var-201501-0439
Vulnerability from variot

GE Multilink ML800, ML1200, ML1600, and ML2400 switches with firmware 4.2.1 and earlier and Multilink ML810, ML3000, and ML3100 switches with firmware 5.2.0 and earlier use the same RSA private key across different customers' installations, which makes it easier for remote attackers to obtain the cleartext content of network traffic by reading this key from a firmware image and then sniffing the network. The General Electric Company is the world's largest manufacturer of electrical equipment, electrical and electronic equipment. Multiple General Electric (GE) products have security vulnerabilities that allow an attacker to exploit this vulnerability to obtain sensitive information, perform unauthorized operations, or initiate a denial of service attack. This may lead to further attacks

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201501-0439",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "multilink ml2400",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "ge",
        "version": null
      },
      {
        "model": "multilink ml800",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "ge",
        "version": null
      },
      {
        "model": "multilink ml1600",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "ge",
        "version": null
      },
      {
        "model": "multilink ml1200",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "ge",
        "version": null
      },
      {
        "model": "multilink ml810",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "ge",
        "version": null
      },
      {
        "model": "multilink ml2400",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ge",
        "version": "4.2.1"
      },
      {
        "model": "multilink ml3000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ge",
        "version": "5.2.0"
      },
      {
        "model": "multilink ml3100",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ge",
        "version": "5.2.0"
      },
      {
        "model": "multilink ml810",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ge",
        "version": "5.2.0"
      },
      {
        "model": "multilink ml3000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "ge",
        "version": "*"
      },
      {
        "model": "multilink ml3100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "ge",
        "version": "*"
      },
      {
        "model": "multilink ml1200",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ge",
        "version": "4.2.1"
      },
      {
        "model": "multilink ml1600",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ge",
        "version": "4.2.1"
      },
      {
        "model": "multilink ml800",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ge",
        "version": "4.2.1"
      },
      {
        "model": "multilink ml1200",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ge",
        "version": "4.2.1"
      },
      {
        "model": "multilink ml3100",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ge",
        "version": "5.2.0"
      },
      {
        "model": "multilink ml2400",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ge",
        "version": "4.2.1"
      },
      {
        "model": "multilink ml3000",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ge",
        "version": "5.2.0"
      },
      {
        "model": "multilink ml810",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ge",
        "version": "5.2.0"
      },
      {
        "model": "multilink ml800",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ge",
        "version": "4.2.1"
      },
      {
        "model": "multilink ml1600",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ge",
        "version": "4.2.1"
      },
      {
        "model": "multilink ml1200",
        "scope": null,
        "trust": 0.8,
        "vendor": "general electric",
        "version": null
      },
      {
        "model": "multilink ml1200",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "general electric",
        "version": "4.2.1"
      },
      {
        "model": "multilink ml1600",
        "scope": null,
        "trust": 0.8,
        "vendor": "general electric",
        "version": null
      },
      {
        "model": "multilink ml1600",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "general electric",
        "version": "4.2.1"
      },
      {
        "model": "multilink ml2400",
        "scope": null,
        "trust": 0.8,
        "vendor": "general electric",
        "version": null
      },
      {
        "model": "multilink ml2400",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "general electric",
        "version": "4.2.1"
      },
      {
        "model": "multilink ml3000",
        "scope": null,
        "trust": 0.8,
        "vendor": "general electric",
        "version": null
      },
      {
        "model": "multilink ml3000",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "general electric",
        "version": "5.2.0"
      },
      {
        "model": "multilink ml3100",
        "scope": null,
        "trust": 0.8,
        "vendor": "general electric",
        "version": null
      },
      {
        "model": "multilink ml3100",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "general electric",
        "version": "5.2.0"
      },
      {
        "model": "multilink ml800",
        "scope": null,
        "trust": 0.8,
        "vendor": "general electric",
        "version": null
      },
      {
        "model": "multilink ml800",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "general electric",
        "version": "4.2.1"
      },
      {
        "model": "multilink ml810",
        "scope": null,
        "trust": 0.8,
        "vendor": "general electric",
        "version": null
      },
      {
        "model": "multilink ml810",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "general electric",
        "version": "5.2.0"
      },
      {
        "model": "electric ge multilink ml800",
        "scope": null,
        "trust": 0.6,
        "vendor": "general",
        "version": null
      },
      {
        "model": "electric ge multilink ml1200",
        "scope": null,
        "trust": 0.6,
        "vendor": "general",
        "version": null
      },
