cve-2013-4937
Vulnerability from cvelistv5
Published
2013-07-26 10:00
Modified
2024-09-17 02:46
Severity ?
Summary
Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:59:40.986Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-07-26T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-4937",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://reviews.cnet.com/8301-3132_7-57594003-98",
              "refsource": "MISC",
              "url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
            },
            {
              "name": "http://twitter.com/ASUSUSA/statuses/357612236392509440",
              "refsource": "CONFIRM",
              "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-4937",
    "datePublished": "2013-07-26T10:00:00Z",
    "dateReserved": "2013-07-26T00:00:00Z",
    "dateUpdated": "2024-09-17T02:46:42.662Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-4937\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2013-07-26T12:05:40.867\",\"lastModified\":\"2024-11-21T01:56:43.360\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades no especificadas en la caracter\u00edstica AiCloud de los ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, y DSL-N55U con firmware anteriores a v3.0.4.372 tienen impacto y vectores de ataque desconocidos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-ac66u_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.0.4.354\",\"matchCriteriaId\":\"2BC5E8AB-ADD3-4C8D-ABAB-6D899174280E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.140:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A946A449-7623-48FE-878A-E17DA2F41A11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.220:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A023852A-84B7-4937-886D-8893CD778DDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.246:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDB8B4AB-0EF4-4963-AE20-F4F1C3ABFC26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.260:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"553DE051-C59F-4B16-A733-C2055B14DB1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.270:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37AE944A-EF53-4F57-8A86-7DE209F00D17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ED39CBC-80ED-4037-9285-4D4CFA45F00E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n66u_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.0.4.370\",\"matchCriteriaId\":\"C801E60F-6D3D-4179-AA38-1268338C03DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n66u_firmware:3.0.0.4.272:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82C3DA99-69D6-4C2D-B485-7785EEDA38F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A60BB38-11FC-48C4-B592-29C6C3A6FEAE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n65u_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.0.4.346\",\"matchCriteriaId\":\"0D4769A7-BFC5-43DF-9FEE-14CC9BB8BD4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.134:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02E9974C-F3E1-4145-865F-974982804823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.176:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3979CD4-DFBC-460C-8E92-879F7C355D52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.260:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA3F63E-F4FA-4066-AEA0-B1149E4B1190\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.334:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E9A77E0-1CC3-4E07-B99A-8DC750C982F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.342:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"642056A2-9B4E-465C-8333-392C70D658AD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:asus:rt-n65u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5567C97-0AE2-429B-B4D7-1CF501BD2C07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n14u_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.0.4.356\",\"matchCriteriaId\":\"5B3FB0ED-9BF8-4F77-AEA0-536A961CE5F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n14u_firmware:3.0.0.4.322:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7A0A4C1-226A-42D5-A728-CBB7D2B02A50\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:asus:rt-n14u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85B0C29C-29A5-4659-8D76-9241B13682DF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.0.4.354\",\"matchCriteriaId\":\"EE3A93F2-C6C1-48F9-9273-3A322A8951A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:1.0.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C76611FB-9811-48E5-8F16-824A15CFC226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:1.0.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6887911A-9CD0-419C-AE2E-932F8AD179DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.108:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65D943A4-CD5D-4381-8C4F-FF4FC600F226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.162:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AA3CD4B-B518-459B-AFF5-CCFF47D3BAEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.178:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"939D788D-BFF7-4DEB-8C47-751532E4AC36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.220:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF6BBB0E-D69B-4854-8A5C-D6C20ABB857E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.246:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C1CCB22-3D8D-4618-819B-2EA14C42A4C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.260:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"715FFC31-33A1-469E-BF65-4749F6643EEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n16_firmware:7.0.2.38b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0EAF76-C2F8-4AD5-BF3D-0922DEED7B46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:asus:rt-n16:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E016FE0-0A28-49AA-A213-38A5F7728FE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.0.4.360\",\"matchCriteriaId\":\"3027E138-144F-4E36-8C6C-E4A3E71CB1E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D8E3CB7-1ADA-428C-881F-BB266991F39D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4o:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"699F6C57-F1AE-4AF5-BF56-529D41C91068\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F17E0B8C-7BA1-4FC5-84EC-4FFC87A9AC12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C68ABB-391D-45D8-9250-D93F8BFE305C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1FDDF9C-4C30-4AAC-9449-7404181071B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DE8F24A-837B-4198-B8F6-E42386D2F524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14A9D580-ACD6-4F2F-9322-E6B4C72C8BE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.318:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2660735-2247-42D9-9BAA-D785D18E6F51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.334:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"401BB537-95FB-4BFB-BC40-CD73817D7E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.342:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04A7CA72-DFAD-4E9A-BB3E-EAE9973C19C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64BCA764-5BAD-4CAB-B39F-A1D67E44EDA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CF40558-B7F8-4A2B-9819-EE3DD2C183AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:rt-n56u_firmware:8.1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F70D82C1-764C-4DF0-B296-964602D0EC54\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"534C0C95-9DD2-464C-8776-01B47398FE13\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:dsl-n56u_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.0.4.364\",\"matchCriteriaId\":\"6573DB51-CD36-4F99-82D6-EE52CA0E5136\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:dsl-n56u_firmware:1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A02DC87-A0B4-460F-BE23-AFF51F52427C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:dsl-n56u_firmware:3.0.0.4.188:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE119718-A2F2-47A8-869F-3229A788EB04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:asus:dsl-n56u_firmware:3.0.0.4.314:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5199B461-E2F0-4F35-963E-B3716AB5A04E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:asus:dsl-n55u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B81970C5-B766-4D2E-91EE-ADD5A9B77FF8\"}]}]}],\"references\":[{\"url\":\"http://reviews.cnet.com/8301-3132_7-57594003-98\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://twitter.com/ASUSUSA/statuses/357612236392509440\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://reviews.cnet.com/8301-3132_7-57594003-98\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://twitter.com/ASUSUSA/statuses/357612236392509440\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.