var-201601-0430
Vulnerability from variot

The setUpSubtleUserAccount function in /bin/bw on Harman AMX devices before 2015-10-12 has a hardcoded password for the BlackWidow account, which makes it easier for remote attackers to obtain access via a (1) SSH or (2) HTTP session, a different vulnerability than CVE-2016-1984. Multiple models of Harman AMX multimedia devices contain a hard-coded debug account. plural Harman AMX There is an issue with the product where the account for debugging is hard coded. Problems with hard-coded credentials (CWE-798) - CVE-2015-8362 According to the discoverer's blog post, AMX Multiple models in the series have hardcoded administrative rights accounts (" back door ") Exists. Check the vulnerability advisory for discoverers for more information. AMX The release notes for stated that this was a debugging account. CWE-798: Use of Hard-coded Credentials http://cwe.mitre.org/data/definitions/798.html Blog post http://blog.sec-consult.com/2016/01/deliberately-hidden-backdoor-account-in.html Vulnerability advisory https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160121-0_AMX_Deliberately_hidden_backdoor_account_v10.txt AMX Release notes http://www.amx.com/techcenter/firmware.asp?Category=Hot%20Fix%20FilesAn attacker who knows the authentication information may gain access to the device with administrator privileges. HarmanAMX is a series of conversion controller products from Harman Corporation of the United States. A security vulnerability exists in the \342\200\230setUpSubtleUserAccount\342\200\231 function in /bin/bwURI prior to HarmanAMX 2015-10-12, which was derived from a hard-coded password on a BlackWidow account. Multiple AMX Products are prone to a security-bypass vulnerability

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201601-0430",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "amx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "harman",
        "version": "1.3.100"
      },
      {
        "model": "amx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "harman",
        "version": "1.2.322"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "harman",
        "version": null
      },
      {
        "model": "amx",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "harman",
        "version": "nx-1200 firmware  v1.2.322"
      },
      {
        "model": "amx",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "harman",
        "version": "nx-1200 firmware  v1.3.100"
      },
      {
        "model": "amx",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "harman",
        "version": "2015-10-12"
      },
      {
        "model": "amx",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "harman",
        "version": "2016-01-20"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#992624"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00786"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001312"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-603"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8362"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:harman:amx_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001312"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Matthias Klinski, Manuel Hofer (Office Vienna) SEC Consult Vulnerability Lab",
    "sources": [
      {
        "db": "BID",
        "id": "81545"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-8362",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2015-8362",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "availabilityRequirement": "NOT DEFINED",
            "baseScore": 10.0,
            "collateralDamagePotential": "NOT DEFINED",
            "confidentialityImpact": "COMPLETE",
            "confidentialityRequirement": "NOT DEFINED",
            "enviromentalScore": 5.9,
            "exploitability": "PROOF-OF-CONCEPT",
            "exploitabilityScore": 10.0,
            "id": "CVE-2015-8362",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "integrityRequirement": "NOT DEFINED",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "remediationLevel": "OFFICIAL FIX",
            "reportConfidence": "CONFIRMED",
            "severity": "HIGH",
            "targetDistribution": "MEDIUM",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-00786",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-86323",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2015-8362",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-8362",
            "trust": 1.6,
            "value": "HIGH"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-8362",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-00786",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201601-603",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-86323",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#992624"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00786"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86323"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001312"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-603"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8362"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The setUpSubtleUserAccount function in /bin/bw on Harman AMX devices before 2015-10-12 has a hardcoded password for the BlackWidow account, which makes it easier for remote attackers to obtain access via a (1) SSH or (2) HTTP session, a different vulnerability than CVE-2016-1984. Multiple models of Harman AMX multimedia devices contain a hard-coded debug account. plural Harman AMX There is an issue with the product where the account for debugging is hard coded. Problems with hard-coded credentials (CWE-798) - CVE-2015-8362 According to the discoverer\u0027s blog post, AMX Multiple models in the series have hardcoded administrative rights accounts (\" back door \") Exists. Check the vulnerability advisory for discoverers for more information. AMX The release notes for stated that this was a debugging account. CWE-798: Use of Hard-coded Credentials http://cwe.mitre.org/data/definitions/798.html Blog post http://blog.sec-consult.com/2016/01/deliberately-hidden-backdoor-account-in.html Vulnerability advisory https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160121-0_AMX_Deliberately_hidden_backdoor_account_v10.txt AMX Release notes http://www.amx.com/techcenter/firmware.asp?Category=Hot%20Fix%20FilesAn attacker who knows the authentication information may gain access to the device with administrator privileges. HarmanAMX is a series of conversion controller products from Harman Corporation of the United States. A security vulnerability exists in the \\342\\200\\230setUpSubtleUserAccount\\342\\200\\231 function in /bin/bwURI prior to HarmanAMX 2015-10-12, which was derived from a hard-coded password on a BlackWidow account. Multiple AMX Products are prone to a security-bypass vulnerability",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-8362"
