Search criteria

6 vulnerabilities found for roomwizard by polyvision

VAR-201101-0116

Vulnerability from variot - Updated: 2025-04-11 23:17

The PolyVision RoomWizard with firmware 3.2.3 has a default password of roomwizard for the administrator account, which makes it easier for remote attackers to obtain console access via an HTTP session, a different vulnerability than CVE-2010-0214. The PolyVision RoomWizard web based scheduling system with touch screen display contains two vulnerabilities that allow an unauthorized user to access the device console and Sync Connector Active Directory credentials. RoomWizard is prone to a security-bypass vulnerability and an information-disclosure vulnerability. Successful exploiting these issues allow attackers to gain access to the application; other attacks may also be possible

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201101-0116",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "roomwizard",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "polyvision",
        "version": "3.2.3"
      },
      {
        "model": "roomwizard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "polyvision",
        "version": "*"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "polyvision",
        "version": null
      },
      {
        "model": "roomwizard",
        "scope": null,
        "trust": 0.8,
        "vendor": "polyvision",
        "version": null
      },
      {
        "model": "media link roomwizard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "interactive",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:polyvision:roomwizard",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:polyvision:roomwizard_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sean Lam",
    "sources": [
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2011-0423",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2011-0423",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-48368",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2011-0423",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#870601",
            "trust": 0.8,
            "value": "1.26"
          },
          {
            "author": "NVD",
            "id": "CVE-2011-0423",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201101-122",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-48368",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48368"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The PolyVision RoomWizard with firmware 3.2.3 has a default password of roomwizard for the administrator account, which makes it easier for remote attackers to obtain console access via an HTTP session, a different vulnerability than CVE-2010-0214. The PolyVision RoomWizard web based scheduling system with touch screen display contains two vulnerabilities that allow an unauthorized user to access the device console and Sync Connector Active Directory credentials. RoomWizard is prone to a security-bypass vulnerability and an information-disclosure vulnerability. \nSuccessful exploiting these issues allow attackers to gain access to the application; other attacks may also be possible",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-0423"
      },
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48368"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#870601",
        "trust": 3.6
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0423",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "45699",
        "trust": 2.0
      },
      {
        "db": "VUPEN",
        "id": "ADV-2011-0059",
        "trust": 1.7
      },
      {
        "db": "PACKETSTORM",
        "id": "97291",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "70388",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122",
        "trust": 0.7
      },
      {
        "db": "FULLDISC",
        "id": "20110106 ROOMWIZARD DEFAULT PASSWORD AND SYNC CONNECTOR CREDENTIAL LEAK [CVE-2010-0214]",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "64543",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-48368",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48368"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "id": "VAR-201101-0116",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-48368"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-11T23:17:56.667000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.polyvision.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-48368"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://www.kb.cert.org/vuls/id/870601"
      },
      {
        "trust": 2.0,
        "url": "http://seclists.org/fulldisclosure/2011/jan/58"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/45699"
      },
      {
        "trust": 1.7,
        "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2011/0059"
      },
      {
        "trust": 1.1,
        "url": "http://osvdb.org/70388"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64642"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
      },
      {
        "trust": 0.8,
        "url": "about vulnerability notes"
      },
      {
        "trust": 0.8,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 0.8,
        "url": "provide a vendor statement"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0423"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0423"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/64543"
      },
      {
        "trust": 0.3,
        "url": "http://www.interactivemedialink.com.au/products/input-devices/196-roomwizard-room-scheduling-system.html"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48368"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48368"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-01-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "date": "2011-01-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-48368"
      },
      {
        "date": "2011-01-06T00:00:00",
        "db": "BID",
        "id": "45699"
      },
      {
        "date": "2012-03-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "date": "2011-01-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      },
      {
        "date": "2011-01-12T01:00:02.353000",
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-01-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-48368"
      },
      {
        "date": "2015-04-13T21:05:00",
        "db": "BID",
        "id": "45699"
      },
      {
        "date": "2012-03-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "date": "2011-01-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      },
      {
        "date": "2025-04-11T00:51:21.963000",
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "PolyVision RoomWizard insecurely stores Sync Connector Active Directory credentials and uses default administrative password",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "trust management",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      }
    ],
    "trust": 0.6
  }
}

