VAR-200701-0215
Vulnerability from variot - Updated: 2023-12-18 12:53T-Com Speedport 500V routers with firmware 1.31 allow remote attackers to bypass authentication and reconfigure the device via a LOGINKEY=TECOM cookie value. Exploiting this issue allows attackers to gain unauthorized access to the device's administration interface. This can result in the compromise of the device and may facilitate attacks against computers connected to the device. T-Com Speed 500V with Firmware version 1.31 is vulnerable; other versions may also be affected. The Speedport 500V is a broadband router widely sold by German ADSL providers. Speedport only sets the cookie to the LOGINKEY=TECOM content (hard coded and cannot be changed) when authenticating the user's input password. If an attacker can create this cookie, he can bypass password authentication by directly calling the configuration HTML site, obtain unauthorized access, and change system configurations, such as disabling the firewall. While an attacker cannot change the system password without knowing the old password, it is possible to reset the password to the default via a firmware upgrade and gain full system access.
Secunia is proud to announce the availability of the Secunia Software Inspector.
The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor.
Try it out online: http://secunia.com/software_inspector/
TITLE: T-Com Speedport Authentication Bypass
SECUNIA ADVISORY ID: SA23853
VERIFY ADVISORY: http://secunia.com/advisories/23853/
CRITICAL: Less critical
IMPACT: Security Bypass
WHERE:
From local network
OPERATING SYSTEM: T-Com Speedport 500V 1.x http://secunia.com/product/13294/
DESCRIPTION: Virginity has reported a vulnerability in T-Com Speedport, which can be exploited by malicious people to bypass certain security restrictions.
SOLUTION: Use the device only in trusted networks. via a firewall).
PROVIDED AND/OR DISCOVERED BY: Virginity
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200701-0215",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "speedport 500v",
"scope": "eq",
"trust": 1.6,
"vendor": "t com",
"version": null
},
{
"model": "speedport 500v",
"scope": "eq",
"trust": 1.0,
"vendor": "t com",
"version": "1.31"
},
{
"model": "speedport 500v",
"scope": "eq",
"trust": 0.8,
"vendor": "t com",
"version": "firmware 1.31"
},
{
"model": "speedport w500v",
"scope": "eq",
"trust": 0.3,
"vendor": "t com",
"version": "1.30"
},
{
"model": "speedport",
"scope": "eq",
"trust": 0.3,
"vendor": "t com",
"version": "500v1.31"
},
{
"model": "targa wr500 voip mod500",
"scope": null,
"trust": 0.3,
"vendor": "mod500",
"version": null
},
{
"model": "speedport w500v mod500",
"scope": null,
"trust": 0.3,
"vendor": "mod500",
"version": null
},
{
"model": "speedport mod500",
"scope": "eq",
"trust": 0.3,
"vendor": "mod500",
"version": "500v"
}
],
"sources": [
{
"db": "BID",
"id": "22160"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004983"
},
{
"db": "NVD",
"id": "CVE-2007-0435"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-374"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:t-com:speedport_500v:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:t-com:speedport_500v_firmware:1.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-0435"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Virginity advisory07@smtp.ru",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200701-374"
}
],
"trust": 0.6
},
"cve": "CVE-2007-0435",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2007-0435",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-23797",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2007-0435",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-200701-374",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-23797",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-23797"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004983"
},
{
"db": "NVD",
"id": "CVE-2007-0435"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-374"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "T-Com Speedport 500V routers with firmware 1.31 allow remote attackers to bypass authentication and reconfigure the device via a LOGINKEY=TECOM cookie value. \nExploiting this issue allows attackers to gain unauthorized access to the device\u0027s administration interface. This can result in the compromise of the device and may facilitate attacks against computers connected to the device. \nT-Com Speed 500V with Firmware version 1.31 is vulnerable; other versions may also be affected. The Speedport 500V is a broadband router widely sold by German ADSL providers. Speedport only sets the cookie to the LOGINKEY=TECOM content (hard coded and cannot be changed) when authenticating the user\u0027s input password. If an attacker can create this cookie, he can bypass password authentication by directly calling the configuration HTML site, obtain unauthorized access, and change system configurations, such as disabling the firewall. While an attacker cannot change the system password without knowing the old password, it is possible to reset the password to the default via a firmware upgrade and gain full system access. \n\n----------------------------------------------------------------------\n\nSecunia is proud to announce the availability of the Secunia Software\nInspector. \n\nThe Secunia Software Inspector is a free service that detects insecure\nversions of software that you may have installed in your system. When\ninsecure versions are detected, the Secunia Software Inspector also\nprovides thorough guidelines for updating the software to the latest\nsecure version from the vendor. \n\nTry it out online:\nhttp://secunia.com/software_inspector/\n\n----------------------------------------------------------------------\n\nTITLE:\nT-Com Speedport Authentication Bypass\n\nSECUNIA ADVISORY ID:\nSA23853\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/23853/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSecurity Bypass\n\nWHERE:\n\u003eFrom local network\n\nOPERATING SYSTEM:\nT-Com Speedport 500V 1.x\nhttp://secunia.com/product/13294/\n\nDESCRIPTION:\nVirginity has reported a vulnerability in T-Com Speedport, which can\nbe exploited by malicious people to bypass certain security\nrestrictions. \n\nSOLUTION:\nUse the device only in trusted networks. via a\nfirewall). \n\nPROVIDED AND/OR DISCOVERED BY:\nVirginity\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-0435"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004983"
