var-201511-0046
Vulnerability from variot
Advantech EKI-122x-BE devices with firmware before 1.65, EKI-132x devices with firmware before 1.98, and EKI-136x devices with firmware before 1.27 have hardcoded SSH keys, which makes it easier for remote attackers to obtain access via an SSH session. Supplementary information : CWE Vulnerability type by CWE-798: Use of Hard-coded Credentials ( Using hard-coded credentials ) Has been identified. http://cwe.mitre.org/data/definitions/798.htmlBy a third party SSH Access may be gained through a session. Advantech EKI-122x-BE, EKI-132x and EKI-136x are all serial device networking servers of Advantech, Inc., which provide various redundant configurations and multiple channels for remote monitoring of serial devices via Ethernet communication protocol. Access configuration. Security vulnerabilities exist in several Advantech products. Multiple Advantech EKI products are prone to a security-bypass vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201511-0046", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "eki-1322 series", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "1.96" }, { "model": "eki-122x series", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "1.49" }, { "model": "eki-1321 series", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "1.96" }, { "model": "eki-1361 series", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "1.17" }, { "model": "eki-1362 series", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "1.17" }, { "model": "eki-1221", "scope": null, "trust": 0.8, "vendor": "advantech", "version": null }, { "model": "eki-1221d", "scope": null, "trust": 0.8, "vendor": "advantech", "version": null }, { "model": "eki-1222", "scope": null, "trust": 0.8, "vendor": "advantech", "version": null }, { "model": "eki-1222d", "scope": null, "trust": 0.8, "vendor": "advantech", "version": null }, { "model": "eki-1224", "scope": null, "trust": 0.8, "vendor": "advantech", "version": null }, { "model": "eki-122x series", "scope": "lt", "trust": 0.8, "vendor": "advantech", "version": "1.65" }, { "model": "eki-1321", "scope": null, "trust": 0.8, "vendor": "advantech", "version": null }, { "model": "eki-1321 series", "scope": "lt", "trust": 0.8, "vendor": "advantech", "version": "1.98" }, { "model": "eki-1322", "scope": null, "trust": 0.8, "vendor": "advantech", "version": null }, { "model": "eki-1322 series", "scope": "lt", "trust": 0.8, "vendor": "advantech", "version": "1.98" }, { "model": "eki-1361", "scope": null, "trust": 0.8, "vendor": "advantech", "version": null }, { "model": "eki-1361 series", "scope": "lt", "trust": 0.8, "vendor": "advantech", "version": "1.27" }, { "model": "eki-1362", "scope": null, "trust": 0.8, "vendor": "advantech", "version": null }, { "model": "eki-1362 series", "scope": "lt", "trust": 0.8, "vendor": "advantech", "version": "1.27" }, { "model": "eki-122x-be", "scope": "lt", "trust": 0.6, "vendor": "advantech", "version": "1.65" }, { "model": "eki-132x", "scope": "lt", "trust": 0.6, "vendor": "advantech", "version": "1.98" }, { "model": "eki-136x", "scope": "lt", "trust": 0.6, "vendor": "advantech", "version": "1.27" }, { "model": "eki-1361 series", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "1.17" }, { "model": "eki-122x series", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "1.49" }, { "model": "eki-1321 series", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "1.96" }, { "model": "eki-1362 series", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "1.17" }, { "model": "eki-1322 series", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "1.96" }, { "model": "eki-1360", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "0" }, { "model": "eki-1320", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "0" }, { "model": "eki-1220-be", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "0" }, { "model": "eki-1360", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "1.27" }, { "model": "eki-1320", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "1.98" }, { "model": "eki-1220-be", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "1.65" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eki 1321 series", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eki 1322 series", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eki 1361 series", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eki 1362 series", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eki 122x series", "version": "*" } ], "sources": [ { "db": "IVD", "id": "7c6174c4-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-07475" }, { "db": "BID", "id": "77498" }, { "db": "JVNDB", "id": "JVNDB-2015-005812" }, { "db": "CNNVD", "id": "CNNVD-201511-113" }, { "db": "NVD", "id": "CVE-2015-6476" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:advantech:eki-1221", "vulnerable": true }, { "cpe22Uri": "cpe:/h:advantech:eki-1221d", "vulnerable": true }, { "cpe22Uri": "cpe:/h:advantech:eki-1222", "vulnerable": true }, { "cpe22Uri": "cpe:/h:advantech:eki-1222d", "vulnerable": true }, { "cpe22Uri": "cpe:/h:advantech:eki-1224", "vulnerable": true }, { "cpe22Uri": "cpe:/o:advantech:eki-122x_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:advantech:eki-1321", "vulnerable": true }, { "cpe22Uri": "cpe:/o:advantech:eki-1321_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:advantech:eki-1322", "vulnerable": true }, { "cpe22Uri": "cpe:/o:advantech:eki-1322_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:advantech:eki-1361", "vulnerable": true }, { "cpe22Uri": "cpe:/o:advantech:eki-1361_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:advantech:eki-1362", "vulnerable": true }, { "cpe22Uri": "cpe:/o:advantech:eki-1362_series_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005812" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Neil Smith", "sources": [ { "db": "BID", "id": "77498" } ], "trust": 0.3 }, "cve": "CVE-2015-6476", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2015-6476", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2015-07475", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "7c6174c4-2351-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-84437", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-6476", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2015-6476", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2015-07475", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201511-113", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "7c6174c4-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-84437", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "7c6174c4-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-07475" }, { "db": "VULHUB", "id": "VHN-84437" }, { "db": "JVNDB", "id": "JVNDB-2015-005812" }, { "db": "CNNVD", "id": "CNNVD-201511-113" }, { "db": "NVD", "id": "CVE-2015-6476" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech EKI-122x-BE devices with firmware before 1.65, EKI-132x devices with firmware before 1.98, and EKI-136x devices with firmware before 1.27 have hardcoded SSH keys, which makes it easier for remote attackers to obtain access via an SSH session. Supplementary information : CWE Vulnerability type by CWE-798: Use of Hard-coded Credentials ( Using hard-coded credentials ) Has been identified. http://cwe.mitre.org/data/definitions/798.htmlBy a third party SSH Access may be gained through a session. Advantech EKI-122x-BE, EKI-132x and EKI-136x are all serial device networking servers of Advantech, Inc., which provide various redundant configurations and multiple channels for remote monitoring of serial devices via Ethernet communication protocol. Access configuration. Security vulnerabilities exist in several Advantech products. Multiple Advantech EKI products are prone to a security-bypass vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2015-6476" }, { "db": "JVNDB", "id": "JVNDB-2015-005812" }, { "db": "CNVD", "id": "CNVD-2015-07475" }, { "db": "BID", "id": "77498" }, { "db": "IVD", "id": "7c6174c4-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-84437" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-6476", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-15-309-01", "trust": 3.4 }, { "db": "CNNVD", "id": "CNNVD-201511-113", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2015-07475", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-005812", "trust": 0.8 }, { "db": "BID", "id": "77498", "trust": 0.4 }, { "db": "IVD", "id": "7C6174C4-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-89764", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-84437", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7c6174c4-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-07475" }, { "db": "VULHUB", "id": "VHN-84437" }, { "db": "BID", "id": "77498" }, { "db": "JVNDB", "id": "JVNDB-2015-005812" }, { "db": "CNNVD", "id": "CNNVD-201511-113" }, { "db": "NVD", "id": "CVE-2015-6476" } ] }, "id": "VAR-201511-0046", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7c6174c4-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-07475" }, { "db": "VULHUB", "id": "VHN-84437" } ], "trust": 1.9 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "7c6174c4-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-07475" } ] }, "last_update_date": "2024-11-23T22:56:23.681000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EKI-136*", "trust": 0.8, "url": "http://support.advantech.com.tw/Support/SearchResult.aspx?keyword=EKI-136*\u0026searchtabs=Firmware" }, { "title": "EKI-132*", "trust": 0.8, "url": "http://support.advantech.com.tw/Support/SearchResult.aspx?keyword=EKI-132*\u0026searchtabs=Firmware" }, { "title": "EKI-122*", "trust": 0.8, "url": "http://support.advantech.com.tw/Support/SearchResult.aspx?keyword=EKI-122*\u0026searchtabs=Firmware" }, { "title": "Patches for several Advantech product SSH key vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/66571" }, { "title": "Multiple Advantech Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58608" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07475" }, { "db": "JVNDB", "id": "JVNDB-2015-005812" }, { "db": "CNNVD", "id": "CNNVD-201511-113" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005812" }, { "db": "NVD", "id": "CVE-2015-6476" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-309-01" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6476" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6476" }, { "trust": 0.3, "url": "http://www.advantech.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07475" }, { "db": "VULHUB", "id": "VHN-84437" }, { "db": "BID", "id": "77498" }, { "db": "JVNDB", "id": "JVNDB-2015-005812" }, { "db": "CNNVD", "id": "CNNVD-201511-113" }, { "db": "NVD", "id": "CVE-2015-6476" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7c6174c4-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-07475" }, { "db": "VULHUB", "id": "VHN-84437" }, { "db": "BID", "id": "77498" }, { "db": "JVNDB", "id": "JVNDB-2015-005812" }, { "db": "CNNVD", "id": "CNNVD-201511-113" }, { "db": "NVD", "id": "CVE-2015-6476" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-12T00:00:00", "db": "IVD", "id": "7c6174c4-2351-11e6-abef-000c29c66e3d" }, { "date": "2015-11-12T00:00:00", "db": "CNVD", "id": "CNVD-2015-07475" }, { "date": "2015-11-07T00:00:00", "db": "VULHUB", "id": "VHN-84437" }, { "date": "2015-11-05T00:00:00", "db": "BID", "id": "77498" }, { "date": "2015-11-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005812" }, { "date": "2015-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-113" }, { "date": "2015-11-07T03:59:00.127000", "db": "NVD", "id": "CVE-2015-6476" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-12T00:00:00", "db": "CNVD", "id": "CNVD-2015-07475" }, { "date": "2015-11-09T00:00:00", "db": "VULHUB", "id": "VHN-84437" }, { "date": "2015-11-05T00:00:00", "db": "BID", "id": "77498" }, { "date": "2015-11-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005812" }, { "date": "2015-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-113" }, { "date": "2024-11-21T02:35:02.690000", "db": "NVD", "id": "CVE-2015-6476" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-113" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Advantech EKI Vulnerability to gain access rights in device firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005812" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "77498" } ], "trust": 0.3 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.