgbGVu KHN5cy5hcmd2KTwyOiAgICAKIHN5cy5leGl0KCdVc2FnZTogLi9DVkUtMjAxMy03Mjg2LnB5IDxi YXNlNjRlbmNvZGVkIGJsb2I +JykKCkJTID0gOAp1bnBhZCA9IGxhbWJkYSBzIDogc1swOi1vcmQo c1stMV0pXQoKaWYgX19uYW1lX189PSAiX19tYWluX18iOgogICAgIyBHZW5lcmF0ZSB0aGUgbWFz dGVyIGtleS4uLgogICAgIyBZZXMuIEl0J3Mgbm90IGEgdHlwbyEKICAgIHBocmFzZSA9ICdIYWt1 bmEgbWF0YXRhIHdoYXQgYSB3b2RlcmZ1bCBwaHJhc2UnCiAgICBtID0gaGFzaGxpYi5zaGExKCkK ICAgIG0udXBkYXRlKHBocmFzZSkKIyBXZSBvbmx5IHdhbnQgdGhlIDE2IGZpcnN0IGJ5dGVzICgx MjhiaXQga2V5LCAxNjBiaXQgaGFzaCBmdW5jdGlvbikKICAgIGtleSA9IG0uZGlnZXN0KClbOjE2 XQogICAgY2lwaGVydGV4dCA9IGJpbmFzY2lpLmEyYl9iYXNlNjQoc3lzLmFyZ3ZbMV0pCiAgICBj aXBoZXIgPSBBRVMubmV3KGtleSwgQUVTLk1PREVfRUNCKSAKICAgIHBsYWludGV4dCA9IHVucGFk KGNpcGhlci5kZWNyeXB0KGNpcGhlcnRleHQpKQogICAgdnVsbmVyYWJsZSA9IGxlbihwbGFpbnRl eHQpID4gMCBhbmQgYWxsKGMgaW4gc3RyaW5nLnByaW50YWJsZSBmb3IgYyBpbiBwbGFpbnRleHQp CiAgICBwcmludCAnJXNWVUxORVJBQkxFIFRPIENWRS0yMDEzLTcyODYnICUgKCcnIGlmIHZ1bG5l cmFibGUgZWxzZSAnTk9UICcpCg==

===================================================================== Impact

Successful exploitation allows an unauthenticated attacker to take over the device and potentially any device attached to it as well as the Active Directory Domain it might be linked to.

===================================================================== Versions affected:

    • Sentry Standalone < 5
    • VSP < 5.9.1

===================================================================== Workaround:

Restrict access to the MICS service (administrative interface) to specific hosts: MICS Portal -> Security -> Portal ACLs -> System Manager Portal ACL

===================================================================== Credits

This vulnerability was discovered by Nico Leidecker from Matta Consulting.

===================================================================== History

19-12-13 initial discovery 30-12-13 client has mitigated the vulnerability 30-12-13 initial attempt to contact the vendor 30-12-13 reply from the vendor 31-12-13 a draft of this advisory is sent to the vendor 03-01-14 vendor can't reproduce / ask for more details 03-01-14 more details are sent 07-01-14 vendor recognize that there is a bug but dissmisses it as a security vulnerability 07-01-14 more details are sent 14-01-14 a week lapsed, no reply... we chase it up 14-01-14 vendor reply: they're working on a response 15-01-14 vendor respond: reclassify the bug as a security issue, indicate that they indend on fixing the bug in the Q1 release, provide a workaround and ask for us to hold on releasing the advisory until the release is published 15-01-14 we agree to a deadline extension, send the CVEs MITRE has assigned ... 19-02-14 vendor release 5.9.1 (but doesn't let us know) ... 31-03-14 vendor indicate that the release of VSP 6 is delayed but the bugs have been fixed in 5.9.1 02-04-14 release of this advisory

===================================================================== About Matta

Matta is a privately held company with Headquarters in London, and a European office in Amsterdam. Established in 2001, Matta operates in Europe, Asia, the Middle East and North America using a respected team of senior consultants. Matta is an accredited provider of Tiger Scheme training and conducts regular research.

https://www.trustmatta.com https://www.trustmatta.com/training.html https://www.trustmatta.com/network-penetration-testing.html https://www.trustmatta.com/vulnerability-assessment.html

===================================================================== Disclaimer and Copyright

Copyright (c) 2014 Matta Consulting Limited. All rights reserved. This advisory may be distributed as long as its distribution is free-of-charge and proper credit is given.

