Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-0711 (GCVE-0-2013-0711)
Vulnerability from cvelistv5 – Published: 2013-03-20 18:00 – Updated: 2024-08-06 14:33- n/a
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:33:05.463Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN45545972/995359/index.html"
},
{
"name": "JVN#45545972",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN45545972/index.html"
},
{
"name": "JVNDB-2013-000018",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000018"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-03-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to cause a denial of service (daemon outage) via a crafted authentication request."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-05-21T09:00:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://jvn.jp/en/jp/JVN45545972/995359/index.html"
},
{
"name": "JVN#45545972",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN45545972/index.html"
},
{
"name": "JVNDB-2013-000018",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000018"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-0711",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to cause a denial of service (daemon outage) via a crafted authentication request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01"
},
{
"name": "http://jvn.jp/en/jp/JVN45545972/995359/index.html",
"refsource": "MISC",
"url": "http://jvn.jp/en/jp/JVN45545972/995359/index.html"
},
{
"name": "JVN#45545972",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN45545972/index.html"
},
{
"name": "JVNDB-2013-000018",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000018"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-0711",
"datePublished": "2013-03-20T18:00:00",
"dateReserved": "2012-12-28T00:00:00",
"dateUpdated": "2024-08-06T14:33:05.463Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2013-0711\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2013-03-20T18:55:01.700\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to cause a denial of service (daemon outage) via a crafted authentication request.\"},{\"lang\":\"es\",\"value\":\"IPSSH (tambi\u00e9n conocido servidor SSH) en Wind River VxWorks v6.5 hasta v6.9 permite a atacantes remotos causar una denegaci\u00f3n de servicios (parada del demonio) a trav\u00e9s de una petici\u00f3n de autenticaci\u00f3n manipulada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:windriver:vxworks:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AB372D3-5FE7-4432-B1B1-00F0D1039459\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:windriver:vxworks:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3219535A-64F3-4106-8652-7DD72808AC3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:windriver:vxworks:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D930A712-C6C8-4251-8FB5-78E65DF2DFBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:windriver:vxworks:6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F36DA7F-6593-4327-A104-2F8829F2ED32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:windriver:vxworks:6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01004955-97D1-4F7E-80D4-4B1509945FBF\"}]}]}],\"references\":[{\"url\":\"http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvn.jp/en/jp/JVN45545972/995359/index.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvn.jp/en/jp/JVN45545972/index.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2013-000018\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvn.jp/en/jp/JVN45545972/995359/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvn.jp/en/jp/JVN45545972/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2013-000018\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2013-AVI-218
Vulnerability from certfr_avis - Published: 2013-04-04 - Updated: 2013-04-04
De multiples vulnérabilités ont été corrigées dans le système SCADA Wind River VxWorks. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Produits Wind River utilisant VxWorks version 5.5 à 6.9
| Vendor | Product | Description |
|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eProduits Wind River utilisant VxWorks version 5.5 \u00e0 6.9\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-0715",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0715"
},
{
"name": "CVE-2013-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0714"
},
{
"name": "CVE-2013-0713",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0713"
},
{
"name": "CVE-2013-0711",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0711"
},
{
"name": "CVE-2013-0716",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0716"
},
{
"name": "CVE-2013-0712",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0712"
}
],
"initial_release_date": "2013-04-04T00:00:00",
"last_revision_date": "2013-04-04T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 JVN JVNDB-2013-000021 du 01 avril 2013",
"url": "http://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000021.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Wind River ICSA-13-091-01 du 01 avril 2013",
"url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-091-01.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 JVN JVNDB-2013-000019 du 01 avril 2013",
"url": "http://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000019.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 JVN JVNDB-2013-000020 du 01 avril 2013",
"url": "http://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000020.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 JVN JVNDB-2013-000018 du 01 avril 2013",
"url": "http://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000018.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 JVN JVNDB-2013-000023 du 01 avril 2013",
"url": "http://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000023.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 JVN JVNDB-2013-000022 du 01 avril 2013",
"url": "http://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000022.html"
}
],
