var-201209-0571
Vulnerability from variot

IBM Remote Supervisor Adapter II firmware for System x3650, x3850 M2, and x3950 M2 1.13 and earlier generates weak RSA keys, which makes it easier for attackers to defeat cryptographic protection mechanisms via unspecified vectors. IBM Remote Supervisor Adapter II is prone to a security-bypass vulnerability. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. Attackers can exploit this vulnerability to break through the encryption protection mechanism through unknown vectors

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201209-0571",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "remote supervisor adapter ii",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "ibm",
        "version": "1.13"
      },
      {
        "model": "remote supervisor adapter ii",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ibm",
        "version": "1.1"
      },
      {
        "model": "remote supervisor adapter ii",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ibm",
        "version": "1.8"
      },
      {
        "model": "remote supervisor adapter ii",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ibm",
        "version": "1.10"
      },
      {
        "model": "remote supervisor adapter ii",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ibm",
        "version": "1.12"
      },
      {
        "model": "remote supervisor adapter ii",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ibm",
        "version": "1.9"
      },
      {
        "model": "remote supervisor adapter ii",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ibm",
        "version": "1.11"
      },
      {
        "model": "remote supervisor adapter ii",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ibm",
        "version": "1.6"
      },
      {
        "model": "remote supervisor adapter ii",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ibm",
        "version": "1.7"
      },
      {
        "model": "remote supervisor adapter ii",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ibm",
        "version": "1.0"
      },
      {
        "model": "remote supervisor adapter ii",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "1.2"
      },
      {
        "model": "remote supervisor adapter ii",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "1.5"
      },
      {
        "model": "remote supervisor adapter ii",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "1.4"
      },
      {
        "model": "remote supervisor adapter ii",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "1.3"
      },
      {
        "model": "system x3650",
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "system x3850",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "m2"
      },
      {
        "model": "system x3950",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "m2"
      },
      {
        "model": "remote supervisor adapter ii",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ibm",
        "version": "1.13"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004588"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-539"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2187"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:ibm:x3650",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:ibm:x3850",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:ibm:x3950",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:ibm:remote_supervisor_adapter_ii_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004588"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "University of Michigan and UC San Diego",
    "sources": [
      {
        "db": "BID",
        "id": "55609"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-2187",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2012-2187",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-55468",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-2187",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-2187",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201209-539",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-55468",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-55468"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004588"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-539"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2187"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "IBM Remote Supervisor Adapter II firmware for System x3650, x3850 M2, and x3950 M2 1.13 and earlier generates weak RSA keys, which makes it easier for attackers to defeat cryptographic protection mechanisms via unspecified vectors. IBM Remote Supervisor Adapter II is prone to a security-bypass vulnerability. \nSuccessfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. Attackers can exploit this vulnerability to break through the encryption protection mechanism through unknown vectors",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2187"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004588"
      },
      {
        "db": "BID",
        "id": "55609"
      },
      {
        "db": "VULHUB",
        "id": "VHN-55468"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-2187",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "55609",
        "trust": 1.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004588",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-539",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-55468",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-55468"
      },
      {
        "db": "BID",
        "id": "55609"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004588"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-539"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2187"
      }
    ]
  },
  "id": "VAR-201209-0571",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-55468"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T23:10:01.391000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Weak Key Vulnerability in Remote Supervisor Adapter II firmware (CVE-2012-2187)",
        "trust": 0.8,
        "url": "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_weak_key_vulnerability_in_remote_supervisor_adapter_ii_firmware_cve_2012_2187_ibm_system_x3650_system_x3850_m2_system_x3950_m25"
      },
      {
        "title": "ibm_fw_rsa2_a3ep47a_linux_i386",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=44994"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004588"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-539"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-55468"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004588"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2187"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.ibm.com/connections/blogs/psirt/entry/security_bulletin_weak_key_vulnerability_in_remote_supervisor_adapter_ii_firmware_cve_2012_2187_ibm_system_x3650_system_x3850_m2_system_x3950_m25"
      },
      {
        "trust": 1.7,
        "url": "https://www-947.ibm.com/support/entry/myportal/docdisplay?lndocid=migr-5091525"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/55609"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2187"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2187"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-55468"
      },
      {
        "db": "BID",
        "id": "55609"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004588"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-539"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2187"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-55468"
      },
      {
        "db": "BID",
        "id": "55609"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004588"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-539"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2187"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-09-25T00:00:00",
        "db": "VULHUB",
        "id": "VHN-55468"
      },
      {
        "date": "2012-09-17T00:00:00",
        "db": "BID",
        "id": "55609"
      },
      {
        "date": "2012-09-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-004588"
      },
      {
        "date": "2012-09-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201209-539"
      },
      {
        "date": "2012-09-25T20:55:00.877000",
        "db": "NVD",
        "id": "CVE-2012-2187"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-02-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-55468"
      },
      {
        "date": "2012-10-19T15:30:00",
        "db": "BID",
        "id": "55609"
      },
      {
        "date": "2012-09-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-004588"
      },
      {
        "date": "2012-09-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201209-539"
      },
      {
        "date": "2024-11-21T01:38:40.363000",
        "db": "NVD",
        "id": "CVE-2012-2187"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-539"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  IBM For product  IBM Remote Supervisor Adapter  II Vulnerability that breaks cryptographic protection mechanisms in firmware",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004588"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-539"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…