The information provided in this advisory is provided "as is" without warranty of any kind. Matta Consulting disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Matta Consulting or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Matta Consulting or its suppliers have been advised of the possibility of such damages. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQEcBAEBCAAGBQJTO/cTAAoJELJDQjn66kB28ysIAILzCnK9mifpyjswSKOJPzUi EgcexJdVIjWZf32gLi202YCHJkiIXNGfG390HrWMQZZWU2l+lEb4cMb4NH8xsjzg 06GbBnrRzBcE35dhO3C0aHuPFh7MRQzbRM4mVyPg1ViUlM7Lb9kQBoD6xdS4gZ09 SaNAdm44WrvGiFAO8yuT56cjHZ1ZYfr+iHQjxY7UIrvmzKKSvMnvv13Fy2CIrRPe zk7QLfyxszbR/eo+HOroNhHAPnfl8Mu0Y/1ihFTJF96irCPuejR7v9WzqlJxRfZB ZQJCKnz1c9cCDPxNY9GliBKT0FlkLX+IOVP/TF40jT7Zk6f+cWgOXcghlgnyunA= =XxBr -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202002-0803",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mobileiron sentry",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "att",
        "version": "5.0"
      },
      {
        "model": "mobileiron virtual smartphone platform",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "att",
        "version": "5.9.1"
      },
      {
        "model": "sentry",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apache",
        "version": "5.0"
      },
      {
        "model": "virtual smartphone platform",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mobileiron",
        "version": "5.9.1"
      },
      {
        "model": "virtual smartphone platform",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "mobileiron",
        "version": "5.9.1"
      },
      {
        "model": "sentry",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "mobileiron",
        "version": "5.0"
      },
      {
        "model": "virtual smartphone platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mobileiron",
        "version": "5.9"
      },
      {
        "model": "sentry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mobileiron",
        "version": "4.9"
      },
      {
        "model": "virtual smartphone platform",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "mobileiron",
        "version": "5.9.1"
      },
      {
        "model": "sentry",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "mobileiron",
        "version": "5.0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03884"
      },
      {
        "db": "BID",
        "id": "66633"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7286"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:apache:sentry",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:mobileiron:virtual_smartphone_platform",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Nico Leidecker",
    "sources": [
      {
        "db": "BID",
        "id": "66633"
      },
      {
        "db": "PACKETSTORM",
        "id": "125990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-533"
      }
    ],
    "trust": 1.0
  },
  "cve": "CVE-2013-7286",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2013-7286",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.1,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-007270",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2014-03884",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2013-7286",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-007270",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-7286",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2013-007270",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-03884",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201406-533",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2013-7286",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03884"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-7286"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-533"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7286"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "MobileIron VSP \u003c 5.9.1 and Sentry \u003c 5.0 has a weak password obfuscation algorithm. MobileIron VSP and Sentry Exists in an inadequate protection of credentials.Information may be obtained. The MobileIron Virtual Smartphone Platform (VSP) and Sentry are products of MobileIron. VSP is a virtual smartphone platform. Sentry is a smart gateway product. An attacker could exploit the vulnerability to view encrypted data for sensitive information. MobileIron VSP and Sentry are prone to a security weakness that may allow attackers to obtain sensitive information. This may lead to other attacks. \nMobileIron VSP prior to 5.9.1 and Sentry 5.0 are vulnerable. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n\n\tMatta Consulting - Matta Advisory\n\t    https://www.trustmatta.com\n\n          MobileIron Multiple Products\n       Authentication Bypass Vulnerability\n\nAdvisory ID: MATTA-2013-004\nCVE reference: CVE-2014-1409, CVE-2013-7286\nAffected platforms: VSP and Sentry\nVersion: VSP \u003c 5.9.1 and Sentry \u003c 5.0\nDate: 2013-December-19\nSecurity risk: Critical\nResearcher: Nico Leidecker \nVendor Status: Patch released\nVulnerability Disclosure Policy:\n https://www.trustmatta.com/advisories/matta-disclosure-policy-01.txt\nPermanent URL:\n https://www.trustmatta.com/advisories/MATTA-2013-004.txt\n\n=====================================================================\nDescription:\n\nDuring an external penetration test exercise for one of our clients,\n an authentication bypass vulnerability was found in the\n administrative interface of a MobileIron deployment. This ultimately\n allowed us to, gain access to our client\u0027s internal network. \n\nThe \u0027j_username\u0027 parameter of the script at\nhttps://\u003ctarget\u003e/mics/j_spring_security_check is vulnerable to blind\n XPath Injection, allowing an unauthenticated attacker to retrieve the\n underlying XML document. \n\nThis XML document is an excerpt of the configuration file of the\n device. It contains obfuscated passwords and, depending