BDU:2021-04935
Vulnerability from fstec - Published: 22.09.2021
VLAI Severity ?
Title
Уязвимость синтаксического анализатора командной строки TrustSec CLI операционных систем Cisco IOS XE и Cisco IOS, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость синтаксического анализатора командной строки TrustSec CLI операционных систем Cisco IOS XE и Cisco IOS связана с неправильным взаимодействием веб-интерфейса пользователя и интерфейса командной строки. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, вызвать отказ в обслуживании с помощью специально созданной команды
Severity ?
Vendor
Cisco Systems Inc.
Software Name
Cisco IOS XE, Cisco IOS
Software Version
16.1 (Cisco IOS XE), 16.2 (Cisco IOS XE), 3.3XO (Cisco IOS XE), 3.7E (Cisco IOS XE), 3.9E (Cisco IOS XE), 3.15S (Cisco IOS XE), 3.16S (Cisco IOS XE), 3.17S (Cisco IOS XE), 16.11 (Cisco IOS XE), 3.3SE (Cisco IOS XE), 3.5E (Cisco IOS XE), 3.6E (Cisco IOS XE), 3.14S (Cisco IOS XE), 3.18S (Cisco IOS XE), 3.18SP (Cisco IOS XE), 3.10E (Cisco IOS XE), 15.0EY (Cisco IOS), 15.0EX (Cisco IOS), 15.1SY (Cisco IOS), 15.4S (Cisco IOS), 15.2SY (Cisco IOS), 15.5S (Cisco IOS), 15.3SY (Cisco IOS), 15.6SP (Cisco IOS), 15.4SY (Cisco IOS), 15.5SY (Cisco IOS), 15.7M (Cisco IOS), 15.8M (Cisco IOS), 15.4T (Cisco IOS), 15.4M (Cisco IOS), 15.4CG (Cisco IOS), 15.5T (Cisco IOS), 15.4SN (Cisco IOS), 15.5M (Cisco IOS), 15.5SN (Cisco IOS), 15.6S (Cisco IOS), 15.6T (Cisco IOS), 15.5XB (Cisco IOS), 15.6SN (Cisco IOS), 15.3JD (Cisco IOS), 15.6M (Cisco IOS), 15.3JE (Cisco IOS), 15.3JF (Cisco IOS), 15.3JG (Cisco IOS), 15.3JH (Cisco IOS), 15.3JI (Cisco IOS), 15.3JJ (Cisco IOS), 15.2E (Cisco IOS), 16.12 (Cisco IOS XE), 15.0SE (Cisco IOS), 15.0EZ (Cisco IOS), 15.2EY (Cisco IOS), 15.0EJ (Cisco IOS), 15.2EX (Cisco IOS), 15.0EK (Cisco IOS), 15.2EB (Cisco IOS), 15.2EA (Cisco IOS), 15.2EC (Cisco IOS), 12.2I (Cisco IOS), 15.9M (Cisco IOS), 15.3JPI (Cisco IOS), 15.1SVS (Cisco IOS), 3.11E (Cisco IOS XE), 15.3JPJ (Cisco IOS), 15.3JK (Cisco IOS), 15.1SVR (Cisco IOS), от 16.3 до 16.5 включительно (Cisco IOS XE), от 16.6 до 16.10 включительно (Cisco IOS XE), 15.1SVT (Cisco IOS), 15.3JPK (Cisco IOS), от 3.11S до 3.13S включительно (Cisco IOS XE), от 17.1 до 17.5 включительно (Cisco IOS XE)
Possible Mitigations
Использование рекомендаций:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-trustsec-dos-7fuXDR2
Reference
https://nvd.nist.gov/vuln/detail/CVE-2021-34699
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-trustsec-dos-7fuXDR2
CWE
CWE-435
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "16.1 (Cisco IOS XE), 16.2 (Cisco IOS XE), 3.3XO (Cisco IOS XE), 3.7E (Cisco IOS XE), 3.9E (Cisco IOS XE), 3.15S (Cisco IOS XE), 3.16S (Cisco IOS XE), 3.17S (Cisco IOS XE), 16.11 (Cisco IOS XE), 3.3SE (Cisco IOS XE), 3.5E (Cisco IOS XE), 3.6E (Cisco IOS XE), 3.14S (Cisco IOS XE), 3.18S (Cisco IOS XE), 3.18SP (Cisco IOS XE), 3.10E (Cisco IOS XE), 15.0EY (Cisco IOS), 15.0EX (Cisco IOS), 15.1SY (Cisco IOS), 15.4S (Cisco IOS), 15.2SY (Cisco IOS), 15.5S (Cisco IOS), 15.3SY (Cisco IOS), 15.6SP (Cisco IOS), 15.4SY (Cisco IOS), 15.5SY (Cisco IOS), 15.7M (Cisco IOS), 15.8M (Cisco IOS), 15.4T (Cisco IOS), 15.4M (Cisco IOS), 15.4CG (Cisco IOS), 15.5T (Cisco IOS), 15.4SN (Cisco IOS), 15.5M (Cisco IOS), 15.5SN (Cisco IOS), 15.6S (Cisco IOS), 15.6T (Cisco IOS), 15.5XB (Cisco IOS), 15.6SN (Cisco IOS), 15.3JD (Cisco IOS), 15.6M (Cisco IOS), 15.3JE (Cisco IOS), 15.3JF (Cisco IOS), 15.3JG (Cisco IOS), 15.3JH (Cisco IOS), 15.3JI (Cisco IOS), 15.3JJ (Cisco IOS), 15.2E (Cisco IOS), 16.12 (Cisco IOS XE), 15.0SE (Cisco IOS), 15.0EZ (Cisco IOS), 15.2EY (Cisco IOS), 15.0EJ (Cisco IOS), 15.2EX (Cisco IOS), 15.0EK (Cisco IOS), 15.2EB (Cisco IOS), 15.2EA (Cisco IOS), 15.2EC (Cisco IOS), 12.2I (Cisco IOS), 15.9M (Cisco IOS), 15.3JPI (Cisco IOS), 15.1SVS (Cisco IOS), 3.11E (Cisco IOS XE), 15.3JPJ (Cisco IOS), 15.3JK (Cisco IOS), 15.1SVR (Cisco IOS), \u043e\u0442 16.3 \u0434\u043e 16.5 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Cisco IOS XE), \u043e\u0442 16.6 \u0434\u043e 16.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Cisco IOS XE), 15.1SVT (Cisco IOS), 15.3JPK (Cisco IOS), \u043e\u0442 3.11S \u0434\u043e 3.13S \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Cisco IOS XE), \u043e\u0442 17.1 \u0434\u043e 17.5 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Cisco IOS XE)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-trustsec-dos-7fuXDR2",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "22.09.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "13.10.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "13.10.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-04935",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-34699",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Cisco IOS XE, Cisco IOS",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Cisco Systems Inc. Cisco IOS XE 16.1 , Cisco Systems Inc. Cisco IOS XE 16.2 , Cisco Systems Inc. Cisco IOS XE 3.3XO , Cisco Systems Inc. Cisco IOS XE 3.7E , Cisco Systems Inc. Cisco IOS XE 3.9E , Cisco Systems Inc. Cisco IOS XE 3.15S , Cisco Systems Inc. Cisco IOS XE 3.16S , Cisco Systems Inc. Cisco IOS XE 3.17S , Cisco Systems Inc. Cisco IOS XE 16.11 , Cisco Systems Inc. Cisco IOS XE 3.3SE , Cisco Systems Inc. Cisco IOS XE 3.5E , Cisco Systems Inc. Cisco IOS XE 3.6E , Cisco Systems Inc. Cisco IOS XE 3.14S , Cisco Systems Inc. Cisco IOS XE 3.18S , Cisco Systems Inc. Cisco IOS XE 3.18SP , Cisco Systems Inc. Cisco IOS XE 3.10E , Cisco Systems Inc. Cisco IOS 15.0EY , Cisco Systems Inc. Cisco IOS 15.0EX , Cisco Systems Inc. Cisco IOS 15.1SY , Cisco Systems Inc. Cisco IOS 15.4S , Cisco Systems Inc. Cisco IOS 15.2SY , Cisco Systems Inc. Cisco IOS 15.5S , Cisco Systems Inc. Cisco IOS 15.3SY , Cisco Systems Inc. Cisco IOS 15.6SP , Cisco Systems Inc. Cisco IOS 15.4SY , Cisco Systems Inc. Cisco IOS 15.5SY , Cisco Systems Inc. Cisco IOS 15.7M , Cisco Systems Inc. Cisco IOS 15.8M , Cisco Systems Inc. Cisco IOS 15.4T , Cisco Systems Inc. Cisco IOS 15.4M , Cisco Systems Inc. Cisco IOS 15.4CG , Cisco Systems Inc. Cisco IOS 15.5T , Cisco Systems Inc. Cisco IOS 15.4SN , Cisco Systems Inc. Cisco IOS 15.5M , Cisco Systems Inc. Cisco IOS 15.5SN , Cisco Systems