BDU:2024-02735

Vulnerability from fstec - Published: 08.08.2016
VLAI Severity ?
Title
Уязвимость микропрограммного обеспечения BIOS серверных плат Server Board S1200RP, S1400FP, S1400SP, S1600JP, S2400BB, S2400EP, S2400SC, S2600CO, S2600CP, S2600GL, S2600GZ, S2600IP, W2600CR, S2600JF, S2600WP, S4600LH, S4600LT, S2600CW, S2600KP, S2600TP, S2600WT, S1200BT, связанная с недостатками контроля доступа, позволяющая нарушителю повысить свои привилегии
Description
Уязвимость микропрограммного обеспечения BIOS серверных плат Server Board S1200RP, S1400FP, S1400SP, S1600JP, S2400BB, S2400EP, S2400SC, S2600CO, S2600CP, S2600GL, S2600GZ, S2600IP, W2600CR, S2600JF, S2600WP, S4600LH, S4600LT, S2600CW, S2600KP, S2600TP, S2600WT, S1200BT связана с недостатками контроля доступа. Эксплуатация уязвимости может позволить нарушителю повысить свои привилегии
Vendor
Intel Corp.
Software Name
Intel Server Board s1200v3rpl, Intel Server Board s1200v3rpm, Intel Server Board s1200v3rpo, Intel Server Board s1200v3rps, Intel Server Board s1400fp2, Intel Server Board s1400fp4, Intel Server Board s1400sp4, Intel Server Board s1400sp2, Intel Server Board s1600jp2, Intel Server Board s1600jp4, Intel Server Board s2400bb4, Intel Server Board s2400ep2, Intel Server Board s2400ep4, Intel Server Board s2400sc2, Intel Server Board s2600co4, Intel Server Board s2600coe, Intel Server Board s2600coeioc, Intel Server Board s2600cp2, Intel Server Board s2600cp2ioc, Intel Server Board s2600cp2j, Intel Server Board s2600cp4, Intel Server Board s2600cp4ioc, Intel Server Board s2600gl, Intel Server Board s2600gz, Intel Server Board s2600ip4, Intel Server Board s2600ip4l, Intel Server Board w2600cr2, Intel Server Board w2600cr2l, Intel Server Board s2600jf, Intel Server Board s2600jfq, Intel Server Board s2600jff, Intel Server Board s2600wpq, Intel Server Board s2600wpf, Intel Server Board s4600lt2, Intel Server Board s4600lh2, Intel Server Board s2600wp, Intel Server Board s2600cw2r, Intel Server Board s2600cw2sr, Intel Server Board s2600cwtr, Intel Server Board s2600cwtsr, Intel Server Board s2600cw2s, Intel Server Board s2600cwt, Intel Server Board s2600cwts, Intel Server Board s2600cw2, Intel Server Board s2600kpfr, Intel Server Board s2600kpr, Intel Server Board s2600kptr, Intel Server Board S2600KP, Intel Server Board s2600kpf, Intel Server Board s2600tpnr, Intel Server Board s2600tpfr, Intel Server Board s2600tpr, Intel Server Board s2600tpf, Intel Server Board S2600TP, Intel Server Board s2600wtts1r, Intel Server Board s2600wt2r, Intel Server Board s2600wttr, Intel Server Board s2600wt2, Intel Server Board s2600wtt, Intel Server Board s1200btlrm, Intel Server Board s1200btlr, Intel Server Board s1200btsr, Intel Server Board s1200btl, Intel Server Board s1200bts
Software Version
до 0006 (Intel Server Board s1200v3rpl), до 0006 (Intel Server Board s1200v3rpm), до 0006 (Intel Server Board s1200v3rpo), до 0006 (Intel Server Board s1200v3rps), до 0005 (Intel Server Board s1400fp2), до 0005 (Intel Server Board s1400fp4), до 0005 (Intel Server Board s1400sp4), до 0005 (Intel Server Board s1400sp2), до 0005 (Intel Server Board s1600jp2), до 0005 (Intel Server Board s1600jp4), до 005 (Intel Server Board s2400bb4), до 005 (Intel Server Board s2400ep2), до 005 (Intel Server Board s2400ep4), до 005 (Intel Server Board s2400sc2), до 005 (Intel Server Board s2600co4), до 005 (Intel Server Board s2600coe), до 005 (Intel Server Board s2600coeioc), до 005 (Intel Server Board s2600cp2), до 005 (Intel Server Board s2600cp2ioc), до 0005 (Intel Server Board s2600cp2j), до 0005 (Intel Server Board s2600cp4), до 0005 (Intel Server Board s2600cp4ioc), до 0005 (Intel Server Board s2600gl), до 0005 (Intel Server Board s2600gz), до 0005 (Intel Server Board s2600ip4), до 0005 (Intel Server Board s2600ip4l), до 0005 (Intel Server Board w2600cr2), до 0005 (Intel Server Board w2600cr2l), до 0005 (Intel Server Board s2600jf), до 0005 (Intel Server Board s2600jfq), до 0005 (Intel Server Board s2600jff), до 0005 (Intel Server Board s2600wpq), до 0005 (Intel Server Board s2600wpf), до 0005 (Intel Server Board s4600lt2), до 0005 (Intel Server Board