"reference": "CERTA-2013-AVI-218",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-04-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le syst\u00e8me SCADA\n\u003cspan class=\"textit\"\u003eWind River VxWorks\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un\nd\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le syst\u00e8me SCADA Wind River VxWorks",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wind River ICSA-13-091-01 du 01 avril 2013",
"url": null
}
]
}
ICSA-13-091-01
Vulnerability from csaf_cisa - Published: 2013-01-03 07:00 - Updated: 2025-06-06 16:05Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-13-091-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2013/icsa-13-091-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-13-091-01 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-091-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
}
],
"title": "Wind River VxWorks SSH and Web Server and General Electric D20MX",
"tracking": {
"current_release_date": "2025-06-06T16:05:33.422392Z",
"generator": {
"date": "2025-06-06T16:05:33.422281Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-13-091-01",
"initial_release_date": "2013-01-03T07:00:00.000000Z",
"revision_history": [
{
"date": "2013-01-03T07:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
},
{
"date": "2025-06-06T16:05:33.422392Z",
"legacy_version": "CSAF Conversion",
"number": "2",
"summary": "Advisory converted into a CSAF"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=5.5|\u003c=6.9",
"product": {
"name": "Wind River; GE VxWorks: \u003e=5.5|\u003c=6.9",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "VxWorks"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=6.5|\u003c=6.9",
"product": {
"name": "Wind River; GE VxWorks: \u003e=6.5|\u003c=6.9",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "VxWorks"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=v1.0|\u003c=1.6.2",
"product": {
"name": "Wind River; GE GE D20MX: \u003e=v1.0|\u003c=1.6.2",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "GE D20MX"
}
],
"category": "vendor",
"name": "Wind River; GE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-0711",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to cause a denial of service (daemon outage) via a crafted authentication request.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "According to Wind River, software patches for these vulnerabilities are available for all affected VxWorks versions. Users interested in obtaining these patches should contact Wind River technical support for assistance. (http://windriver.com/support/ )",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "GE reports the vulnerabilities do not impact Version 1.7 or newer. To upgrade a D20MX to Version 1.8, users should follow the upgrade procedures: \"TN0110 D20MX v1.8+ Upgrade Procedure\" or \"TN0111 D20MX v1.8+ Upgrade over Serial Procedure\"",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "These are available for download from the tech support website: (http://sc.ge.com/*SASTechSupport) \u003e Substation Automation \u003e D20MX \u003e Firmware v1.80 \u003e Documentation.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "http://sc.ge.com/*SASTechSupport"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2013-0713",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote authenticated users to cause a denial of service (daemon outage) via a crafted pty request.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "According to Wind River, software patches for these vulnerabilities are available for all affected VxWorks versions. Users interested in obtaining these patches should contact Wind River technical support for assistance. (http://windriver.com/support/ )",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "GE reports the vulnerabilities do not impact Version 1.7 or newer. To upgrade a D20MX to Version 1.8, users should follow the upgrade procedures: \"TN0110 D20MX v1.8+ Upgrade Procedure\" or \"TN0111 D20MX v1.8+ Upgrade over Serial Procedure\"",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "These are available for download from the tech support website: (http://sc.ge.com/*SASTechSupport) \u003e Substation Automation \u003e D20MX \u003e Firmware v1.80 \u003e Documentation.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "http://sc.ge.com/*SASTechSupport"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2013-0714",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to execute arbitrary code or cause a denial of service (daemon hang) via a crafted public-key authentication request.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "According to Wind River, software patches for these vulnerabilities are available for all affected VxWorks versions. Users interested in obtaining these patches should contact Wind River technical support for assistance. (http://windriver.com/support/ )",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "GE reports the vulnerabilities do not impact Version 1.7 or newer. To upgrade a D20MX to Version 1.8, users should follow the upgrade procedures: \"TN0110 D20MX v1.8+ Upgrade Procedure\" or \"TN0111 D20MX v1.8+ Upgrade over Serial Procedure\"",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "These are available for download from the tech support website: (http://sc.ge.com/*SASTechSupport) \u003e Substation Automation \u003e D20MX \u003e Firmware v1.80 \u003e Documentation.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "http://sc.ge.com/*SASTechSupport"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2013-0715",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The WebCLI component in Wind River VxWorks 5.5 through 6.9 allows remote authenticated users to cause a denial of service (CLI session crash) via a crafted command string.