VAR-201101-0011

Vulnerability from variot - Updated: 2025-04-11 23:17

The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI. The PolyVision RoomWizard web based scheduling system with touch screen display contains two vulnerabilities that allow an unauthorized user to access the device console and Sync Connector Active Directory credentials. PolyVision RoomWizard In some cases, a remote third party accesses the admin interface, Active Directory You may be able to obtain your credentials. PolyVision RoomWizard Is a web-based conference room reservation system. Sync Connector Is RoomWizard But, Microsoft Windows Actitve Directory (AD) Environmental Microsoft Exchange This is a function for linking with. PolyVision RoomWizard The admin interface for Sync Connector Used by Active Directory Is vulnerable to a password leak. Also, PolyVision RoomWizard To HTTP Factory settings for administrative account information for access via the Internet may be obtained by a third party.By a remote third party, AD Your credentials could be stolen. Also, the settings of this product may be changed. RoomWizard is prone to a security-bypass vulnerability and an information-disclosure vulnerability. Successful exploiting these issues allow attackers to gain access to the application; other attacks may also be possible

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201101-0011",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "roomwizard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "polyvision",
        "version": "3.2.3"
      },
      {
        "model": "roomwizard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "polyvision",
        "version": "*"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "polyvision",
        "version": null
      },
      {
        "model": "roomwizard",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "polyvision",
        "version": "version 3.2.3"
      },
      {
        "model": "media link roomwizard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "interactive",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-129"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-0214"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:polyvision:roomwizard_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001024"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sean Lam",
    "sources": [
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-129"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2010-0214",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2010-0214",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-42819",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2010-0214",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#870601",
            "trust": 0.8,
            "value": "1.26"
          },
          {
            "author": "NVD",
            "id": "CVE-2010-0214",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201101-129",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-42819",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "VULHUB",
        "id": "VHN-42819"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-129"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-0214"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI. The PolyVision RoomWizard web based scheduling system with touch screen display contains two vulnerabilities that allow an unauthorized user to access the device console and Sync Connector Active Directory credentials. PolyVision RoomWizard In some cases, a remote third party accesses the admin interface, Active Directory You may be able to obtain your credentials. PolyVision RoomWizard Is a web-based conference room reservation system. Sync Connector Is RoomWizard But, Microsoft Windows Actitve Directory (AD) Environmental Microsoft Exchange This is a function for linking with. PolyVision RoomWizard The admin interface for Sync Connector Used by Active Directory Is vulnerable to a password leak. Also, PolyVision RoomWizard To HTTP Factory settings for administrative account information for access via the Internet may be obtained by a third party.By a remote third party, AD Your credentials could be stolen. Also, the settings of this product may be changed. RoomWizard is prone to a security-bypass vulnerability and an information-disclosure vulnerability. \nSuccessful exploiting these issues allow attackers to gain access to the application; other attacks may also be possible",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-0214"
      },
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001024"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "VULHUB",
        "id": "VHN-42819"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#870601",
        "trust": 3.6
      },
      {
        "db": "NVD",
        "id": "CVE-2010-0214",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "45699",
        "trust": 2.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2011-0059",
        "trust": 2.5
      },
      {
        "db": "PACKETSTORM",
        "id": "97291",
        "trust": 1.7
      },
      {
        "db": "XF",
        "id": "64543",
        "trust": 1.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001024",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-129",
        "trust": 0.7
      },
      {
        "db": "FULLDISC",
        "id": "20110106 ROOMWIZARD DEFAULT PASSWORD AND SYNC CONNECTOR CREDENTIAL LEAK [CVE-2010-0214]",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-42819",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "VULHUB",
        "id": "VHN-42819"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-129"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-0214"
      }
    ]
  },
  "id": "VAR-201101-0011",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-42819"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-11T23:17:56.164000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Steelcase RoomWizard System Download",
        "trust": 0.8,
        "url": "http://steelcase.polyvision.com/support/downloads-roomwiz.asp"
      },
      {
        "title": "RWFirmware",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=36140"
      },
      {
        "title": "RW10Firmware",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=36139"
      },
      {
        "title": "Pre-upgrade",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=36138"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-129"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-42819"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001024"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-0214"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://www.kb.cert.org/vuls/id/870601"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/45699"
      },
      {
        "trust": 2.5,
        "url": "http://www.vupen.com/english/advisories/2011/0059"
      },
      {
        "trust": 2.0,
        "url": "http://seclists.org/fulldisclosure/2011/jan/58"
      },
      {
        "trust": 1.7,
        "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/64543"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
      },
      {
        "trust": 0.8,
        "url": "about vulnerability notes"
      },
      {
        "trust": 0.8,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 0.8,
        "url": "provide a vendor statement"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0214"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu870601"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0214"
      },
      {
        "trust": 0.3,
        "url": "http://www.interactivemedialink.com.au/products/input-devices/196-roomwizard-room-scheduling-system.html"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "VULHUB",
        "id": "VHN-42819"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-129"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-0214"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "VULHUB",
        "id": "VHN-42819"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-129"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-0214"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-01-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "date": "2011-01-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-42819"
      },
      {
        "date": "2011-01-06T00:00:00",
        "db": "BID",
        "id": "45699"
      },
      {
        "date": "2011-02-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-001024"
      },
      {
        "date": "2011-01-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201101-129"
      },
      {
        "date": "2011-01-12T01:00:01.183000",
        "db": "NVD",
        "id": "CVE-2010-0214"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-01-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-42819"
      },
      {
        "date": "2015-04-13T21:05:00",
        "db": "BID",
        "id": "45699"
      },
      {
        "date": "2011-02-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-001024"
      },
      {
        "date": "2011-01-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201101-129"
      },
      {
        "date": "2025-04-11T00:51:21.963000",
        "db": "NVD",
        "id": "CVE-2010-0214"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-129"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "PolyVision RoomWizard insecurely stores Sync Connector Active Directory credentials and uses default administrative password",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-129"
      }
    ],
    "trust": 0.6
  }
}

