{"uuid": "a2b930f7-c321-4a08-b003-9b78b8ba3d6a", "vulnerability": {"vulnId": "CVE-2017-12149", "altId": []}, "gcve": {"origin_uuid": "cce329bf-df49-4c6e-a027-80be2e6483bd", "object_uuid": "a2b930f7-c321-4a08-b003-9b78b8ba3d6a"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2025-07-14T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2025-07-14T00:00:00Z", "recorded_at": "2026-02-02T13:23:54Z", "first_seen_at": "2025-07-14T00:00:00Z"}, "scope": {"notes": "Affected: Red Hat / JBoss Application Server | Description: the servlet exposes an endpoint that allows you to invoke Java Management Extensions (JMX) operations without any authentication or access control | Origin source: CERT Italia | Notes: https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note"}, "evidence": [{"type": "csirt_report", "source": "enisa-cnw-kev", "signal": "successful_exploitation", "confidence": 0.75, "details": {"cwes": "-", "euvd": "EUVD-2017-3733", "notes": "https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note", "catalog": "ENISA / EU CSIRTs Network (CNW) KEV CSV", "product": "JBoss Application Server", "dateReported": "14/07/25", "originSource": "CERT Italia", "vendorProject": "Red Hat", "exploitationType": "-", "vulnerabilityName": "-", "threatActorsExploiting": "-"}}], "references": [{"id": "CVE-2017-12149", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12149"}, {"id": "EUVD-2017-3733", "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2017-3733"}, {"id": "source", "url": "https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note"}]}
