var-201401-0052
Vulnerability from variot

The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to install Trojan horse firmware by leveraging cleartext credentials in a crafted (1) update or (2) reprogramming action. AirLink Raven X EV-DO is a small 3G network smart modem. AirLink Raven X EV-DO has an information disclosure vulnerability. Because the program fails to use encryption during the update and reprogramming process, the attacker can reprogram the firmware using the username and password stored in clear text. AirLink Raven X EV-DO is prone to an information-disclosure vulnerability Successful exploits will allow attackers to obtain sensitive information, such as user credentials, that may lead to further attacks

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201401-0052",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "raven x ev-do",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sierrawireless",
        "version": "4221_4.0.11.003"
      },
      {
        "model": "raven x ev-do",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sierrawireless",
        "version": "4228_4.0.11.003"
      },
      {
        "model": "airlink mp verizon",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "airlink mp verizon wifi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "raven xe",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "raven x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "airlink mp at\\\u0026t wifi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "airlink mp sprint wifi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "airlink mp telus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "pinpoint xt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "pinpoint x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "airlink mp telus wifi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "airlink mp row wifi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "airlink mp at\\\u0026t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "airlink mp sprint",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "raven xt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "airlink mp bell",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "airlink mp bell wifi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "airlink mp row",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "raven x ev-do",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sierrawireless",
        "version": null
      },
      {
        "model": "airlink mp at\u0026t",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "airlink mp at\u0026t wifi",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "airlink mp bell",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "airlink mp bell wifi",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "airlink mp row",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "airlink mp row wifi",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "airlink mp sprint",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "airlink mp sprint wifi",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "airlink mp telus",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "airlink mp telus wifi",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "airlink mp verizon",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "airlink mp verizon wifi",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "pinpooint x",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "pinpooint xt",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "raven x",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "raven x ev-do",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "raven x ev-do",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sierra",
        "version": "4221_4.0.11.003"
      },
      {
        "model": "raven x ev-do",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sierra",
        "version": "4228_4.0.11.003"
      },
      {
        "model": "raven xe",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "raven xt",
        "scope": null,
        "trust": 0.8,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "wireless airlink raven ev-do 4221 4.0.11.003",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sierra",
        "version": "x"
      },
      {
        "model": "wireless airlink raven ev-do 4228 4.0.11.003",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sierra",
        "version": "x"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00190"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001184"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-179"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2819"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:airlink_mp_at%26t",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:airlink_mp_at%26t_wifi",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:airlink_mp_bell",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:airlink_mp_bell_wifi",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:airlink_mp_row",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:airlink_mp_row_wifi",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:airlink_mp_sprint",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:airlink_mp_sprint_wifi",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:airlink_mp_telus",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:airlink_mp_telus_wifi",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:airlink_mp_verizon",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:airlink_mp_verizon_wifi",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:pinpoint_x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:pinpoint_xt",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:raven_x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:raven_x_ev-do",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sierra_wireless:raven_x_ev-do_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:raven_xe",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sierra_wireless:raven_xt",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001184"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cimation",
    "sources": [
      {
        "db": "BID",
        "id": "64702"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-179"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2013-2819",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2013-2819",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2014-00190",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "VHN-62821",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-2819",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-2819",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-00190",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201401-179",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-62821",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00190"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62821"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001184"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-179"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2819"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to install Trojan horse firmware by leveraging cleartext credentials in a crafted (1) update or (2) reprogramming action. AirLink Raven X EV-DO is a small 3G network smart modem. AirLink Raven X EV-DO has an information disclosure vulnerability. Because the program fails to use encryption during the update and reprogramming process, the attacker can reprogram the firmware using the username and password stored in clear text. AirLink Raven X EV-DO is prone to an information-disclosure vulnerability\nSuccessful exploits will allow attackers to obtain sensitive information, such as user credentials, that may lead to further attacks",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-2819"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001184"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00190"
      },
      {
        "db": "BID",
        "id": "64702"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62821"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-2819",
        "trust": 3.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-007-01A",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "64702",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001184",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-179",
        "trust": 0.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-007-01",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00190",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-62821",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00190"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62821"
      },
      {
        "db": "BID",
        "id": "64702"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001184"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-179"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2819"
      }
    ]
  },
  "id": "VAR-201401-0052",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00190"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62821"
      }
    ],
    "trust": 1.7
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00190"
      }
    ]
  },
  "last_update_date": "2024-08-14T14:21:14.507000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "AirLink RavenSecurity Vulnerability",
        "trust": 0.8,
        "url": "http://www.sierrawireless.com/resources/support/airlink/docs/raven%20security%20vulnerability%202014-01-10.pdf"
      },
      {
        "title": "AirLink Raven X EV-DO Information Disclosure Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/42227"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00190"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001184"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-62821"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001184"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2819"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-007-01a"
      },
      {
        "trust": 1.7,
        "url": "http://www.sierrawireless.com/resources/support/airlink/docs/raven%20security%20vulnerability%202014-01-10.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2819"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2819"
      },
      {
        "trust": 0.6,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-007-01"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/64702"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00190"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62821"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001184"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-179"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2819"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00190"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62821"
      },
      {
        "db": "BID",
        "id": "64702"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001184"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-179"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2819"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-01-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-00190"
      },
      {
        "date": "2014-01-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-62821"
      },
      {
        "date": "2014-01-07T00:00:00",
        "db": "BID",
        "id": "64702"
      },
      {
        "date": "2014-01-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001184"
      },
      {
        "date": "2014-01-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201401-179"
      },
      {
        "date": "2014-01-15T16:08:13.017000",
        "db": "NVD",
        "id": "CVE-2013-2819"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-01-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-00190"
      },
      {
        "date": "2014-01-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-62821"
      },
      {
        "date": "2014-07-25T00:47:00",
        "db": "BID",
        "id": "64702"
      },
      {
        "date": "2014-01-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001184"
      },
      {
        "date": "2014-01-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201401-179"
      },
      {
        "date": "2014-01-16T16:44:54.317000",
        "db": "NVD",
        "id": "CVE-2013-2819"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-179"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sierra Wireless AirLink Raven X EV-DO Gateway Trojan Firmware Installation Vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001184"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "trust management",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-179"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…