s4600lh2), до 0005 (Intel Server Board s2600wp), до 0018 (Intel Server Board s2600cw2r), до 0018 (Intel Server Board s2600cw2sr), до 0018 (Intel Server Board s2600cwtr), до 0018 (Intel Server Board s2600cwtsr), до 0018 (Intel Server Board s2600cw2s), до 0018 (Intel Server Board s2600cwt), до 0018 (Intel Server Board s2600cwts), до 0018 (Intel Server Board s2600cw2), до 0018 (Intel Server Board s2600kpfr), до 0018 (Intel Server Board s2600kpr), до 0018 (Intel Server Board s2600kptr), до 0018 (Intel Server Board S2600KP), до 0018 (Intel Server Board s2600kpf), до 0018 (Intel Server Board s2600tpnr), до 0018 (Intel Server Board s2600tpfr), до 0018 (Intel Server Board s2600tpr), до 0018 (Intel Server Board s2600tpf), до 0018 (Intel Server Board S2600TP), до 0018 (Intel Server Board s2600wtts1r), до 0018 (Intel Server Board s2600wt2r), до 0018 (Intel Server Board s2600wttr), до 0018 (Intel Server Board s2600wt2), до 0018 (Intel Server Board s2600wtt), до 0044 (Intel Server Board s1200btlrm), до 0044 (Intel Server Board s1200btlr), до 0044 (Intel Server Board s1200btsr), до 0044 (Intel Server Board s1200btl), до 0044 (Intel Server Board s1200bts)
Possible Mitigations
Использование рекомендаций: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html
Reference
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html https://vuldb.com/pl/?id.228927
CWE
CWE-266, CWE-284

{
  "CVSS 2.0": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
  "CVSS 3.0": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Intel Corp.",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 0006 (Intel Server Board s1200v3rpl), \u0434\u043e 0006 (Intel Server Board s1200v3rpm), \u0434\u043e 0006 (Intel Server Board s1200v3rpo), \u0434\u043e 0006 (Intel Server Board s1200v3rps), \u0434\u043e 0005 (Intel Server Board s1400fp2), \u0434\u043e 0005 (Intel Server Board s1400fp4), \u0434\u043e 0005 (Intel Server Board s1400sp4), \u0434\u043e 0005 (Intel Server Board s1400sp2), \u0434\u043e 0005 (Intel Server Board s1600jp2), \u0434\u043e 0005 (Intel Server Board s1600jp4), \u0434\u043e 005 (Intel Server Board s2400bb4), \u0434\u043e 005 (Intel Server Board s2400ep2), \u0434\u043e 005 (Intel Server Board s2400ep4), \u0434\u043e 005 (Intel Server Board s2400sc2), \u0434\u043e 005 (Intel Server Board s2600co4), \u0434\u043e 005 (Intel Server Board s2600coe), \u0434\u043e 005 (Intel Server Board s2600coeioc), \u0434\u043e 005 (Intel Server Board s2600cp2), \u0434\u043e 005 (Intel Server Board s2600cp2ioc), \u0434\u043e 0005 (Intel Server Board s2600cp2j), \u0434\u043e 0005 (Intel Server Board s2600cp4), \u0434\u043e 0005 (Intel Server Board s2600cp4ioc), \u0434\u043e 0005 (Intel Server Board s2600gl), \u0434\u043e 0005 (Intel Server Board s2600gz), \u0434\u043e 0005 (Intel Server Board s2600ip4), \u0434\u043e 0005 (Intel Server Board s2600ip4l), \u0434\u043e 0005 (Intel Server Board w2600cr2), \u0434\u043e 0005 (Intel Server Board w2600cr2l), \u0434\u043e 0005 (Intel Server Board s2600jf), \u0434\u043e 0005 (Intel Server Board s2600jfq), \u0434\u043e 0005 (Intel Server Board s2600jff), \u0434\u043e 0005 (Intel Server Board s2600wpq), \u0434\u043e 0005 (Intel Server Board s2600wpf), \u0434\u043e 0005 (Intel Server Board s4600lt2), \u0434\u043e 0005 (Intel Server Board s4600lh2), \u0434\u043e 0005 (Intel Server Board s2600wp), \u0434\u043e 0018 (Intel Server Board s2600cw2r), \u0434\u043e 0018 (Intel Server Board s2600cw2sr), \u0434\u043e 0018 (Intel Server Board s2600cwtr), \u0434\u043e 0018 (Intel Server Board s2600cwtsr), \u0434\u043e 0018 (Intel Server Board s2600cw2s), \u0434\u043e 0018 (Intel Server Board s2600cwt), \u0434\u043e 0018 (Intel Server Board s2600cwts), \u0434\u043e 0018 (Intel Server Board s2600cw2), \u0434\u043e 0018 (Intel Server Board s2600kpfr), \u0434\u043e 0018 (Intel Server Board s2600kpr), \u0434\u043e 0018 (Intel Server Board s2600kptr), \u0434\u043e 0018 (Intel Server Board S2600KP), \u0434\u043e 0018 (Intel Server Board s2600kpf), \u0434\u043e 0018 (Intel Server Board s2600tpnr), \u0434\u043e 0018 (Intel Server Board s2600tpfr), \u0434\u043e 0018 (Intel Server Board s2600tpr), \u0434\u043e 0018 (Intel Server Board s2600tpf), \u0434\u043e 0018 (Intel Server Board S2600TP), \u0434\u043e 0018 (Intel Server Board s2600wtts1r), \u0434\u043e 0018 (Intel Server Board s2600wt2r), \u0434\u043e 0018 (Intel Server Board s2600wttr), \u0434\u043e 0018 (Intel Server Board s2600wt2), \u0434\u043e 0018 (Intel Server Board s2600wtt), \u0434\u043e 0044 (Intel Server Board s1200btlrm), \u0434\u043e 0044 (Intel Server Board s1200btlr), \u0434\u043e 0044 (Intel Server Board s1200btsr), \u0434\u043e 0044 (Intel Server Board s1200btl), \u0434\u043e 0044 (Intel Server Board s1200bts)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "08.08.2016",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "08.04.2024",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "08.04.2024",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-02735",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-30768",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Intel Server Board s1200v3rpl, Intel Server Board s1200v3rpm, Intel Server Board s1200v3rpo, Intel Server Board s1200v3rps, Intel Server Board s1400fp2, Intel Server Board s1400fp4, Intel Server Board s1400sp4, Intel Server Board s1400sp2, Intel Server Board s1600jp2, Intel Server Board s1600jp4, Intel Server Board s2400bb4, Intel Server Board s2400ep2, Intel Server Board s2400ep4, Intel Server Board s2400sc2, Intel Server Board s2600co4, Intel Server Board s2600coe, Intel Server Board s2600coeioc, Intel Server Board s2600cp2, Intel Server Board s2600cp2ioc, Intel Server Board s2600cp2j, Intel Server Board s2600cp4, Intel Server Board s2600cp4ioc, Intel Server Board s2600gl, Intel Server Board s2600gz, Intel Server Board s2600ip4, Intel Server Board s2600ip4l, Intel Server Board w2600cr2, Intel Server Board w2600cr2l, Intel Server Board s2600jf, Intel Server Board s2600jfq, Intel Server Board s2600jff, Intel Server Board s2600wpq, Intel Server Board s2600wpf, Intel Server Board s4600lt2, Intel Server Board s4600lh2, Intel Server Board s2600wp, Intel Server Board s2600cw2r, Intel Server Board s2600cw2sr, Intel Server Board s2600cwtr, Intel Server Board s2600cwtsr, Intel Server Board s2600cw2s, Intel Server Board s2600cwt, Intel Server Board s2600cwts, Intel Server Board s2600cw2, Intel Server Board s2600kpfr, Intel Server Board s2600kpr, Intel Server Board s2600kptr, Intel Server Board S2600KP, Intel Server Board s2600kpf, Intel Server Board s2600tpnr, Intel Server Board s2600tpfr, Intel Server Board s2600tpr, Intel Server Board s2600tpf, Intel Server Board S2600TP, Intel Server Board s2600wtts1r, Intel Server Board s2600wt2r, Intel Server Board s2600wttr, Intel Server Board s2600wt2, Intel Server Board s2600wtt, Intel Server Board s1200btlrm, Intel Server Board s1200btlr, Intel Server Board s1200btsr, Intel Server Board s1200btl, Intel Server Board s1200bts",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f BIOS \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u044b\u0445 \u043f\u043b\u0430\u0442 Server Board S1200RP, S1400FP, S1400SP, S1600JP, S2400BB, S2400EP, S2400SC, S2600CO, S2600CP, S2600GL, S2600GZ, S2600IP, W2600CR, S2600JF, S2600WP, S4600LH, S4600LT, S2600CW, S2600KP, S2600TP, S2600WT, S1200BT, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0435 \u043f\u0440\u0438\u0441\u0432\u0430\u0438\u0432\u0430\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 (CWE-266), \u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (CWE-284)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f BIOS \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u044b\u0445 \u043f\u043b\u0430\u0442 Server Board S1200RP, S1400FP, S1400SP, S1600JP, S2400BB, S2400EP, S2400SC, S2600CO, S2600CP, S2600GL, S2600GZ, S2600IP, W2600CR, S2600JF, S2600WP, S4600LH, S4600LT, S2600CW, S2600KP, S2600TP, S2600WT, S1200BT \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html\nhttps://vuldb.com/pl/?id.228927",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434, \u0421\u0423\u0411\u0414",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-266, CWE-284",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,7)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…