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "According to Wind River, software patches for these vulnerabilities are available for all affected VxWorks versions. Users interested in obtaining these patches should contact Wind River technical support for assistance. (http://windriver.com/support/ )",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "GE reports the vulnerabilities do not impact Version 1.7 or newer. To upgrade a D20MX to Version 1.8, users should follow the upgrade procedures: \"TN0110 D20MX v1.8+ Upgrade Procedure\" or \"TN0111 D20MX v1.8+ Upgrade over Serial Procedure\"",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "These are available for download from the tech support website: (http://sc.ge.com/*SASTechSupport) \u003e Substation Automation \u003e D20MX \u003e Firmware v1.80 \u003e Documentation.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "http://sc.ge.com/*SASTechSupport"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2013-0716",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The web server in Wind River VxWorks 5.5 through 6.9 allows remote attackers to cause a denial of service (daemon crash) via a crafted URI.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "According to Wind River, software patches for these vulnerabilities are available for all affected VxWorks versions. Users interested in obtaining these patches should contact Wind River technical support for assistance. (http://windriver.com/support/ )",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "GE reports the vulnerabilities do not impact Version 1.7 or newer. To upgrade a D20MX to Version 1.8, users should follow the upgrade procedures: \"TN0110 D20MX v1.8+ Upgrade Procedure\" or \"TN0111 D20MX v1.8+ Upgrade over Serial Procedure\"",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "These are available for download from the tech support website: (http://sc.ge.com/*SASTechSupport) \u003e Substation Automation \u003e D20MX \u003e Firmware v1.80 \u003e Documentation.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "http://sc.ge.com/*SASTechSupport"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
}
]
}
GSD-2013-0711
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2013-0711",
"description": "IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to cause a denial of service (daemon outage) via a crafted authentication request.",
"id": "GSD-2013-0711"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-0711"
],
"details": "IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to cause a denial of service (daemon outage) via a crafted authentication request.",
"id": "GSD-2013-0711",
"modified": "2023-12-13T01:22:14.836201Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-0711",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to cause a denial of service (daemon outage) via a crafted authentication request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01"
},
{
"name": "http://jvn.jp/en/jp/JVN45545972/995359/index.html",
"refsource": "MISC",
"url": "http://jvn.jp/en/jp/JVN45545972/995359/index.html"
},
{
"name": "JVN#45545972",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN45545972/index.html"
},
{
"name": "JVNDB-2013-000018",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000018"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:windriver:vxworks:6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:windriver:vxworks:6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:windriver:vxworks:6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:windriver:vxworks:6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:windriver:vxworks:6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-0711"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to cause a denial of service (daemon outage) via a crafted authentication request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://jvn.jp/en/jp/JVN45545972/995359/index.html",
"refsource": "MISC",
"tags": [],
"url": "http://jvn.jp/en/jp/JVN45545972/995359/index.html"
},
{
"name": "JVN#45545972",
"refsource": "JVN",
"tags": [],
"url": "http://jvn.jp/en/jp/JVN45545972/index.html"
},
{
"name": "JVNDB-2013-000018",
"refsource": "JVNDB",
"tags": [],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000018"
},
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01",
"refsource": "MISC",
"tags": [],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2013-05-21T03:23Z",
"publishedDate": "2013-03-20T18:55Z"
}
}
}
JVNDB-2013-000018
Vulnerability from jvndb - Published: 2013-03-18 14:33 - Updated:2013-06-25 17:54| Type | URL | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000018.html",
"dc:date": "2013-06-25T17:54+09:00",
"dcterms:issued": "2013-03-18T14:33+09:00",
"dcterms:modified": "2013-06-25T17:54+09:00",
"description": "The SSH server (IPSSH) implementation in VxWorks contains a denial-of-service (DoS) vulnerability.\r\n\r\nThe SSH server (IPSSH) implementation in VxWorks contains a denial-of-service (DoS) vulnerability due to an issue in processing authentication requests.\r\n\r\nHisashi Kojima and Masahiro Nakada of Fujitsu Laboratories Ltd. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000018.html",
"sec:cpe": {
"#text": "cpe:/o:windriver:vxworks",
"@product": "VxWorks",
"@vendor": "Wind River Systems",
"@version": "2.2"
},
"sec:cvss": {
"@score": "7.8",
"@severity": "High",
"@type": "Base",
"@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2013-000018",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN45545972/index.html",
"@id": "JVN#45545972",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0711",
"@id": "CVE-2013-0711",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0711",
"@id": "CVE-2013-0711",
"@source": "NVD"
},
{
"#text": "http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01",
"@id": "ICSA-13-091-01",
"@source": "ICS-CERT ADVISORY"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-noinfo",
"@title": "No Mapping(CWE-noinfo)"
}
],
"title": "VxWorks SSH server (IPSSH) denial-of-service (DoS) vulnerability"
}
GHSA-WX95-55P4-5W59
Vulnerability from github – Published: 2022-05-17 05:09 – Updated: 2022-05-17 05:09IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to cause a denial of service (daemon outage) via a crafted authentication request.