on\n configuration, might contain domain credentials and allow the\n attacker to reposition both internally and on any of the attached\n devices. \n This vulnerability has been assigned CVE-2014-1409. AES-ECB-PKCS1.5 with a known, shared key. While we\n won\u0027t release a full-featured exploit for the vulnerability, we will\n release a PoC to confirm whether the hashes are indeed vulnerable. \n The vendor has confirmed that a stronger encryption method is used\n since release 5.7. \n This vulnerability has been assigned CVE-2013-7286. \n\n[1] \nhttps://www.hackinparis.com/sites/hackinparis.com/files/MDM-HIP_2013.pdf\nNB: A second insecure encryption scheme is described in [1], MITRE has\n assigned CVE-2013-7287 to that separate vulnerability. \n=====================================================================\nBase64 encoded script to confirm whether the hash provided is\n  vulnerable to CVE-2013-7286:\n\nIyEvdXNyL2Jpbi9lbnYgcHl0aG9uCiMKIyAgTW9iaWxlSXJvbiB1c2VzIEFFUy1FQ0ItUEtDUzEu\nNSAod2l0aCBhIGtub3duIGtleSkKIyB0byBzdG9yZSBjcmVkZW50aWFscy4uLiBXaGF0IGEgYnJp\nbGxpYW50IGlkZWEhCiMKIyBUaGlzIHNjcmlwdCBpcyBhYm91dCBjaGVja2luZyB3aGV0aGVyIHRo\nZSBwcm92aWRlZAojIGhhc2ggaXMgdnVsbmVyYWJsZSB0byBDVkUtMjAxMy03Mjg2IG9yIG5vdC4K\nIwojIE5leHRHZW4kIH4gMjAxMwoKaW1wb3J0IHN5cwppbXBvcnQgYmluYXNjaWkKaW1wb3J0IGhh\nc2hsaWIKaW1wb3J0IHN0cmluZwpmcm9tIENyeXB0by5DaXBoZXIgaW1wb3J0IEFFUwoKaWYgbGVu\nKHN5cy5hcmd2KTwyOiAgICAKIHN5cy5leGl0KCdVc2FnZTogLi9DVkUtMjAxMy03Mjg2LnB5IDxi\nYXNlNjRlbmNvZGVkIGJsb2I\n+JykKCkJTID0gOAp1bnBhZCA9IGxhbWJkYSBzIDogc1swOi1vcmQo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\ncmFibGUgZWxzZSAnTk9UICcpCg==\n\n=====================================================================\nImpact\n\nSuccessful exploitation allows an unauthenticated attacker to take\n over the device and potentially any device attached to it as well\n as the Active Directory Domain it might be linked to. \n\n=====================================================================\nVersions affected:\n\n- - Sentry Standalone \u003c 5\n- - VSP \u003c 5.9.1\n\n=====================================================================\nWorkaround:\n\nRestrict access to the MICS service (administrative interface) to\n specific hosts:\nMICS Portal -\u003e Security -\u003e Portal ACLs -\u003e System Manager Portal ACL\n\n=====================================================================\nCredits\n\nThis vulnerability was discovered by Nico Leidecker from Matta\n Consulting. \n\n=====================================================================\nHistory\n\n19-12-13 initial discovery\n30-12-13 client has mitigated the vulnerability\n30-12-13 initial attempt to contact the vendor\n30-12-13 reply from the vendor\n31-12-13 a draft of this advisory is sent to the vendor\n03-01-14 vendor can\u0027t reproduce / ask for more details\n03-01-14 more details are sent\n07-01-14 vendor recognize that there is a bug but dissmisses it as a\n security vulnerability\n07-01-14 more details are sent\n14-01-14 a week lapsed, no reply... we chase it up\n14-01-14 vendor reply: they\u0027re working on a response\n15-01-14 vendor respond: reclassify the bug as a security issue,\n indicate that they indend on fixing the bug in the Q1 release,\n provide a workaround and ask for us to hold on releasing the\n advisory until the release is published\n15-01-14 we agree to a deadline extension, send the CVEs MITRE has\n assigned\n... \n19-02-14 vendor release 5.9.1 (but doesn\u0027t let us know)\n... \n31-03-14 vendor indicate that the release of VSP 6 is delayed but \n the bugs have been fixed in 5.9.1\n02-04-14 release of this advisory\n\n=====================================================================\nAbout Matta\n\nMatta is a privately held company with Headquarters in London, and a\n European office in Amsterdam.   Established in 2001, Matta operates\n in Europe, Asia, the Middle East and North America using a respected\n team of senior consultants.  Matta is an accredited provider of\n Tiger Scheme training and conducts regular research. \n\nhttps://www.trustmatta.com\nhttps://www.trustmatta.com/training.html\nhttps://www.trustmatta.com/network-penetration-testing.html\nhttps://www.trustmatta.com/vulnerability-assessment.html\n\n=====================================================================\nDisclaimer and Copyright\n\nCopyright (c) 2014 Matta Consulting Limited. All rights reserved. \nThis advisory may be distributed as long as its distribution is\n free-of-charge and proper credit is given. \n\nThe information provided in this advisory is provided \"as is\" without\n warranty of any kind. Matta Consulting disclaims all warranties,\n either express or implied, including the warranties of\n merchantability and fitness for a particular purpose. In no event\n shall Matta Consulting or its suppliers be liable for any damages\n whatsoever including direct, indirect, incidental, consequential,\n loss of business profits or special damages, even if Matta\n Consulting or its suppliers have been advised of the possibility\n of such damages. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQEcBAEBCAAGBQJTO/cTAAoJELJDQjn66kB28ysIAILzCnK9mifpyjswSKOJPzUi\nEgcexJdVIjWZf32gLi202YCHJkiIXNGfG390HrWMQZZWU2l+lEb4cMb4NH8xsjzg\n06GbBnrRzBcE35dhO3C0aHuPFh7MRQzbRM4mVyPg1ViUlM7Lb9kQBoD6xdS4gZ09\nSaNAdm44WrvGiFAO8yuT56cjHZ1ZYfr+iHQjxY7UIrvmzKKSvMnvv13Fy2CIrRPe\nzk7QLfyxszbR/eo+HOroNhHAPnfl8Mu0Y/1ihFTJF96irCPuejR7v9WzqlJxRfZB\nZQJCKnz1c9cCDPxNY9GliBKT0FlkLX+IOVP/TF40jT7Zk6f+cWgOXcghlgnyunA=\n=XxBr\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-7286"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-03884"
      },
      {
        "db": "BID",
        "id": "66633"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-7286"
      },
      {
        "db": "PACKETSTORM",
        "id": "125990"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-7286",
        "trust": 3.5
      },
      {
        "db": "BID",
        "id": "66633",