CVE-2011-0423 (GCVE-0-2011-0423)

Vulnerability from nvd – Published: 2011-01-12 00:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The PolyVision RoomWizard with firmware 3.2.3 has a default password of roomwizard for the administrator account, which makes it easier for remote attackers to obtain console access via an HTTP session, a different vulnerability than CVE-2010-0214.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.962Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#870601",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/870601"
          },
          {
            "name": "roomwizard-password-security-bypass(64543)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
          },
          {
            "name": "ADV-2011-0059",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0059"
          },
          {
            "name": "70388",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/70388"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
          },
          {
            "name": "roomwizard-default-password(64642)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64642"
          },
          {
            "name": "20110106 RoomWizard Default Password and Sync Connector Credential Leak [CVE-2010-0214]",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2011/Jan/58"
          },
          {
            "name": "45699",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/45699"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-01-06T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The PolyVision RoomWizard with firmware 3.2.3 has a default password of roomwizard for the administrator account, which makes it easier for remote attackers to obtain console access via an HTTP session, a different vulnerability than CVE-2010-0214."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#870601",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/870601"
        },
        {
          "name": "roomwizard-password-security-bypass(64543)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
        },
        {
          "name": "ADV-2011-0059",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0059"
        },
        {
          "name": "70388",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/70388"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
        },
        {
          "name": "roomwizard-default-password(64642)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64642"
        },
        {
          "name": "20110106 RoomWizard Default Password and Sync Connector Credential Leak [CVE-2010-0214]",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2011/Jan/58"
        },
        {
          "name": "45699",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/45699"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-0423",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PolyVision RoomWizard with firmware 3.2.3 has a default password of roomwizard for the administrator account, which makes it easier for remote attackers to obtain console access via an HTTP session, a different vulnerability than CVE-2010-0214."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#870601",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/870601"
            },
            {
              "name": "roomwizard-password-security-bypass(64543)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
            },
            {
              "name": "ADV-2011-0059",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0059"
            },
            {
              "name": "70388",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/70388"
            },
            {
              "name": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
            },
            {
              "name": "roomwizard-default-password(64642)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64642"
            },
            {
              "name": "20110106 RoomWizard Default Password and Sync Connector Credential Leak [CVE-2010-0214]",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2011/Jan/58"
            },
            {
              "name": "45699",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/45699"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-0423",
    "datePublished": "2011-01-12T00:00:00.000Z",
    "dateReserved": "2011-01-11T00:00:00.000Z",
    "dateUpdated": "2024-08-06T21:51:08.962Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-0214 (GCVE-0-2010-0214)

Vulnerability from nvd – Published: 2011-01-12 00:00 – Updated: 2024-08-07 00:37
VLAI?
Summary
The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:37:54.145Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#870601",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/870601"
          },
          {
            "name": "roomwizard-password-security-bypass(64543)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
          },
          {
            "name": "ADV-2011-0059",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0059"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
          },
          {
            "name": "20110106 RoomWizard Default Password and Sync Connector Credential Leak [CVE-2010-0214]",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2011/Jan/58"
          },
          {
            "name": "45699",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/45699"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-01-06T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#870601",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/870601"
        },
        {
          "name": "roomwizard-password-security-bypass(64543)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
        },
        {
          "name": "ADV-2011-0059",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0059"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
        },
        {
          "name": "20110106 RoomWizard Default Password and Sync Connector Credential Leak [CVE-2010-0214]",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2011/Jan/58"
        },
        {
          "name": "45699",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/45699"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2010-0214",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#870601",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/870601"
            },
            {
              "name": "roomwizard-password-security-bypass(64543)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
            },
            {
              "name": "ADV-2011-0059",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0059"
            },
            {
              "name": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
            },
            {
              "name": "20110106 RoomWizard Default Password and Sync Connector Credential Leak [CVE-2010-0214]",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2011/Jan/58"
            },
            {
              "name": "45699",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/45699"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2010-0214",
    "datePublished": "2011-01-12T00:00:00.000Z",
    "dateReserved": "2010-01-06T00:00:00.000Z",
    "dateUpdated": "2024-08-07T00:37:54.145Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-0214 (GCVE-0-2010-0214)