{
"affected": [],
"aliases": [
"CVE-2013-0711"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2013-03-20T18:55:00Z",
"severity": "HIGH"
},
"details": "IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to cause a denial of service (daemon outage) via a crafted authentication request.",
"id": "GHSA-wx95-55p4-5w59",
"modified": "2022-05-17T05:09:34Z",
"published": "2022-05-17T05:09:34Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0711"
},
{
"type": "WEB",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01"
},
{
"type": "WEB",
"url": "http://jvn.jp/en/jp/JVN45545972/995359/index.html"
},
{
"type": "WEB",
"url": "http://jvn.jp/en/jp/JVN45545972/index.html"
},
{
"type": "WEB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000018"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2013-0711
Vulnerability from fkie_nvd - Published: 2013-03-20 18:55 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01 | ||
| vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN45545972/995359/index.html | ||
| vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN45545972/index.html | ||
| vultures@jpcert.or.jp | http://jvndb.jvn.jp/jvndb/JVNDB-2013-000018 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN45545972/995359/index.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN45545972/index.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/jvndb/JVNDB-2013-000018 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:windriver:vxworks:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9AB372D3-5FE7-4432-B1B1-00F0D1039459",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:windriver:vxworks:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3219535A-64F3-4106-8652-7DD72808AC3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:windriver:vxworks:6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D930A712-C6C8-4251-8FB5-78E65DF2DFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:windriver:vxworks:6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3F36DA7F-6593-4327-A104-2F8829F2ED32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:windriver:vxworks:6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01004955-97D1-4F7E-80D4-4B1509945FBF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to cause a denial of service (daemon outage) via a crafted authentication request."
},
{
"lang": "es",
"value": "IPSSH (tambi\u00e9n conocido servidor SSH) en Wind River VxWorks v6.5 hasta v6.9 permite a atacantes remotos causar una denegaci\u00f3n de servicios (parada del demonio) a trav\u00e9s de una petici\u00f3n de autenticaci\u00f3n manipulada."
}
],
"id": "CVE-2013-0711",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-03-20T18:55:01.700",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN45545972/995359/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN45545972/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000018"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-091-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN45545972/995359/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN45545972/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000018"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
VAR-201303-0247
Vulnerability from variot - Updated: 2025-04-11 20:47IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to cause a denial of service (daemon outage) via a crafted authentication request. The SSH server (IPSSH) implementation in VxWorks contains a denial-of-service (DoS) vulnerability. The SSH server (IPSSH) implementation in VxWorks contains a denial-of-service (DoS) vulnerability due to an issue in processing authentication requests. Hisashi Kojima and Masahiro Nakada of Fujitsu Laboratories Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.SSH access may become unavailable until the next reboot as a result of processing an authentication request. VxWorks is an embedded real-time operating system. VxWorks is prone to a denial-of-service vulnerability. VxWorks 6.5 through 6.9 are vulnerable; other versions may also be affected. Vendor affected: TP-Link (http://tp-link.com)
Products affected: * All TP-Link VxWorks-based devices (confirmed by vendor) * All "2-series" switches (confirmed by vendor) * TL-SG2008 semi-managed switch (confirmed by vendor) * TL-SG2216 semi-managed switch (confirmed by vendor) * TL-SG2424 semi-managed switch (confirmed by vendor) * TL-SG2424P semi-managed switch (confirmed by vendor) * TL-SG2452 semi-managed switch (confirmed by vendor)
Vulnerabilities: * All previously-reported VxWorks vulnerabilities from 6.6.0 on; at the very least: * CVE-2013-0716 (confirmed by vendor) * CVE-2013-0715 (confirmed by vendor) * CVE-2013-0714 (confirmed by vendor) * CVE-2013-0713 (confirmed by vendor) * CVE-2013-0712 (confirmed by vendor) * CVE-2013-0711 (confirmed by vendor) * CVE-2010-2967 (confirmed by vendor) * CVE-2010-2966 (confirmed by vendor) * CVE-2008-2476 (confirmed by vendor) * SSLv2 is available and cannot be disabled unless HTTPS is completely disabled (allows downgrade attacks) (confirmed by vendor) * SSL (v2, v3) offers insecure cipher suites and HMACs which cannot be disabled (allows downgrade attacks) (confirmed by vendor)
Design flaws: * Telnet is available and cannot be disabled (confirmed by vendor) * SSHv1 enabled by default if SSH is enabled (confirmed by vendor)
Vendor response: TP-Link are not convinced that these flaws should be repaired.