        "trust": 0.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-03884",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-533",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "125990",
        "trust": 0.2
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-7286",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03884"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-7286"
      },
      {
        "db": "BID",
        "id": "66633"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "PACKETSTORM",
        "id": "125990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-533"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7286"
      }
    ]
  },
  "id": "VAR-202002-0803",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03884"
      }
    ],
    "trust": 0.86666668
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03884"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:37:32.477000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Apache Sentry",
        "trust": 0.8,
        "url": "https://sentry.apache.org/"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.mobileiron.com/"
      },
      {
        "title": "Patch for MobileIron VSP and Sentry Information Disclosure Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/46761"
      },
      {
        "title": "MobileIron VSP  and Sentry Weak Crypto Security Vulnerability Fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=108053"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03884"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-533"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-326",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-522",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7286"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://seclists.org/fulldisclosure/2014/apr/21"
      },
      {
        "trust": 1.7,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92352"
      },
      {
        "trust": 1.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-7286"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-7286"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/66633"
      },
      {
        "trust": 0.4,
        "url": "https://www.hackinparis.com/sites/hackinparis.com/files/mdm-hip_2013.pdf"
      },
      {
        "trust": 0.4,
        "url": "https://www.trustmatta.com/advisories/matta-2013-004.txt"
      },
      {
        "trust": 0.3,
        "url": "http://www.mobileiron.com/en/products/advanced-mobile-management/sentry"
      },
      {
        "trust": 0.3,
        "url": "http://www.mobileiron.com/en/solutions/platform-mobile-it"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/522.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://packetstormsecurity.com/files/125990/mobileiron-vsp-sentry-authentication-bypass.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.trustmatta.com"
      },
      {
        "trust": 0.1,
        "url": "https://www.trustmatta.com/network-penetration-testing.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1409"
      },
      {
        "trust": 0.1,
        "url": "https://www.trustmatta.com/training.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.trustmatta.com/vulnerability-assessment.html"
      },
      {
        "trust": 0.1,
        "url": "https://\u003ctarget\u003e/mics/j_spring_security_check"
      },
      {
        "trust": 0.1,
        "url": "https://www.trustmatta.com/advisories/matta-disclosure-policy-01.txt"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03884"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-7286"
      },
      {
        "db": "BID",
        "id": "66633"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "PACKETSTORM",
        "id": "125990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-533"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7286"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03884"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-7286"
      },
      {
        "db": "BID",
        "id": "66633"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "db": "PACKETSTORM",
        "id": "125990"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-533"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7286"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-06-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-03884"
      },
      {
        "date": "2020-02-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2013-7286"
      },
      {
        "date": "2014-04-02T00:00:00",
        "db": "BID",
        "id": "66633"
      },
      {
        "date": "2020-03-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "date": "2014-04-02T17:22:22",
        "db": "PACKETSTORM",
        "id": "125990"
      },
      {
        "date": "2014-04-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201406-533"
      },
      {
        "date": "2020-02-12T18:15:09.987000",
        "db": "NVD",
        "id": "CVE-2013-7286"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-06-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-03884"
      },
      {
        "date": "2020-02-25T00:00:00",
        "db": "VULMON",
        "id": "CVE-2013-7286"
      },
      {
        "date": "2014-04-02T00:00:00",
        "db": "BID",
        "id": "66633"
      },
      {
        "date": "2020-03-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      },
      {
        "date": "2021-08-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201406-533"
      },
      {
        "date": "2024-11-21T02:00:39.553000",
        "db": "NVD",
        "id": "CVE-2013-7286"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-533"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "MobileIron VSP and  Sentry Vulnerability regarding inadequate protection of credentials in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007270"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-533"
      }
    ],
    "trust": 0.6
  }
}

