var-201407-0439
Vulnerability from variot
NETGEAR GS108PE Prosafe Plus switches with firmware 1.2.0.5 have a hardcoded password of debugpassword for the ntgruser account, which allows remote attackers to upload firmware or read or modify memory contents, and consequently execute arbitrary code, via a request to (1) produce_burn.cgi, (2) register_debug.cgi, or (3) bootcode_update.cgi. Netgear GS105PE Prosafe Plus Switch firmware version 1.2.0.5 contains hard-coded credentials. (CWE-798). An attacker could exploit this vulnerability to bypass the authentication mechanism and access the affected device without authorization. This may aid in further attacks. The vulnerability is caused by the use of a hard-coded password (debugpassword) for the ntgruser account
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201407-0439", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gs108pe", "scope": "eq", "trust": 1.6, "vendor": "netgear", "version": "1.2.0.5" }, { "model": "gs108pe", "scope": "eq", "trust": 1.0, "vendor": "netgear", "version": null }, { "model": "gs105pe prosafe plus switch", "scope": null, "trust": 0.8, "vendor": "net gear", "version": null }, { "model": "gs105pe prosafe plus switch", "scope": "eq", "trust": 0.8, "vendor": "net gear", "version": "version 1.2.0.5" }, { "model": "gs108pe prosafe plus switch", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "1.2.0.5" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-04081" }, { "db": "JVNDB", "id": "JVNDB-2014-003154" }, { "db": "CNNVD", "id": "CNNVD-201407-177" }, { "db": "NVD", "id": "CVE-2014-2969" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:netgear:gs105pe", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:gs105pe_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003154" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Marc Olivier Chouinard", "sources": [ { "db": "BID", "id": "68366" } ], "trust": 0.3 }, "cve": "CVE-2014-2969", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CVE-2014-2969", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "ADJACENT NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "availabilityRequirement": "NOT DEFINED", "baseScore": 7.8, "collateralDamagePotential": "LOW", "confidentialityImpact": "COMPLETE", "confidentialityRequirement": "NOT DEFINED", "enviromentalScore": 1.7, "exploitability": "PROOF-OF-CONCEPT", "exploitabilityScore": 6.5, "id": "CVE-2014-2969", "impactScore": 9.2, "integrityImpact": "COMPLETE", "integrityRequirement": "NOT DEFINED", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "remediationLevel": "UNAVAILABLE", "reportConfidence": "UNCOFIRMED", "severity": "HIGH", "targetDistribution": "LOW", "trust": 0.8, "userInteractionRequired": null, "vector_string": "AV:A/AC:L/Au:N/C:C/I:C/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 7.8, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2014-003154", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2014-04081", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "VHN-70908", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-2969", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2014-2969", "trust": 0.8, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2014-003154", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2014-04081", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201407-177", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-70908", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#143740" }, { "db": "CNVD", "id": "CNVD-2014-04081" }, { "db": "VULHUB", "id": "VHN-70908" }, { "db": "JVNDB", "id": "JVNDB-2014-003154" }, { "db": "CNNVD", "id": "CNNVD-201407-177" }, { "db": "NVD", "id": "CVE-2014-2969" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NETGEAR GS108PE Prosafe Plus switches with firmware 1.2.0.5 have a hardcoded password of debugpassword for the ntgruser account, which allows remote attackers to upload firmware or read or modify memory contents, and consequently execute arbitrary code, via a request to (1) produce_burn.cgi, (2) register_debug.cgi, or (3) bootcode_update.cgi. Netgear GS105PE Prosafe Plus Switch firmware version 1.2.0.5 contains hard-coded credentials. (CWE-798). An attacker could exploit this vulnerability to bypass the authentication mechanism and access the affected device without authorization. This may aid in further attacks. The vulnerability is caused by the use of a hard-coded password (debugpassword) for the ntgruser account", "sources": [ { "db": "NVD", "id": "CVE-2014-2969" }, { "db": "CERT/CC", "id": "VU#143740" }, { "db": "JVNDB", "id": "JVNDB-2014-003154" }, { "db": "CNVD", "id": "CNVD-2014-04081" }, { "db": "BID", "id": "68366" }, { "db": "VULHUB", "id": "VHN-70908" } ], "trust": 3.24 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.kb.cert.org/vuls/id/143740", "trust": 0.8, "type": "poc" } ], "sources": [ { "db": "CERT/CC", "id": "VU#143740" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-2969", "trust": 3.4 }, { "db": "CERT/CC", "id": "VU#143740", "trust": 3.3 }, { "db": "BID", "id": "68366", "trust": 1.0 }, { "db": "JVN", "id": "JVNVU91918249", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-003154", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201407-177", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2014-04081", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-70908", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#143740" }, { "db": "CNVD", "id": "CNVD-2014-04081" }, { "db": "VULHUB", "id": "VHN-70908" }, { "db": "BID", "id": "68366" }, { "db": "JVNDB", "id": "JVNDB-2014-003154" }, { "db": "CNNVD", "id": "CNNVD-201407-177" }, { "db": "NVD", "id": "CVE-2014-2969" } ] }, "id": "VAR-201407-0439", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-04081" }, { "db": "VULHUB", "id": "VHN-70908" } ], "trust": 1.325 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-04081" } ] }, "last_update_date": "2024-11-23T21:55:18.930000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Gigabit Plus Switch Series - GS105PE", "trust": 0.8, "url": "http://www.netgear.com/business/products/switches/unmanaged-plus/GS105PE.aspx" }, { "title": "GS105PE", "trust": 0.8, "url": "http://www.netgear.jp/products/details/GS105PE.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003154" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-255", "trust": 1.9 }, { "problemtype": "CWE-798", "trust": 0.8 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "CERT/CC", "id": "VU#143740" }, { "db": "VULHUB", "id": "VHN-70908" }, { "db": "JVNDB", "id": "JVNDB-2014-003154" }, { "db": "NVD", "id": "CVE-2014-2969" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.kb.cert.org/vuls/id/143740" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2969" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu91918249/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2969" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/68366" } ], "sources": [ { "db": "CERT/CC", "id": "VU#143740" }, { "db": "CNVD", "id": "CNVD-2014-04081" }, { "db": "VULHUB", "id": "VHN-70908" }, { "db": "JVNDB", "id": "JVNDB-2014-003154" }, { "db": "CNNVD", "id": "CNNVD-201407-177" }, { "db": "NVD", "id": "CVE-2014-2969" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#143740" }, { "db": "CNVD", "id": "CNVD-2014-04081" }, { "db": "VULHUB", "id": "VHN-70908" }, { "db": "BID", "id": "68366" }, { "db": "JVNDB", "id": "JVNDB-2014-003154" }, { "db": "CNNVD", "id": "CNNVD-201407-177" }, { "db": "NVD", "id": "CVE-2014-2969" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-07-03T00:00:00", "db": "CERT/CC", "id": "VU#143740" }, { "date": "2014-07-07T00:00:00", "db": "CNVD", "id": "CNVD-2014-04081" }, { "date": "2014-07-07T00:00:00", "db": "VULHUB", "id": "VHN-70908" }, { "date": "2014-07-03T00:00:00", "db": "BID", "id": "68366" }, { "date": "2014-07-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-003154" }, { "date": "2014-07-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201407-177" }, { "date": "2014-07-07T11:01:29.993000", "db": "NVD", "id": "CVE-2014-2969" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-07-08T00:00:00", "db": "CERT/CC", "id": "VU#143740" }, { "date": "2014-07-14T00:00:00", "db": "CNVD", "id": "CNVD-2014-04081" }, { "date": "2014-07-07T00:00:00", "db": "VULHUB", "id": "VHN-70908" }, { "date": "2014-07-03T00:00:00", "db": "BID", "id": "68366" }, { "date": "2014-07-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-003154" }, { "date": "2014-07-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201407-177" }, { "date": "2024-11-21T02:07:15.627000", "db": "NVD", "id": "CVE-2014-2969" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "specific network environment", "sources": [ { "db": "CNNVD", "id": "CNNVD-201407-177" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Netgear GS105PE Prosafe Plus Switch contains hard-coded login credentials", "sources": [ { "db": "CERT/CC", "id": "VU#143740" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management", "sources": [ { "db": "CNNVD", "id": "CNNVD-201407-177" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.