TP-Link's Internet presence -- or at least DNS -- is available only intermittently. Most emails bounced. Lost contact with vendor, but did confirm that development lead is now on holiday and will not return for at least a week.
Initial vendor reaction was to recommend purchase of "3-series" switches. Vendor did not offer reasons why "3-series" switches would be more secure, apart from lack of telnet service. Vendor confirmed that no development time can be allocated to securing "2-series" product and all focus has shifted to newer products.
(TL-SG2008 first product availability July 2014...)
Vendor deeply confused about security of DES/3DES, MD5, claimed that all security is relative. ("...[E]ven SHA-1 can be cracked, they just have different security level.")
Fix availability: None.
Work-arounds advised: None possible. Remove products from network
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201303-0247",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vxworks",
"scope": "eq",
"trust": 1.6,
"vendor": "windriver",
"version": "6.9"
},
{
"model": "vxworks",
"scope": "eq",
"trust": 1.6,
"vendor": "windriver",
"version": "6.7"
},
{
"model": "vxworks",
"scope": "eq",
"trust": 1.6,
"vendor": "windriver",
"version": "6.8"
},
{
"model": "vxworks",
"scope": "eq",
"trust": 1.6,
"vendor": "windriver",
"version": "6.6"
},
{
"model": "vxworks",
"scope": "eq",
"trust": 1.6,
"vendor": "windriver",
"version": "6.5"
},
{
"model": "river systems vxworks through",
"scope": "eq",
"trust": 1.2,
"vendor": "wind",
"version": "6.56.9"
},
{
"model": "vxworks",
"scope": "eq",
"trust": 0.8,
"vendor": "wind river",
"version": "6.5 through 6.9"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "vxworks",
"version": "6.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "vxworks",
"version": "6.6"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "vxworks",
"version": "6.7"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "vxworks",
"version": "6.8"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "vxworks",
"version": "6.9"
}
],
"sources": [
{
"db": "IVD",
"id": "c403bd44-1f2f-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "0961e59c-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-01996"
},
{
"db": "CNVD",
"id": "CNVD-2013-02191"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000018"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-405"
},
{
"db": "NVD",
"id": "CVE-2013-0711"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:windriver:vxworks",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-000018"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Hisashi Kojima and Masahiro Nakada of Fujitsu Laboratories Ltd",
"sources": [
{
"db": "BID",
"id": "58638"
}
],
"trust": 0.3
},
"cve": "CVE-2013-0711",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2013-0711",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2013-000018",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2013-01996",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "CNVD-2013-02191",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "c403bd44-1f2f-11e6-abef-000c29c66e3d",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "0961e59c-2353-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.9 [IVD]"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2013-0711",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2013-000018",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2013-01996",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2013-02191",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201303-405",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "c403bd44-1f2f-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "0961e59c-2353-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "c403bd44-1f2f-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "0961e59c-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-01996"
},
{
"db": "CNVD",
"id": "CNVD-2013-02191"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000018"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-405"
},
{
"db": "NVD",