      {
        "model": "electric ge multilink ml1600",
        "scope": null,
        "trust": 0.6,
        "vendor": "general",
        "version": null
      },
      {
        "model": "electric ge multilink ml2400 switches with",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "general",
        "version": "4.2.1"
      },
      {
        "model": "electric ge multilink ml810",
        "scope": null,
        "trust": 0.6,
        "vendor": "general",
        "version": null
      },
      {
        "model": "electric ge multilink ml3000",
        "scope": null,
        "trust": 0.6,
        "vendor": "general",
        "version": null
      },
      {
        "model": "electric ge multilink ml3100 switches with",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "general",
        "version": "5.2.0"
      },
      {
        "model": "electric multilink ml810",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "general",
        "version": "5.1"
      },
      {
        "model": "electric multilink ml800",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "general",
        "version": "4.2"
      },
      {
        "model": "electric multilink ml3100",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "general",
        "version": "5.1"
      },
      {
        "model": "electric multilink ml3000",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "general",
        "version": "5.1"
      },
      {
        "model": "electric multilink ml2400",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "general",
        "version": "4.2"
      },
      {
        "model": "electric multilink ml1600",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "general",
        "version": "4.2"
      },
      {
        "model": "electric multilink ml1200",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "general",
        "version": "4.2"
      },
      {
        "model": "electric multilink ml810",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "general",
        "version": "5.2"
      },
      {
        "model": "electric multilink ml800",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "general",
        "version": "4.2.1"
      },
      {
        "model": "electric multilink ml3100",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "general",
        "version": "5.2"
      },
      {
        "model": "electric multilink ml3000",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "general",
        "version": "5.2"
      },
      {
        "model": "electric multilink ml2400",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "general",
        "version": "4.2.1"
      },
      {
        "model": "electric multilink ml1600",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "general",
        "version": "4.2.1"
      },
      {
        "model": "electric multilink ml1200",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "general",
        "version": "4.2.1"
      },
      {
        "model": "multilink ml3000",
        "scope": null,
        "trust": 0.2,
        "vendor": "ge",
        "version": null
      },
      {
        "model": "multilink ml3100",
        "scope": null,
        "trust": 0.2,
        "vendor": "ge",
        "version": null
      },
      {
        "model": "multilink ml800/ml1200//ml1600/ml2400",
        "scope": "lte",
        "trust": 0.2,
        "vendor": "ge",
        "version": "\u003c=4.2.1"
      },
      {
        "model": "multilink ml810/ml3000//ml3100",
        "scope": "lte",
        "trust": 0.2,
        "vendor": "ge",
        "version": "\u003c=5.2.0"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a90487d2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00451"
      },
      {
        "db": "BID",
        "id": "72069"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007735"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-348"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-5419"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:ge:multilink_ml1200",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ge:multilink_ml1200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:ge:multilink_ml1600",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ge:multilink_ml1600_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:ge:multilink_ml2400",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ge:multilink_ml2400_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:ge:multilink_ml3000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ge:multilink_ml3000_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:ge:multilink_ml3100",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ge:multilink_ml3100_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:ge:multilink_ml800",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ge:multilink_ml800_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:ge:multilink_ml810",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ge:multilink_ml810_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007735"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Eireann Leverett of IOActive",
    "sources": [
      {
        "db": "BID",
        "id": "72069"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-348"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2014-5419",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2014-5419",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2015-00451",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "a90487d2-2351-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-73360",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2014-5419",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2014-5419",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-00451",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201501-348",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "a90487d2-2351-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-73360",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a90487d2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00451"
      },
      {
        "db": "VULHUB",
