var-200411-0074
Vulnerability from variot

Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS 15600 before 1.3(0) enable TFTP service on UDP port 69 by default, which allows remote attackers to GET or PUT ONS system files on the current active TCC in the /flash0 or /flash1 directories. Cisco Systems optical networking systems software Exists in unspecified vulnerabilities.None. Cisco ONS is a fiber optic network platform developed by CISCO.

There are multiple vulnerabilities in Cisco ONS that can lead to attacks such as unauthorized access to the device, denial of service, or locked account and continued authentication. These control cards are generally isolated from the Internet and connected only to the local network environment. The following vulnerabilities exist:

-CSCec17308 / CSCec19124 (tftp)

The TFTP service uses UDP port 69 by default, allowing GET and PUT commands to be performed without any authentication, and the client can connect to the fiber optic device to upload and download arbitrary user data. TCP 1080 port is used for network management and control card communication. An ACK denial of service attack can cause the control card on a fiber optic device to reset.

-CSCec66884 / CSCec71157 (SU access)

By default, only superusers are allowed to telnet access to the VxWorks operating system. Due to this vulnerability, if the superuser account is blocked, locked and suspended, you can still log in to the VxWorks shell using the set password. It should be noted that the various ONS platforms are intended to be deployed on networks that are physically separated from the Internet, so exposure to these issues by remote attackers is limited