Vulnerability from fkie_nvd
Published
2020-01-08 16:15
Modified
2024-11-21 02:04
Severity ?
Summary
MobileIron VSP versions prior to 5.9.1 and Sentry versions prior to 5.0 have an authentication bypass vulnerability due to an XML file with obfuscated passwords
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mobileiron:virtual_smartphone_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FDA223F-7FC0-4F8C-8A09-AE5709C2CB34",
              "versionEndExcluding": "5.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mobileiron:sentry:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E45BE636-24EE-4F60-B096-1DD8736E103E",
              "versionEndExcluding": "5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MobileIron VSP versions prior to 5.9.1 and Sentry versions prior to 5.0 have an authentication bypass vulnerability due to an XML file with obfuscated passwords"
    },
    {
      "lang": "es",
      "value": "MobileIron VSP versiones anteriores a la versi\u00f3n  5.9.1 y Sentry versiones anteriores a la versi\u00f3n  5.0, tienen una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n debido a un archivo XML con contrase\u00f1as ofuscadas."
    }
  ],
  "id": "CVE-2014-1409",
  "lastModified": "2024-11-21T02:04:14.387",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-08T16:15:10.170",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Apr/21"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92351"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://packetstormsecurity.com/files/cve/CVE-2014-1409"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Apr/21"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://packetstormsecurity.com/files/cve/CVE-2014-1409"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-91"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-07-07 02:15
Modified
2025-04-03 19:52
Summary
A remote code execution vulnerability in MobileIron Core & Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0; and Sentry versions 9.7.2 and earlier, and 9.8.0; and Monitor and Reporting Database (RDB) version 2.0.0.1 and earlier that allows remote attackers to execute arbitrary code via unspecified vectors.
References
cve@mitre.orghttp://packetstormsecurity.com/files/161097/MobileIron-MDM-Hessian-Based-Java-Deserialization-Remote-Code-Execution.htmlExploit, Third Party Advisory, VDB Entry
cve@mitre.orghttps://cwe.mitre.org/data/definitions/41.htmlThird Party Advisory
cve@mitre.orghttps://perchsecurity.com/perch-news/cve-spotlight-mobileiron-rce-cve-2020-15505/Exploit, Third Party Advisory
cve@mitre.orghttps://www.mobileiron.com/en/blog/mobileiron-security-updates-availableVendor Advisory
cve@mitre.orghttps://www.mobileiron.com/en/blog/mobileiron-security-updates-availableVendor Advisory
cve@mitre.orghttps://www.mobileiron.com/en/blog/mobileiron-security-updates-availableVendor Advisory
cve@mitre.orghttps://www.mobileiron.com/en/blog/mobileiron-security-updates-availableVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/161097/MobileIron-MDM-Hessian-Based-Java-Deserialization-Remote-Code-Execution.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://cwe.mitre.org/data/definitions/41.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://perchsecurity.com/perch-news/cve-spotlight-mobileiron-rce-cve-2020-15505/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.mobileiron.com/en/blog/mobileiron-security-updates-availableVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.mobileiron.com/en/blog/mobileiron-security-updates-availableVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.mobileiron.com/en/blog/mobileiron-security-updates-availableVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.mobileiron.com/en/blog/mobileiron-security-updates-availableVendor Advisory



