var-201706-0071
Vulnerability from variot

Sony PCS-XG100, PCS-XG100S, PCS-XG100C, PCS-XG77, PCS-XG77S, PCS-XG77C devices with firmware versions prior to Ver.1.51 and PCS-XC1 devices with firmware version prior to Ver.1.22 allow an attacker on the same network segment to bypass authentication to perform administrative operations via unspecified vectors. Multiple SONY Videoconference Systems have a default user account which does not require authentication to login to a device (CWE-306). This user account has a privilege to view some of the system configuration files. As a result, the device may be manipulated by an attacker with administrative privileges. telnet/ssl functionality is implemented based on the specifications in the device, and it is disabled by default. When this functionality is enabled, a user in the same subnetwork can login to the device.The device may be logged in by the other user in the same subnetwork. As a result, the device may be manipulated by the user with administrative privileges. Sony PCS-XG100 and so on are Sony's network camera products. An authentication vulnerability exists in several Sony products. An attacker could exploit the vulnerability to bypass authentication and perform administrator actions. Sony PCS-XG100, etc. The following products and versions are affected: PCS-XG100 with firmware version earlier than 1.51; PCS-XG100S with firmware version earlier than 1.51; PCS-XG100C with firmware version earlier than 1.51; PCS-XG77 with firmware version earlier than 1.51 ; PCS-XG77S with firmware version earlier than 1.51; PCS-XG77C with firmware version earlier than 1.51; PCS-XC1 with firmware version earlier than 1.22

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0071",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "pcs-xg77",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sony",
        "version": "1.50"
      },
      {
        "model": "pcs-xg100",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sony",
        "version": "1.50"
      },
      {
        "model": "pcs-xg100",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sony",
        "version": "1.42"
      },
      {
        "model": "pcs-xg77",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sony",
        "version": "1.42"
      },
      {
        "model": "pcs-xc1",
        "scope": null,
        "trust": 1.4,
        "vendor": "sony",
        "version": null
      },
      {
        "model": "pcs-xg77s",
        "scope": null,
        "trust": 1.4,
        "vendor": "sony",
        "version": null
      },
      {
        "model": "pcs-xg77",
        "scope": null,
        "trust": 1.4,
        "vendor": "sony",
        "version": null
      },
      {
        "model": "pcs-xg100s",
        "scope": null,
        "trust": 1.4,
        "vendor": "sony",
        "version": null
      },
      {
        "model": "pcs-xg100",
        "scope": null,
        "trust": 1.4,
        "vendor": "sony",
        "version": null
      },
      {
        "model": "pcs-xc1",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sony",
        "version": "1.21"
      },
      {
        "model": "pcs-xc1",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sony",
        "version": "1.21"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-14141"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000246"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-354"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7830"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:sony:pcs-xc1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sony:pcs-xg100",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sony:pcs-xg100s",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sony:pcs-xg77",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sony:pcs-xg77s",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000246"
      }
    ]
  },
  "cve": "CVE-2016-7830",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "CVE-2016-7830",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Adjacent Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 2.9,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2016-000246",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2017-14141",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "VHN-96650",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:A/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2016-7830",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Adjacent Network",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2016-000246",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-7830",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2016-000246",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-14141",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201706-354",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-96650",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-14141"
      },
      {
        "db": "VULHUB",
        "id": "VHN-96650"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000246"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-354"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7830"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sony PCS-XG100, PCS-XG100S, PCS-XG100C, PCS-XG77, PCS-XG77S, PCS-XG77C devices with firmware versions prior to Ver.1.51 and PCS-XC1 devices with firmware version prior to Ver.1.22 allow an attacker on the same network segment to bypass authentication to perform administrative operations via unspecified vectors. Multiple SONY Videoconference Systems have a default user account which does not require authentication to login to a device (CWE-306). This user account has a privilege to view some of the system configuration files. As a result, the device may be manipulated by an attacker with administrative privileges. telnet/ssl functionality is implemented based on the specifications in the device, and it is disabled by default. When this functionality is enabled, a user in the same subnetwork can login to the device.The device may be logged in by the other user in the same subnetwork. As a result, the device may be manipulated by the user with administrative privileges. Sony PCS-XG100 and so on are Sony\u0027s network camera products. An authentication vulnerability exists in several Sony products. An attacker could exploit the vulnerability to bypass authentication and perform administrator actions. Sony PCS-XG100, etc. The following products and versions are affected: PCS-XG100 with firmware version earlier than 1.51; PCS-XG100S with firmware version earlier than 1.51; PCS-XG100C with firmware version earlier than 1.51; PCS-XG77 with firmware version earlier than 1.51 ; PCS-XG77S with firmware version earlier than 1.51; PCS-XG77C with firmware version earlier than 1.51; PCS-XC1 with firmware version earlier than 1.22",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-7830"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000246"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-14141"
      },
      {
        "db": "VULHUB",
        "id": "VHN-96650"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-7830",
        "trust": 3.1
      },
      {
        "db": "JVN",
        "id": "JVN42070907",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000246",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-354",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-14141",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-96650",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-14141"
      },
      {
        "db": "VULHUB",
        "id": "VHN-96650"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000246"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-354"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7830"
      }
    ]
  },
  "id": "VAR-201706-0071",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-14141"
      },
      {
        "db": "VULHUB",
        "id": "VHN-96650"
      }
    ],
    "trust": 1.375
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-14141"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:01:05.551000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Notice regarding Video conference Network Security Enhancement",
        "trust": 0.8,
        "url": "http://www.sony.co.uk/pro/support/attachment/1237494431832/1237494431864/videoconferencesecurityenhancement-v3.pdf"
      },
      {
        "title": "Software: PCS-XG100/XG77 V1.51.20 \u0026 PCS-XC1 V1.22.20",
        "trust": 0.8,
        "url": "https://www.sony.co.uk/pro/support/software/SET_160510_PSG/1"
      },
      {
        "title": "Patches for multiple Sony product authentication vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/97891"
      },
      {
        "title": "Multiple Sony Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70859"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-14141"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000246"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-354"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-306",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-287",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96650"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000246"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7830"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "https://jvn.jp/en/jp/jvn42070907/index.html"
      },
      {
        "trust": 1.7,
        "url": "https://www.sony.co.uk/pro/support/attachment/1237494431832/1237494431864/videoconferencesecurityenhancement-v3.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7830"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-7830"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-14141"
      },
      {
        "db": "VULHUB",
        "id": "VHN-96650"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000246"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-354"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7830"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-14141"
      },
      {
        "db": "VULHUB",
        "id": "VHN-96650"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000246"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-354"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7830"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-14141"
      },
      {
        "date": "2017-06-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-96650"
      },
      {
        "date": "2016-12-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-000246"
      },
      {
        "date": "2017-06-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201706-354"
      },
      {
        "date": "2017-06-09T16:29:01.080000",
        "db": "NVD",
        "id": "CVE-2016-7830"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-14141"
      },
      {
        "date": "2017-06-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-96650"
      },
      {
        "date": "2018-01-17T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-000246"
      },
      {
        "date": "2017-06-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201706-354"
      },
      {
        "date": "2024-11-21T02:58:33.323000",
        "db": "NVD",
        "id": "CVE-2016-7830"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "specific network environment",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-354"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mutiple SONY Videoconference Systems do not properly perform authentication",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000246"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-354"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…