{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200109-0135",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "icdn",
"scope": "eq",
"trust": 1.9,
"vendor": "cisco",
"version": "2.0"
},
{
"model": "bsafe ssl-j",
"scope": "eq",
"trust": 1.0,
"vendor": "dell",
"version": "3.0.1"
},
{
"model": "bsafe ssl-j",
"scope": "eq",
"trust": 1.0,
"vendor": "dell",
"version": "3.1"
},
{
"model": "bsafe ssl-j",
"scope": "eq",
"trust": 1.0,
"vendor": "dell",
"version": "3.0"
},
{
"model": "bsafe ssl-j sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "rsa",
"version": "3.1"
},
{
"model": "bsafe ssl-j sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "rsa",
"version": "3.0.1"
},
{
"model": "bsafe ssl-j sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "rsa",
"version": "3.0"
},
{
"model": "icdn",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "2.0.1"
}
],
"sources": [
{
"db": "BID",
"id": "3329"
},
{
"db": "CNNVD",
"id": "CNNVD-200109-041"
},
{
"db": "NVD",
"id": "CVE-2001-1105"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Published in a Cisco Systems Security Advisory on September 12, 2001.",
"sources": [
{
"db": "BID",
"id": "3329"
},
{
"db": "CNNVD",
"id": "CNNVD-200109-041"
}
],
"trust": 0.9
},
"cve": "CVE-2001-1105",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2001-1105",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.1,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-3910",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2001-1105",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-200109-041",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-3910",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2001-1105",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-3910"
},
{
"db": "VULMON",
"id": "CVE-2001-1105"
},
{
"db": "CNNVD",
"id": "CNNVD-200109-041"
},
{
"db": "NVD",
"id": "CVE-2001-1105"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "RSA BSAFE SSL-J 3.0, 3.0.1 and 3.1, as used in Cisco iCND 2.0, caches session IDs from failed login attempts, which could allow remote attackers to bypass SSL client authentication and gain access to sensitive data by logging in after an initial failure. A vulnerability exists in several versions of RSA\u0027s SSL-J Software Development Kit (SDK) that can enable an attacker to bypass SSL client authentication. \nUnder certain conditions, if an error occurs during the SSL client-server handshake, the SSL session key may be stored in a cache rather than being discarded. Once cached, this session key can be used by an attacker to cause a server to skip the full client authentication scheme, using a much shorter one. This effectively allows the attacker to fully bypass the client authentication. \nOn systems that rely solely on the authentication mechanism provided by SSL, this could enable an attacker to perform unauthorized actions. \nAdditional technical details are forthcoming",
"sources": [
{
"db": "NVD",
"id": "CVE-2001-1105"
},
{
"db": "BID",
"id": "3329"
},
{
"db": "VULHUB",
"id": "VHN-3910"
},
{
"db": "VULMON",
"id": "CVE-2001-1105"
}
],
"trust": 1.35
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2001-1105",
"trust": 2.1
},
{
"db": "BID",
"id": "3329",
"trust": 2.1
},
{
"db": "CNNVD",
"id": "CNNVD-200109-041",
"trust": 0.7
},
{
"db": "XF",
"id": "7112",
"trust": 0.6
},
{
"db": "CISCO",
"id": "20010912 VULNERABLE SSL IMPLEMENTATION IN ICDN",
"trust": 0.6
},
{
"db": "CIAC",
"id": "L-141",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-3910",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2001-1105",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-3910"
},
{
"db": "VULMON",
"id": "CVE-2001-1105"
},
{
"db": "BID",
"id": "3329"
},
{
"db": "CNNVD",
"id": "CNNVD-200109-041"
},
{
"db": "NVD",
"id": "CVE-2001-1105"
}
]
},
"id": "VAR-200109-0135",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-3910"
}
],
"trust": 0.01
},
"last_update_date": "2024-11-22T23:05:57.628000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2001-1105"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.9,
"url": "http://www.securityfocus.com/bid/3329"
},
{
"trust": 2.8,
"url": "http://www.ciac.org/ciac/bulletins/l-141.shtml"
},
{
"trust": 2.8,
"url": "http://www.cisco.com/warp/public/707/ssl-j-pub.html"
},
{
"trust": 2.8,
"url": "http://www.rsasecurity.com/products/bsafe/bulletins/bsafe_ssl-j_3.x.securitybulletin.html"
},
{
"trust": 2.2,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7112"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/static/7112.php"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/en/us/products/sw/voicesw/ps4625/index.html"
},
{
"trust": 0.3,
"url": "http://www.rsa.com/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-3910"
},
{
"db": "VULMON",
"id": "CVE-2001-1105"
},
{
"db": "BID",
"id": "3329"
},
{
"db": "CNNVD",
"id": "CNNVD-200109-041"
},
{
"db": "NVD",
"id": "CVE-2001-1105"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-3910"
},
{
"db": "VULMON",
"id": "CVE-2001-1105"
},
{
"db": "BID",
"id": "3329"
},
{
"db": "CNNVD",
"id": "CNNVD-200109-041"
},
{
"db": "NVD",
"id": "CVE-2001-1105"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2001-09-12T00:00:00",
"db": "VULHUB",
"id": "VHN-3910"
},
{
"date": "2001-09-12T00:00:00",
"db": "VULMON",
"id": "CVE-2001-1105"
},
{
"date": "2001-09-12T00:00:00",
"db": "BID",
"id": "3329"
},
{
"date": "2001-09-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200109-041"
},
{
"date": "2001-09-12T04:00:00",
"db": "NVD",
"id": "CVE-2001-1105"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-19T00:00:00",
"db": "VULHUB",
"id": "VHN-3910"
},
{
"date": "2017-12-19T00:00:00",
"db": "VULMON",
"id": "CVE-2001-1105"
},
{
"date": "2009-07-11T07:56:00",
"db": "BID",
"id": "3329"
},
{
"date": "2005-10-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200109-041"
},
{
"date": "2024-11-20T23:36:53.383000",
"db": "NVD",
"id": "CVE-2001-1105"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200109-041"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "RSA BSAFE SSL-J Verification bypass vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200109-041"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200109-041"
}
],
"trust": 0.6
}
}