var-201412-0027
Vulnerability from variot

Emerson Process Management ROC800 RTU with software 3.50 and earlier, DL8000 RTU with software 2.30 and earlier, and ROC800L RTU with software 1.20 and earlier allows remote attackers to execute arbitrary commands via a TCP replay attack. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. http://cwe.mitre.org/data/definitions/77.htmlBy a third party TCP Reflex attack ( Replay attack ) An arbitrary command may be executed via. The ROC800 RTU product is used to perform multiple PLC-like functions on the control device. Emerson Process Management's ROC800, DL8000 and ROC800L have security bypass vulnerabilities. Allows an attacker to bypass authentication and perform unauthorized operations. The following versions are affected: ROC800 3.50 and prior DL8000 2.30 and prior ROC800L 1.20 and prior. Emerson Process Management ROC800 RTU, DL8000 RTU and ROC800L RTU are all remote terminal unit (RTU) products of Emerson Electric (Emerson Electric) in the United States. Function

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201412-0027",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "dl 8000 remote terminal unit",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "emerson",
        "version": "2.30"
      },
      {
        "model": "roc 800l remote terminal unit",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "1.20"
      },
      {
        "model": "roc 800l remote terminal unit",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "emerson",
        "version": null
      },
      {
        "model": "roc 800 remote terminal unit",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emerson",
        "version": "3.50"
      },
      {
        "model": "roc 800 remote terminal unit",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "emerson",
        "version": null
      },
      {
        "model": "dl 8000 remote terminal unit",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "emerson",
        "version": null
      },
      {
        "model": "dl8000 rtu",
        "scope": null,
        "trust": 0.8,
        "vendor": "emerson",
        "version": null
      },
      {
        "model": "dl8000 rtu",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "emerson",
        "version": "2.30"
      },
      {
        "model": "roc800 rtu",
        "scope": null,
        "trust": 0.8,
        "vendor": "emerson",
        "version": null
      },
      {
        "model": "roc800 rtu",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "emerson",
        "version": "3.50"
      },
      {
        "model": "roc800l rtu",
        "scope": null,
        "trust": 0.8,
        "vendor": "emerson",
        "version": null
      },
      {
        "model": "roc800l rtu",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "emerson",
        "version": "1.20"
      },
      {
        "model": "electric co roc800l",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "emerson",
        "version": "1.20"
      },
      {
        "model": "electric co dl8000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "emerson",
        "version": "2.30"
      },
      {
        "model": "electric co roc800",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "emerson",
        "version": "3.50"
      },
      {
        "model": "roc 800l remote terminal unit",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "emerson",
        "version": "1.20"
      },
      {
        "model": "roc 800 remote terminal unit",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "emerson",
        "version": "3.50"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "roc 800 remote terminal unit",
        "version": "3.50"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "dl 8000 remote terminal unit",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "roc 800l remote terminal unit",
        "version": "1.20"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "dl 8000 remote terminal unit",
        "version": "2.30"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "roc 800l remote terminal unit",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "roc 800 remote terminal unit",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b2728756-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08734"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006701"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-101"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2810"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:emerson:dl_8000_remote_terminal_unit",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:emerson:dl_8000_remote_terminal_unit_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:emerson:roc_800_remote_terminal_unit",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:emerson:roc_800_remote_terminal_unit_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:emerson:roc_800l_remote_terminal_unit",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:emerson:roc_800l_remote_terminal_unit_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006701"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Dillon Beresford, Brian Meixell, Marc Ayala and Eric Forner of Cimation",
    "sources": [
      {
        "db": "BID",
        "id": "71425"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-101"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2013-2810",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2013-2810",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2014-08734",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "b2728756-2351-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-62812",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-2810",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-2810",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-08734",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201412-101",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "b2728756-2351-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-62812",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b2728756-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08734"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62812"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006701"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-101"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2810"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Emerson Process Management ROC800 RTU with software 3.50 and earlier, DL8000 RTU with software 2.30 and earlier, and ROC800L RTU with software 1.20 and earlier allows remote attackers to execute arbitrary commands via a TCP replay attack. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. http://cwe.mitre.org/data/definitions/77.htmlBy a third party TCP Reflex attack ( Replay attack ) An arbitrary command may be executed via. The ROC800 RTU product is used to perform multiple PLC-like functions on the control device. Emerson Process Management\u0027s ROC800, DL8000 and ROC800L have security bypass vulnerabilities. Allows an attacker to bypass authentication and perform unauthorized operations. \nThe following versions are affected:\nROC800 3.50 and prior\nDL8000 2.30 and prior\nROC800L 1.20 and prior. Emerson Process Management ROC800 RTU, DL8000 RTU and ROC800L RTU are all remote terminal unit (RTU) products of Emerson Electric (Emerson Electric) in the United States. Function",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-2810"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006701"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08734"
      },
      {
        "db": "BID",
        "id": "71425"
      },
      {
        "db": "IVD",
        "id": "b2728756-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62812"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-2810",
        "trust": 3.6
      },
      {
        "db": "BID",
        "id": "71425",
        "trust": 2.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-13-259-01A",
        "trust": 2.5
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-101",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08734",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006701",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "99131",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "28611",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "B2728756-2351-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-62812",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b2728756-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08734"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62812"
      },
      {
        "db": "BID",
        "id": "71425"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006701"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-101"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2810"
      }
    ]
  },
  "id": "VAR-201412-0027",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "b2728756-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08734"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62812"
      }
    ],
    "trust": 1.9
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b2728756-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08734"
      }
    ]
  },
  "last_update_date": "2024-08-14T13:57:43.530000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "\u65e5\u672c\u30a8\u30de\u30bd\u30f3\u682a\u5f0f\u4f1a\u793e",
        "trust": 0.8,
        "url": "http://www.emerson.co.jp/index.html"
      },
      {
        "title": "Multiple Emerson Process Management RTUs security bypass vulnerability patches",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/52477"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-08734"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006701"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-77",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-62812"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006701"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2810"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-13-259-01a"
      },
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/71425"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99131"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2810"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2810"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/99131"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/28611"
      },
      {
        "trust": 0.3,
        "url": "http://www2.emersonprocess.com/en-us/brands/deltav/pages/index.aspx"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-08734"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62812"
      },
      {
        "db": "BID",
        "id": "71425"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006701"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-101"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2810"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "b2728756-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08734"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62812"
      },
      {
        "db": "BID",
        "id": "71425"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006701"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-101"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2810"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-12-05T00:00:00",
        "db": "IVD",
        "id": "b2728756-2351-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2014-12-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-08734"
      },
      {
        "date": "2014-12-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-62812"
      },
      {
        "date": "2014-12-03T00:00:00",
        "db": "BID",
        "id": "71425"
      },
      {
        "date": "2014-12-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-006701"
      },
      {
        "date": "2014-12-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201412-101"
      },
      {
        "date": "2014-12-08T11:59:00.077000",
        "db": "NVD",
        "id": "CVE-2013-2810"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-12-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-08734"
      },
      {
        "date": "2017-08-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-62812"
      },
      {
        "date": "2014-12-24T00:55:00",
        "db": "BID",
        "id": "71425"
      },
      {
        "date": "2014-12-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-006701"
      },
      {
        "date": "2014-12-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201412-101"
      },
      {
        "date": "2017-08-29T01:33:17.277000",
        "db": "NVD",
        "id": "CVE-2013-2810"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201412-101"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Emerson Process Management RTU Vulnerability to execute arbitrary commands in product software",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006701"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "71425"
      }
    ],
    "trust": 0.3
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…