},
{
"db": "BID",
"id": "22160"
},
{
"db": "VULHUB",
"id": "VHN-23797"
},
{
"db": "PACKETSTORM",
"id": "53816"
}
],
"trust": 2.07
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2007-0435",
"trust": 2.8
},
{
"db": "BID",
"id": "22160",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "23853",
"trust": 1.8
},
{
"db": "OSVDB",
"id": "32995",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004983",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200701-374",
"trust": 0.7
},
{
"db": "BUGTRAQ",
"id": "20070119 VIRGINITY SECURITY ADVISORY 2007-001 : T-COM SPEEDPORT 500V LOGIN BYPASS",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20070122 RE: VIRGINITY SECURITY ADVISORY 2007-001 : T-COM SPEEDPORT 500V LOGIN BYPASS",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20070216 RE: VIRGINITY SECURITY ADVISORY 2007-001 : T-COM SPEEDPORT 500V LOGIN BYPASS",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20070121 RE: VIRGINITY SECURITY ADVISORY 2007-001 : T-COM SPEEDPORT 500V LOGIN BYPASS",
"trust": 0.6
},
{
"db": "XF",
"id": "31621",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-23797",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "53816",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-23797"
},
{
"db": "BID",
"id": "22160"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004983"
},
{
"db": "PACKETSTORM",
"id": "53816"
},
{
"db": "NVD",
"id": "CVE-2007-0435"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-374"
}
]
},
"id": "VAR-200701-0215",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-23797"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:53:18.523000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-23797"
},
{
"db": "NVD",
"id": "CVE-2007-0435"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/22160"
},
{
"trust": 1.7,
"url": "http://osvdb.org/32995"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/23853"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/457453/100/0/threaded"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/457645/100/0/threaded"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/457656/100/0/threaded"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/460319/100/0/threaded"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31621"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0435"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0435"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/457453/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/31621"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/460319/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/457656/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/457645/100/0/threaded"
},
{
"trust": 0.3,
"url": "http://www2.dsl.t-online.de/dyn/c/55/30/93/5530934.html"
},
{
"trust": 0.3,
"url": "http://www.securityfocus.com/archive/1/457453/30/0/threaded"
},
{
"trust": 0.3,
"url": "/archive/1/460319"
},
{
"trust": 0.3,
"url": "/archive/1/457645"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/23853/"
},
{
"trust": 0.1,
"url": "http://secunia.com/software_inspector/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/13294/"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-23797"
},
{
"db": "BID",
"id": "22160"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004983"
},
{
"db": "PACKETSTORM",
"id": "53816"
},
{
"db": "NVD",
"id": "CVE-2007-0435"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-374"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-23797"
},
{
"db": "BID",
"id": "22160"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004983"
},
{
"db": "PACKETSTORM",
"id": "53816"
},
{
"db": "NVD",
"id": "CVE-2007-0435"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-374"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-01-23T00:00:00",
"db": "VULHUB",
"id": "VHN-23797"
},
{
"date": "2007-01-22T00:00:00",
"db": "BID",
"id": "22160"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-004983"
},
{
"date": "2007-01-22T15:23:39",
"db": "PACKETSTORM",
"id": "53816"
},
{
"date": "2007-01-23T02:28:00",
"db": "NVD",
"id": "CVE-2007-0435"
},
{
"date": "2007-01-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200701-374"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-16T00:00:00",
"db": "VULHUB",
"id": "VHN-23797"
},
{
"date": "2015-05-12T19:35:00",
"db": "BID",
"id": "22160"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-004983"
},
{
"date": "2018-10-16T16:32:35.247000",
"db": "NVD",
"id": "CVE-2007-0435"
},
{
"date": "2007-01-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200701-374"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200701-374"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "T-Com Speedport 500V Vulnerability bypassing authentication in routers",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-004983"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200701-374"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.