"id": "CVE-2013-0711"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to cause a denial of service (daemon outage) via a crafted authentication request. The SSH server (IPSSH) implementation in VxWorks contains a denial-of-service (DoS) vulnerability. The SSH server (IPSSH) implementation in VxWorks contains a denial-of-service (DoS) vulnerability due to an issue in processing authentication requests. Hisashi Kojima and Masahiro Nakada of Fujitsu Laboratories Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.SSH access may become unavailable until the next reboot as a result of processing an authentication request. VxWorks is an embedded real-time operating system. VxWorks is prone to a denial-of-service vulnerability. \nVxWorks 6.5 through 6.9 are vulnerable; other versions may also be affected. Vendor affected: TP-Link (http://tp-link.com)\n\nProducts affected:\n * All TP-Link VxWorks-based devices (confirmed by vendor)\n * All \"2-series\" switches (confirmed by vendor)\n * TL-SG2008 semi-managed switch (confirmed by vendor)\n * TL-SG2216 semi-managed switch (confirmed by vendor)\n * TL-SG2424 semi-managed switch (confirmed by vendor)\n * TL-SG2424P semi-managed switch (confirmed by vendor)\n * TL-SG2452 semi-managed switch (confirmed by vendor)\n\nVulnerabilities:\n * All previously-reported VxWorks vulnerabilities from 6.6.0 on;\n at the very least:\n * CVE-2013-0716 (confirmed by vendor)\n * CVE-2013-0715 (confirmed by vendor)\n * CVE-2013-0714 (confirmed by vendor)\n * CVE-2013-0713 (confirmed by vendor)\n * CVE-2013-0712 (confirmed by vendor)\n * CVE-2013-0711 (confirmed by vendor)\n * CVE-2010-2967 (confirmed by vendor)\n * CVE-2010-2966 (confirmed by vendor)\n * CVE-2008-2476 (confirmed by vendor)\n * SSLv2 is available and cannot be disabled unless HTTPS is\n completely disabled (allows downgrade attacks)\n (confirmed by vendor)\n * SSL (v2, v3) offers insecure cipher suites and HMACs which cannot\n be disabled (allows downgrade attacks)\n (confirmed by vendor)\n\nDesign flaws:\n * Telnet is available and cannot be disabled (confirmed by vendor)\n * SSHv1 enabled by default if SSH is enabled (confirmed by vendor)\n\nVendor response:\n TP-Link are not convinced that these flaws should be repaired. \n\n TP-Link\u0027s Internet presence -- or at least DNS -- is available only\n intermittently. Most emails bounced. Lost contact with vendor, but\n did confirm that development lead is now on holiday and will not\n return for at least a week. \n\n Initial vendor reaction was to recommend purchase of \"3-series\"\n switches. Vendor did not offer reasons why \"3-series\" switches would\n be more secure, apart from lack of telnet service. Vendor confirmed\n that no development time can be allocated to securing \"2-series\"\n product and all focus has shifted to newer products. \n\n (TL-SG2008 first product availability July 2014...)\n\n Vendor deeply confused about security of DES/3DES, MD5, claimed that\n all security is relative. (\"...[E]ven SHA-1 can be cracked, they just\n have different security level.\")\n\nFix availability:\n None. \n\nWork-arounds advised:\n None possible. Remove products from network",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0711"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000018"
},
{
"db": "CNVD",
"id": "CNVD-2013-01996"
},
{
"db": "CNVD",
"id": "CNVD-2013-02191"
},
{
"db": "BID",
"id": "58638"
},
{
"db": "IVD",
"id": "c403bd44-1f2f-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "0961e59c-2353-11e6-abef-000c29c66e3d"
},
{
"db": "PACKETSTORM",
"id": "128512"
}
],
"trust": 3.42
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-0711",
"trust": 4.4
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000018",
"trust": 3.0
},
{
"db": "JVN",
"id": "JVN45545972",
"trust": 3.0
},
{
"db": "ICS CERT",
"id": "ICSA-13-091-01",
"trust": 1.8
},
{
"db": "CNNVD",
"id": "CNNVD-201303-405",
"trust": 1.0
},
{
"db": "CNVD",
"id": "CNVD-2013-01996",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2013-02191",
"trust": 0.8
},
{
"db": "SECUNIA",
"id": "52671",
"trust": 0.6
},
{
"db": "JVN",
"id": "JVN#45545972",
"trust": 0.6
},
{
"db": "BID",
"id": "58638",
"trust": 0.3
},
{
"db": "IVD",
"id": "C403BD44-1F2F-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "IVD",
"id": "0961E59C-2353-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "128512",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "c403bd44-1f2f-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "0961e59c-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-01996"
},
{
"db": "CNVD",
"id": "CNVD-2013-02191"
},
{
"db": "BID",
"id": "58638"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000018"
},
{
"db": "PACKETSTORM",
"id": "128512"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-405"
},
{
"db": "NVD",
"id": "CVE-2013-0711"
}
]
},
"id": "VAR-201303-0247",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "c403bd44-1f2f-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "0961e59c-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-01996"
