cve-2013-4937
Vulnerability from cvelistv5
Published
2013-07-26 10:00
Modified
2024-09-17 02:46
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:40.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://reviews.cnet.com/8301-3132_7-57594003-98" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-07-26T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://reviews.cnet.com/8301-3132_7-57594003-98" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4937", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://reviews.cnet.com/8301-3132_7-57594003-98", "refsource": "MISC", "url": "http://reviews.cnet.com/8301-3132_7-57594003-98" }, { "name": "http://twitter.com/ASUSUSA/statuses/357612236392509440", "refsource": "CONFIRM", "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4937", "datePublished": "2013-07-26T10:00:00Z", "dateReserved": "2013-07-26T00:00:00Z", "dateUpdated": "2024-09-17T02:46:42.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-4937\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2013-07-26T12:05:40.867\",\"lastModified\":\"2024-11-21T01:56:43.360\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades no especificadas en la caracter\u00edstica AiCloud de los ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, y DSL-N55U con firmware anteriores a v3.0.4.372 tienen impacto y vectores de ataque desconocidos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-ac66u_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.0.4.354\",\"matchCriteriaId\":\"2BC5E8AB-ADD3-4C8D-ABAB-6D899174280E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.140:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A946A449-7623-48FE-878A-E17DA2F41A11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.220:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A023852A-84B7-4937-886D-8893CD778DDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.246:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDB8B4AB-0EF4-4963-AE20-F4F1C3ABFC26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.260:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"553DE051-C59F-4B16-A733-C2055B14DB1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.270:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37AE944A-EF53-4F57-8A86-7DE209F00D17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ED39CBC-80ED-4037-9285-4D4CFA45F00E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n66u_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.0.4.370\",\"matchCriteriaId\":\"C801E60F-6D3D-4179-AA38-1268338C03DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n66u_firmware:3.0.0.4.272:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82C3DA99-69D6-4C2D-B485-7785EEDA38F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A60BB38-11FC-48C4-B592-29C6C3A6FEAE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n65u_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.0.4.346\",\"matchCriteriaId\":\"0D4769A7-BFC5-43DF-9FEE-14CC9BB8BD4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.134:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02E9974C-F3E1-4145-865F-974982804823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.176:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3979CD4-DFBC-460C-8E92-879F7C355D52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.260:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA3F63E-F4FA-4066-AEA0-B1149E4B1190\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.334:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E9A77E0-1CC3-4E07-B99A-8DC750C982F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.342:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"642056A2-9B4E-465C-8333-392C70D658AD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:asus:rt-n65u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5567C97-0AE2-429B-B4D7-1CF501BD2C07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n14u_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.0.4.356\",\"matchCriteriaId\":\"5B3FB0ED-9BF8-4F77-AEA0-536A961CE5F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n14u_firmware:3.0.0.4.322:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7A0A4C1-226A-42D5-A728-CBB7D2B02A50\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:asus:rt-n14u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85B0C29C-29A5-4659-8D76-9241B13682DF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.0.4.354\",\"matchCriteriaId\":\"EE3A93F2-C6C1-48F9-9273-3A322A8951A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:1.0.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C76611FB-9811-48E5-8F16-824A15CFC226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:1.0.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6887911A-9CD0-419C-AE2E-932F8AD179DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.108:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65D943A4-CD5D-4381-8C4F-FF4FC600F226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.162:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AA3CD4B-B518-459B-AFF5-CCFF47D3BAEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.178:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"939D788D-BFF7-4DEB-8C47-751532E4AC36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.220:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF6BBB0E-D69B-4854-8A5C-D6C20ABB857E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.246:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C1CCB22-3D8D-4618-819B-2EA14C42A4C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.260:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"715FFC31-33A1-469E-BF65-4749F6643EEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:7.0.2.38b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0EAF76-C2F8-4AD5-BF3D-0922DEED7B46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:asus:rt-n16:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E016FE0-0A28-49AA-A213-38A5F7728FE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.0.4.360\",\"matchCriteriaId\":\"3027E138-144F-4E36-8C6C-E4A3E71CB1E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D8E3CB7-1ADA-428C-881F-BB266991F39D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4o:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"699F6C57-F1AE-4AF5-BF56-529D41C91068\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F17E0B8C-7BA1-4FC5-84EC-4FFC87A9AC12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C68ABB-391D-45D8-9250-D93F8BFE305C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1FDDF9C-4C30-4AAC-9449-7404181071B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DE8F24A-837B-4198-B8F6-E42386D2F524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14A9D580-ACD6-4F2F-9322-E6B4C72C8BE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.318:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2660735-2247-42D9-9BAA-D785D18E6F51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.334:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"401BB537-95FB-4BFB-BC40-CD73817D7E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.342:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04A7CA72-DFAD-4E9A-BB3E-EAE9973C19C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64BCA764-5BAD-4CAB-B39F-A1D67E44EDA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CF40558-B7F8-4A2B-9819-EE3DD2C183AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:8.1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F70D82C1-764C-4DF0-B296-964602D0EC54\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"534C0C95-9DD2-464C-8776-01B47398FE13\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:dsl-n56u_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.0.4.364\",\"matchCriteriaId\":\"6573DB51-CD36-4F99-82D6-EE52CA0E5136\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:dsl-n56u_firmware:1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A02DC87-A0B4-460F-BE23-AFF51F52427C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:dsl-n56u_firmware:3.0.0.4.188:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE119718-A2F2-47A8-869F-3229A788EB04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:dsl-n56u_firmware:3.0.0.4.314:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5199B461-E2F0-4F35-963E-B3716AB5A04E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:asus:dsl-n55u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B81970C5-B766-4D2E-91EE-ADD5A9B77FF8\"}]}]}],\"references\":[{\"url\":\"http://reviews.cnet.com/8301-3132_7-57594003-98\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://twitter.com/ASUSUSA/statuses/357612236392509440\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://reviews.cnet.com/8301-3132_7-57594003-98\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://twitter.com/ASUSUSA/statuses/357612236392509440\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.