      },
      {
        "db": "CERT/CC",
        "id": "VU#992624"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001312"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00786"
      },
      {
        "db": "BID",
        "id": "81545"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86323"
      }
    ],
    "trust": 3.24
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.kb.cert.org/vuls/id/992624",
        "trust": 0.8,
        "type": "poc"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#992624"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#992624",
        "trust": 3.6
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8362",
        "trust": 3.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-049-02",
        "trust": 2.2
      },
      {
        "db": "BID",
        "id": "81545",
        "trust": 1.4
      },
      {
        "db": "JVN",
        "id": "JVNVU99819594",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001312",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-603",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00786",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-86323",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#992624"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00786"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86323"
      },
      {
        "db": "BID",
        "id": "81545"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001312"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-603"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8362"
      }
    ]
  },
  "id": "VAR-201601-0430",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-00786"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86323"
      }
    ],
    "trust": 1.3111111
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-00786"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:01:34.718000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "NetLinx Controller Security Brief",
        "trust": 0.8,
        "url": "http://www.amx.com/techcenter/NXSecurityBrief/"
      },
      {
        "title": "Firmware Files - Hot Fix Files",
        "trust": 0.8,
        "url": "http://www.amx.com/techcenter/firmware.asp?Category=Hot%20Fix%20Files"
      },
      {
        "title": "HarmanAMX has an unspecified vulnerability (CNVD-2016-00786) patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/71076"
      },
      {
        "title": "Harman AMX Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59921"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-00786"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001312"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-603"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-86323"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001312"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8362"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.6,
        "url": "http://blog.sec-consult.com/2016/01/deliberately-hidden-backdoor-account-in.html"
      },
      {
        "trust": 3.3,
        "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160121-0_amx_deliberately_hidden_backdoor_account_v10.txt"
      },
      {
        "trust": 3.1,
        "url": "http://www.amx.com/techcenter/nxsecuritybrief/"
      },
      {
        "trust": 2.8,
        "url": "http://seclists.org/fulldisclosure/2016/jan/63"
      },
      {
        "trust": 2.8,
        "url": "https://www.kb.cert.org/vuls/id/992624"
      },
      {
        "trust": 2.5,
        "url": "http://www.amx.com/techcenter/firmware.asp?category=hot%20fix%20files"
      },
      {
        "trust": 2.2,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-049-02"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/81545"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/537343/100/0/threaded"
      },
      {
        "trust": 0.8,
        "url": "http://www.amx.com/assets/whitepapers/amx.avit.administrators.guide.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8362"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu99819594/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8362"
      },
      {
        "trust": 0.3,
        "url": "http://www.amx.com/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#992624"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00786"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86323"
      },
      {
        "db": "BID",
        "id": "81545"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001312"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-603"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8362"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#992624"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00786"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86323"
      },
      {
        "db": "BID",
        "id": "81545"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001312"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-603"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8362"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-01-21T00:00:00",
        "db": "CERT/CC",
        "id": "VU#992624"
      },
      {
        "date": "2016-01-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-00786"
      },
      {
        "date": "2016-01-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-86323"
      },
      {
        "date": "2016-01-21T00:00:00",
        "db": "BID",
        "id": "81545"
      },
      {
        "date": "2016-01-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-001312"
      },
      {
        "date": "2016-01-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201601-603"
      },
      {
        "date": "2016-01-22T11:59:03.850000",
        "db": "NVD",
        "id": "CVE-2015-8362"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-01-27T00:00:00",
        "db": "CERT/CC",
        "id": "VU#992624"
      },
      {
        "date": "2016-02-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-00786"
      },
      {
        "date": "2018-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-86323"
      },
      {
        "date": "2016-07-05T21:27:00",
        "db": "BID",
        "id": "81545"
      },
      {
        "date": "2016-02-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-001312"
      },
      {
        "date": "2016-01-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201601-603"
      },
      {
        "date": "2024-11-21T02:38:22.283000",
        "db": "NVD",
        "id": "CVE-2015-8362"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-603"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Harman AMX multimedia devices contain hard-coded credentials",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#992624"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "trust management",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-603"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…