Vulnerability from cvelistv5 – Published: 2011-01-12 00:00 – Updated: 2024-08-07 00:37
VLAI?
Summary
The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:37:54.145Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#870601",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/870601"
          },
          {
            "name": "roomwizard-password-security-bypass(64543)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
          },
          {
            "name": "ADV-2011-0059",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0059"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
          },
          {
            "name": "20110106 RoomWizard Default Password and Sync Connector Credential Leak [CVE-2010-0214]",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2011/Jan/58"
          },
          {
            "name": "45699",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/45699"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-01-06T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#870601",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/870601"
        },
        {
          "name": "roomwizard-password-security-bypass(64543)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
        },
        {
          "name": "ADV-2011-0059",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0059"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
        },
        {
          "name": "20110106 RoomWizard Default Password and Sync Connector Credential Leak [CVE-2010-0214]",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2011/Jan/58"
        },
        {
          "name": "45699",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/45699"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2010-0214",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#870601",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/870601"
            },
            {
              "name": "roomwizard-password-security-bypass(64543)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
            },
            {
              "name": "ADV-2011-0059",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0059"
            },
            {
              "name": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
            },
            {
              "name": "20110106 RoomWizard Default Password and Sync Connector Credential Leak [CVE-2010-0214]",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2011/Jan/58"
            },
            {
              "name": "45699",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/45699"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2010-0214",
    "datePublished": "2011-01-12T00:00:00.000Z",
    "dateReserved": "2010-01-06T00:00:00.000Z",
    "dateUpdated": "2024-08-07T00:37:54.145Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0423 (GCVE-0-2011-0423)

Vulnerability from cvelistv5 – Published: 2011-01-12 00:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The PolyVision RoomWizard with firmware 3.2.3 has a default password of roomwizard for the administrator account, which makes it easier for remote attackers to obtain console access via an HTTP session, a different vulnerability than CVE-2010-0214.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.962Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#870601",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/870601"
          },
          {
            "name": "roomwizard-password-security-bypass(64543)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
          },
          {
            "name": "ADV-2011-0059",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0059"
          },
          {
            "name": "70388",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/70388"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
          },
          {
            "name": "roomwizard-default-password(64642)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64642"
          },
          {
            "name": "20110106 RoomWizard Default Password and Sync Connector Credential Leak [CVE-2010-0214]",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2011/Jan/58"
          },
          {
            "name": "45699",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/45699"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-01-06T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The PolyVision RoomWizard with firmware 3.2.3 has a default password of roomwizard for the administrator account, which makes it easier for remote attackers to obtain console access via an HTTP session, a different vulnerability than CVE-2010-0214."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#870601",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/870601"
        },
        {
          "name": "roomwizard-password-security-bypass(64543)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
        },
        {
          "name": "ADV-2011-0059",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0059"
        },
        {
          "name": "70388",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/70388"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
        },
        {
          "name": "roomwizard-default-password(64642)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64642"
        },
        {
          "name": "20110106 RoomWizard Default Password and Sync Connector Credential Leak [CVE-2010-0214]",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2011/Jan/58"
        },
        {
          "name": "45699",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/45699"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-0423",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PolyVision RoomWizard with firmware 3.2.3 has a default password of roomwizard for the administrator account, which makes it easier for remote attackers to obtain console access via an HTTP session, a different vulnerability than CVE-2010-0214."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#870601",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/870601"
            },
            {
              "name": "roomwizard-password-security-bypass(64543)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
            },
            {
              "name": "ADV-2011-0059",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0059"
            },
            {
              "name": "70388",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/70388"
            },
            {
              "name": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
            },
            {
              "name": "roomwizard-default-password(64642)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64642"
            },
            {
              "name": "20110106 RoomWizard Default Password and Sync Connector Credential Leak [CVE-2010-0214]",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2011/Jan/58"
            },
            {
              "name": "45699",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/45699"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-0423",
    "datePublished": "2011-01-12T00:00:00.000Z",
    "dateReserved": "2011-01-11T00:00:00.000Z",
    "dateUpdated": "2024-08-06T21:51:08.962Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}