        "id": "VHN-73360"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007735"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-348"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-5419"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "GE Multilink ML800, ML1200, ML1600, and ML2400 switches with firmware 4.2.1 and earlier and Multilink ML810, ML3000, and ML3100 switches with firmware 5.2.0 and earlier use the same RSA private key across different customers\u0027 installations, which makes it easier for remote attackers to obtain the cleartext content of network traffic by reading this key from a firmware image and then sniffing the network. The General Electric Company is the world\u0027s largest manufacturer of electrical equipment, electrical and electronic equipment. Multiple General Electric (GE) products have security vulnerabilities that allow an attacker to exploit this vulnerability to obtain sensitive information, perform unauthorized operations, or initiate a denial of service attack. This may lead to further attacks",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-5419"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007735"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00451"
      },
      {
        "db": "BID",
        "id": "72069"
      },
      {
        "db": "IVD",
        "id": "a90487d2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-73360"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-5419",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-15-013-04",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "72069",
        "trust": 1.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-348",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00451",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007735",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "A90487D2-2351-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-73360",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a90487d2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00451"
      },
      {
        "db": "VULHUB",
        "id": "VHN-73360"
      },
      {
        "db": "BID",
        "id": "72069"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007735"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-348"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-5419"
      }
    ]
  },
  "id": "VAR-201501-0439",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "a90487d2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00451"
      },
      {
        "db": "VULHUB",
        "id": "VHN-73360"
      }
    ],
    "trust": 1.5322115600000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a90487d2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00451"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:44:39.096000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "RSA Private Key \u0026 DoS Vulnerabilty",
        "trust": 0.8,
        "url": "http://www.gedigitalenergy.com/products/support/multilink/MLSB1214.pdf"
      },
      {
        "title": "Patches with built-in key security bypass vulnerabilities for multiple General Electric (GE) products",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/54111"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-00451"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007735"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-73360"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007735"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-5419"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-013-04"
      },
      {
        "trust": 1.7,
        "url": "http://www.gedigitalenergy.com/products/support/multilink/mlsb1214.pdf"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/bid/72069"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5419"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-5419"
      },
      {
        "trust": 0.3,
        "url": "http://www.ge.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-00451"
      },
      {
        "db": "VULHUB",
        "id": "VHN-73360"
      },
      {
        "db": "BID",
        "id": "72069"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007735"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-348"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-5419"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "a90487d2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00451"
      },
      {
        "db": "VULHUB",
        "id": "VHN-73360"
      },
      {
        "db": "BID",
        "id": "72069"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007735"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-348"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-5419"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-01-21T00:00:00",
        "db": "IVD",
        "id": "a90487d2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2015-01-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-00451"
      },
      {
        "date": "2015-01-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-73360"
      },
      {
        "date": "2015-01-13T00:00:00",
        "db": "BID",
        "id": "72069"
      },
      {
        "date": "2015-01-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-007735"
      },
      {
        "date": "2015-01-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201501-348"
      },
      {
        "date": "2015-01-17T02:59:02.600000",
        "db": "NVD",
        "id": "CVE-2014-5419"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-01-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-00451"
      },
      {
        "date": "2015-01-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-73360"
      },
      {
        "date": "2015-01-13T00:00:00",
        "db": "BID",
        "id": "72069"
      },
      {
        "date": "2015-01-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-007735"
      },
      {
        "date": "2015-01-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201501-348"
      },
      {
        "date": "2024-11-21T02:12:00.780000",
        "db": "NVD",
        "id": "CVE-2014-5419"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-348"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  GE MultiLink ML Series Switch Firmware Vulnerability to Retrieve Plain Text Content of Network Traffic",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007735"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-348"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…