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200411-0074",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1\\(2\\)"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(1\\)"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(2\\)"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.5"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1\\(0\\)"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.0"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1\\(1\\)"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1.0"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1\\(3\\)"
      },
      {
        "model": "ons 15454sdh",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "4.5"
      },
      {
        "model": "ons 15454sdh",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": "4.1(2)"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": "4.0.0"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": "4.1(0)"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": "1.0"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": "4.1(1)"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": "4.5"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": "4.0(2)"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": "4.1.0"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": "4.0(1)"
      },
      {
        "model": "optical networking systems software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": "4.1(3)"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.6,
        "vendor": "none",
        "version": null
      },
      {
        "model": "ons 15454 optical transport platform",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.1\\(3\\)"
      },
      {
        "model": "ons 15454 optical transport platform",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.1\\(1\\)"
      },
      {
        "model": "ons 15454 optical transport platform",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.1\\(2\\)"
      },
      {
        "model": "ons 15454sdh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.1\\(1\\)"
      },
      {
        "model": "ons 15454sdh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.1\\(0\\)"
      },
      {
        "model": "ons 15454sdh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.1\\(2\\)"
      },
      {
        "model": "ons 15600",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "ons 15454 optical transport platform",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.0\\(1\\)"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "optical networking",
        "version": "1.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "optical networking",
        "version": "4.0(1)"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "optical networking",
        "version": "4.0(2)"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "optical networking",
        "version": "4.0.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "optical networking",
        "version": "4.1(0)"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "optical networking",
        "version": "4.1(1)"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "optical networking",
        "version": "4.1(2)"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "optical networking",
        "version": "4.1(3)"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "optical networking",
        "version": "4.1.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "optical networking",
        "version": "4.5"
      },
      {
        "model": "ons",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "156001.0"
      },
      {
        "model": "ons 15454sdh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1(2)"
      },
      {
        "model": "ons 15454sdh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1(1)"
      },
      {
        "model": "ons 15454sdh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1(0)"
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154544.1(3)"
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154544.1(2)"
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154544.1(1)"
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154544.1(0)"
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154544.1"
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154544.0(1)"
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154544.0"
      },
      {
        "model": "ons",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "153274.1(2)"
      },
      {
        "model": "ons",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "153274.1(1)"
      },
      {
        "model": "ons",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "153274.1(0)"
      },
      {
        "model": "ons",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "153274.0(2)"
      },
      {
        "model": "ons",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "153274.0(1)"
      },
      {
        "model": "ons",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "153274.0"
      },
      {
        "model": "ons",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "156001.3(0)"
      },
      {
        "model": "ons",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "156001.1(1)"
      },
      {
        "model": "ons",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "156001.1(0)"
      },
      {
        "model": "ons 15454sdh",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.6(1)"
      },
      {
        "model": "ons optical transport platform",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154544.1(3)"
      },
      {
        "model": "ons optical transport platform",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154544.1(1)"
      },
      {
        "model": "ons optical transport platform",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154544.0(2)"
      },
      {
        "model": "ons",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "153274.1(3)"
      },
      {
        "model": "ons",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "153274.1(1)"
      },
      {
        "model": "ons",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "153274.0(2)"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ebe2df6a-23cc-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7fc400-463f-11e9-a58e-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2004-0503"
      },
      {
        "db": "BID",
        "id": "9699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000939"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-121"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0306"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Security Advisory",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-121"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2004-0306",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2004-0306",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "ebe2df6a-23cc-11e6-abef-000c29c66e3d",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "7d7fc400-463f-11e9-a58e-000c29342cb1",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-8736",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2004-0306",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2004-0306",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200411-121",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "ebe2df6a-23cc-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "7d7fc400-463f-11e9-a58e-000c29342cb1",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-8736",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ebe2df6a-23cc-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7fc400-463f-11e9-a58e-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8736"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000939"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-121"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0306"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS 15600 before 1.3(0) enable TFTP service on UDP port 69 by default, which allows remote attackers to GET or PUT ONS system files on the current active TCC in the /flash0 or /flash1 directories. Cisco Systems optical networking systems software Exists in unspecified vulnerabilities.None. Cisco ONS is a fiber optic network platform developed by CISCO. \n\n\u00a0There are multiple vulnerabilities in Cisco ONS that can lead to attacks such as unauthorized access to the device, denial of service, or locked account and continued authentication. These control cards are generally isolated from the Internet and connected only to the local network environment. The following vulnerabilities exist:\n\n\u00a0-CSCec17308 / CSCec19124 (tftp)\n\n\u00a0The TFTP service uses UDP port 69 by default, allowing GET and PUT commands to be performed without any authentication, and the client can connect to the fiber optic device to upload and download arbitrary user data. TCP 1080 port is used for network management and control card communication. An ACK denial of service attack can cause the control card on a fiber optic device to reset. \n\n\u00a0-CSCec66884 / CSCec71157 (SU access)\n\n\u00a0By default, only superusers are allowed to telnet access to the VxWorks operating system. Due to this vulnerability, if the superuser account is blocked, locked and suspended, you can still log in to the VxWorks shell using the set password. \nIt should be noted that the various ONS platforms are intended to be deployed on networks that are physically separated from the Internet, so exposure to these issues by remote attackers is limited",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0306"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000939"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2004-0503"
      },
      {
        "db": "BID",
        "id": "9699"
      },
      {
        "db": "IVD",
        "id": "ebe2df6a-23cc-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7fc400-463f-11e9-a58e-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8736"
      }
    ],
    "trust": 2.88
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2004-0306",
        "trust": 4.6
      },
      {
        "db": "BID",
        "id": "9699",
        "trust": 2.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-121",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2004-0503",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000939",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "15264",
        "trust": 0.6
      },
      {
        "db": "CISCO",
        "id": "20040219 CISCO ONS 15327, ONS 15454, ONS 15454 SDH, AND ONS 15600 VULNERABILITIES",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "EBE2DF6A-23CC-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "7D7FC400-463F-11E9-A58E-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-8736",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ebe2df6a-23cc-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7fc400-463f-11e9-a58e-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2004-0503"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8736"
      },
      {
        "db": "BID",
        "id": "9699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000939"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-121"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0306"
      }
    ]
  },
  "id": "VAR-200411-0074",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "ebe2df6a-23cc-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7fc400-463f-11e9-a58e-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2004-0503"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8736"
      }
    ],
    "trust": 0.11000000000000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT",
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.4
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ebe2df6a-23cc-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7fc400-463f-11e9-a58e-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2004-0503"
      }
    ]
  },
  "last_update_date": "2024-08-14T14:08:58.040000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Cisco\u00a0ONS\u00a015327",
        "trust": 0.8,
        "url": "https://www.cisco.com/web/JP/product/hs/optical/ons15327/prodlit/pdf/0261_on15327.pdf"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000939"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "others (CWE-Other) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000939"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0306"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ons.shtml"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/9699"
      },
      {
        "trust": 1.9,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15264"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0306"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/15264"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-8736"
      },
      {
        "db": "BID",
        "id": "9699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000939"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-121"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0306"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "ebe2df6a-23cc-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7fc400-463f-11e9-a58e-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2004-0503"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8736"
      },
      {
        "db": "BID",
        "id": "9699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000939"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-121"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0306"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-02-19T00:00:00",
        "db": "IVD",
        "id": "ebe2df6a-23cc-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2004-02-19T00:00:00",
        "db": "IVD",
        "id": "7d7fc400-463f-11e9-a58e-000c29342cb1"
      },
      {
        "date": "2004-02-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2004-0503"
      },
      {
        "date": "2004-11-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-8736"
      },
      {
        "date": "2004-02-19T00:00:00",
        "db": "BID",
        "id": "9699"
      },
      {
        "date": "2024-06-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2004-000939"
      },
      {
        "date": "2004-02-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200411-121"
      },
      {
        "date": "2004-11-23T05:00:00",
        "db": "NVD",
        "id": "CVE-2004-0306"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-02-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2004-0503"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-8736"
      },
      {
        "date": "2009-07-12T03:06:00",
        "db": "BID",
        "id": "9699"
      },
      {
        "date": "2024-06-07T09:02:00",
        "db": "JVNDB",
        "id": "JVNDB-2004-000939"
      },
      {
        "date": "2005-05-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200411-121"
      },
      {
        "date": "2018-10-30T16:26:17.390000",
        "db": "NVD",
        "id": "CVE-2004-0306"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-121"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Systems \u00a0optical\u00a0networking\u00a0systems\u00a0software\u00a0 Vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000939"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "unknown",
    "sources": [
      {
        "db": "IVD",
        "id": "ebe2df6a-23cc-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7fc400-463f-11e9-a58e-000c29342cb1"
      },
      {
        "db": "BID",
        "id": "9699"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200411-121"
      }
    ],
    "trust": 1.3
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…