{
  "cisaActionDue": "2022-05-03",
  "cisaExploitAdd": "2021-11-03",
  "cisaRequiredAction": "Apply updates per vendor instructions.",
  "cisaVulnerabilityName": "Ivanti MobileIron Multiple Products Remote Code Execution Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85108795-4F9A-442D-AC89-7D7BD789CDE8",
              "versionEndExcluding": "10.3.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "435C14AB-8E82-4960-9707-029E78F05B7F",
              "versionEndExcluding": "10.4.0.4",
              "versionStartIncluding": "10.4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F33D03-891D-441E-9791-C30C6ACDFF52",
              "versionEndExcluding": "10.5.1.1",
              "versionStartIncluding": "10.5.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF97F92-1F87-4999-8C2F-931FABBA808C",
              "versionEndExcluding": "10.5.2.1",
              "versionStartIncluding": "10.5.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "224FABD4-3BEB-4B43-A56F-FDC0DB4F4A6D",
              "versionEndExcluding": "10.6.0.1",
              "versionStartIncluding": "10.6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:enterprise_connector:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EAE4F4A-3367-478C-847B-874F5478A88C",
              "versionEndExcluding": "10.3.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:enterprise_connector:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E35CE2A3-27E9-4A07-B955-8566B282AD8E",
              "versionEndExcluding": "10.4.0.4",
              "versionStartIncluding": "10.4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:enterprise_connector:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D14ACC79-D792-4D49-9614-08D498663C89",
              "versionEndExcluding": "10.5.1.1",
              "versionStartIncluding": "10.5.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:enterprise_connector:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E96AFC4F-59A2-48C6-A19B-37C409665A6A",
              "versionEndExcluding": "10.5.2.1",
              "versionStartIncluding": "10.5.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:enterprise_connector:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B882EB7-EF53-41A9-9C6F-206F29344BC8",
              "versionEndExcluding": "10.6.0.1",
              "versionStartIncluding": "10.6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:monitor_and_reporting_database:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01885369-CE7E-40E3-903A-F7D4B123F0FA",
              "versionEndExcluding": "2.0.0.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:sentry:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E6B0D3-880D-4159-BF43-0103AC305969",
              "versionEndExcluding": "9.7.3",
              "versionStartIncluding": "9.7.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:sentry:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3AE2420-9714-456E-81DC-2464B92C1ED8",
              "versionEndExcluding": "9.8.1",
              "versionStartIncluding": "9.8.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A remote code execution vulnerability in MobileIron Core \u0026 Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0; and Sentry versions 9.7.2 and earlier, and 9.8.0; and Monitor and Reporting Database (RDB) version 2.0.0.1 and earlier that allows remote attackers to execute arbitrary code via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto en las versiones 10.3.0.3 y anteriores del MobileIron Core y Connector, versiones 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 y 10.6.0.0; y las versiones 9 del Sentry. 7.2 y anteriores, y versiones 9.8.0; y Monitor and Reporting Database (RDB) versi\u00f3n 2.0.0.1 y anteriores que permite a los atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados"
    }
  ],
  "id": "CVE-2020-15505",
  "lastModified": "2025-04-03T19:52:34.470",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2020-07-07T02:15:10.613",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/161097/MobileIron-MDM-Hessian-Based-Java-Deserialization-Remote-Code-Execution.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cwe.mitre.org/data/definitions/41.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://perchsecurity.com/perch-news/cve-spotlight-mobileiron-rce-cve-2020-15505/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/161097/MobileIron-MDM-Hessian-Based-Java-Deserialization-Remote-Code-Execution.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cwe.mitre.org/data/definitions/41.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://perchsecurity.com/perch-news/cve-spotlight-mobileiron-rce-cve-2020-15505/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-706"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-706"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-02-13 23:15
Modified
2024-11-21 02:00
Severity ?
Summary
MobileIron VSP < 5.9.1 and Sentry < 5.0 has an insecure encryption scheme.
References
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mobileiron:sentry:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E45BE636-24EE-4F60-B096-1DD8736E103E",