Inc. Cisco IOS 15.6S , Cisco Systems Inc. Cisco IOS 15.6T , Cisco Systems Inc. Cisco IOS 15.5XB , Cisco Systems Inc. Cisco IOS 15.6SN , Cisco Systems Inc. Cisco IOS 15.3JD , Cisco Systems Inc. Cisco IOS 15.6M , Cisco Systems Inc. Cisco IOS 15.3JE , Cisco Systems Inc. Cisco IOS 15.3JF , Cisco Systems Inc. Cisco IOS 15.3JG , Cisco Systems Inc. Cisco IOS 15.3JH , Cisco Systems Inc. Cisco IOS 15.3JI , Cisco Systems Inc. Cisco IOS 15.3JJ , Cisco Systems Inc. Cisco IOS 15.2E , Cisco Systems Inc. Cisco IOS XE 16.12 , Cisco Systems Inc. Cisco IOS 15.0SE , Cisco Systems Inc. Cisco IOS 15.0EZ , Cisco Systems Inc. Cisco IOS 15.2EY , Cisco Systems Inc. Cisco IOS 15.0EJ , Cisco Systems Inc. Cisco IOS 15.2EX , Cisco Systems Inc. Cisco IOS 15.0EK , Cisco Systems Inc. Cisco IOS 15.2EB , Cisco Systems Inc. Cisco IOS 15.2EA , Cisco Systems Inc. Cisco IOS 15.2EC , Cisco Systems Inc. Cisco IOS 12.2I , Cisco Systems Inc. Cisco IOS 15.9M , Cisco Systems Inc. Cisco IOS 15.3JPI , Cisco Systems Inc. Cisco IOS 15.1SVS , Cisco Systems Inc. Cisco IOS XE 3.11E , Cisco Systems Inc. Cisco IOS 15.3JPJ , Cisco Systems Inc. Cisco IOS 15.3JK , Cisco Systems Inc. Cisco IOS 15.1SVR , Cisco Systems Inc. Cisco IOS XE \u043e\u0442 16.3 \u0434\u043e 16.5 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , Cisco Systems Inc. Cisco IOS XE \u043e\u0442 16.6 \u0434\u043e 16.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , Cisco Systems Inc. Cisco IOS 15.1SVT , Cisco Systems Inc. Cisco IOS 15.3JPK , Cisco Systems Inc. Cisco IOS XE \u043e\u0442 3.11S \u0434\u043e 3.13S \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , Cisco Systems Inc. Cisco IOS XE \u043e\u0442 17.1 \u0434\u043e 17.5 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0438\u043d\u0442\u0430\u043a\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430\u0442\u043e\u0440\u0430 \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0438 TrustSec CLI \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Cisco IOS XE \u0438 Cisco IOS, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041e\u0448\u0438\u0431\u043a\u0430 \u043f\u0440\u0438 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0438 (CWE-435)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0438\u043d\u0442\u0430\u043a\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430\u0442\u043e\u0440\u0430 \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0438 TrustSec CLI \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Cisco IOS XE \u0438 Cisco IOS \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u043c \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435\u043c \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0438 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0439 \u043a\u043e\u043c\u0430\u043d\u0434\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://nvd.nist.gov/vuln/detail/CVE-2021-34699\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-trustsec-dos-7fuXDR2",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-435",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,4)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…