              "versionEndExcluding": "5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:virtual_smartphone_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FDA223F-7FC0-4F8C-8A09-AE5709C2CB34",
              "versionEndExcluding": "5.9.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MobileIron VSP \u003c 5.9.1 and Sentry \u003c 5.0 has an insecure encryption scheme."
    },
    {
      "lang": "es",
      "value": "MobileIron VSP versiones anteriores a 5.9.1 y Sentry versiones anteriores a 5.0, presentan un esquema de cifrado no seguro."
    }
  ],
  "id": "CVE-2013-7287",
  "lastModified": "2024-11-21T02:00:39.693",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-02-13T23:15:12.057",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Apr/21"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.securityfocus.com/archive/1/531713"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Apr/21"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.securityfocus.com/archive/1/531713"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-326"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-07-07 02:15
Modified
2024-11-21 05:05
Severity ?
Summary
An authentication bypass vulnerability in MobileIron Core & Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0 that allows remote attackers to bypass authentication mechanisms via unspecified vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mobileiron:cloud:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C4F0B0B-388C-4B6A-B233-77269AFE887E",
              "versionEndIncluding": "10.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ACD8393-2E8F-4790-B142-1C41D2EA0956",
              "versionEndIncluding": "10.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:enterprise_connector:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F1D3A8A-BCA4-4DF8-A126-F9E10B194ED0",
              "versionEndIncluding": "10.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:reporting_database:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B823AB8-E08B-4A3B-BABF-3E9FB7C18B99",
              "versionEndIncluding": "10.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:sentry:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96937DB3-B17C-4718-B2D9-6219B5B10676",
              "versionEndIncluding": "10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An authentication bypass vulnerability in MobileIron Core \u0026 Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0 that allows remote attackers to bypass authentication mechanisms via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de omisi\u00f3n de autentificaci\u00f3n en MobileIron Core y Connector versiones 10.3.0.3 y anteriores, versiones 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 y versi\u00f3n 10.6.0.0 permite a atacantes remotos omitir los mecanismos de autenticaci\u00f3n por medio de vectores no especificados"
    }
  ],
  "id": "CVE-2020-15506",
  "lastModified": "2024-11-21T05:05:39.687",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-07T02:15:10.677",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-07-07 02:15
Modified
2024-11-21 05:05
Summary
An arbitrary file reading vulnerability in MobileIron Core versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0 that allows remote attackers to read files on the system via unspecified vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mobileiron:cloud:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C4F0B0B-388C-4B6A-B233-77269AFE887E",
              "versionEndIncluding": "10.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ACD8393-2E8F-4790-B142-1C41D2EA0956",
              "versionEndIncluding": "10.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:enterprise_connector:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F1D3A8A-BCA4-4DF8-A126-F9E10B194ED0",
              "versionEndIncluding": "10.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:reporting_database:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B823AB8-E08B-4A3B-BABF-3E9FB7C18B99",
              "versionEndIncluding": "10.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mobileiron:sentry:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96937DB3-B17C-4718-B2D9-6219B5B10676",
              "versionEndIncluding": "10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An arbitrary file reading vulnerability in MobileIron Core versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0 that allows remote attackers to read files on the system via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad arbitraria de lectura de archivos en MobileIron Core y Connector versiones 10.3.0.3 y anteriores, versiones 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 y versi\u00f3n 10.6.0.0 que permite a atacantes remotos leer archivos sobre el sistema por medio de vectores no especificados"
    }
  ],
  "id": "CVE-2020-15507",
  "lastModified": "2024-11-21T05:05:39.827",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-07T02:15:10.753",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.mobileiron.com/en/blog/mobileiron-security-updates-available"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}