},
{
"db": "CNVD",
"id": "CNVD-2013-02191"
}
],
"trust": 2.10988144
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
},
{
"category": [
"IoT",
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "IVD",
"id": "c403bd44-1f2f-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "0961e59c-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-01996"
},
{
"db": "CNVD",
"id": "CNVD-2013-02191"
}
]
},
"last_update_date": "2025-04-11T20:47:45.197000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Information from Wind River Systems",
"trust": 0.8,
"url": "http://jvn.jp/en/jp/JVN45545972/995359/index.html"
},
{
"title": "Patch for VxWorks SSH server (IPSSH) Denial of Service Vulnerability (CNVD-2013-01996)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/32969"
},
{
"title": "Patch for VxWorks WebCLI Remote Denial of Service Vulnerability (CNVD-2013-02191)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/33010"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-01996"
},
{
"db": "CNVD",
"id": "CNVD-2013-02191"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000018"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0711"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "http://jvn.jp/en/jp/jvn45545972/index.html"
},
{
"trust": 1.8,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-13-091-01"
},
{
"trust": 1.6,
"url": "http://jvndb.jvn.jp/jvndb/jvndb-2013-000018"
},
{
"trust": 1.6,
"url": "http://jvn.jp/en/jp/jvn45545972/995359/index.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0711"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0711"
},
{
"trust": 0.6,
"url": "http://jvndb.jvn.jp/en/contents/2013/jvndb-2013-000018.html"
},
{
"trust": 0.6,
"url": "http://jvn.jp/en/jp/jvn45545972/"
},
{
"trust": 0.6,
"url": "http://secunia.com/advisories/52671/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-2966"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0713"
},
{
"trust": 0.1,
"url": "http://tp-link.com)"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0715"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-2967"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2476"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0716"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0712"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0711"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0714"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-01996"
},
{
"db": "CNVD",
"id": "CNVD-2013-02191"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000018"
},
{
"db": "PACKETSTORM",
"id": "128512"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-405"
},
{
"db": "NVD",
"id": "CVE-2013-0711"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "c403bd44-1f2f-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "0961e59c-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-01996"
},
{
"db": "CNVD",
"id": "CNVD-2013-02191"
},
{
"db": "BID",
"id": "58638"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000018"
},
{
"db": "PACKETSTORM",
"id": "128512"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-405"
},
{
"db": "NVD",
"id": "CVE-2013-0711"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-03-25T00:00:00",
"db": "IVD",
"id": "c403bd44-1f2f-11e6-abef-000c29c66e3d"
},
{
"date": "2013-03-27T00:00:00",
"db": "IVD",
"id": "0961e59c-2353-11e6-abef-000c29c66e3d"
},
{
"date": "2013-03-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-01996"
},
{
"date": "2013-03-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-02191"
},
{
"date": "2013-03-18T00:00:00",
"db": "BID",
"id": "58638"
},
{
"date": "2013-03-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-000018"
},
{
"date": "2014-10-01T10:11:11",
"db": "PACKETSTORM",
"id": "128512"
},
{
"date": "2013-03-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201303-405"
},
{
"date": "2013-03-20T18:55:01.700000",
"db": "NVD",
"id": "CVE-2013-0711"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-03-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-01996"
},
{
"date": "2013-05-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-02191"
},
{
"date": "2013-04-02T06:47:00",
"db": "BID",
"id": "58638"
},
{
"date": "2013-06-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-000018"
},
{
"date": "2013-03-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201303-405"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2013-0711"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201303-405"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "VxWorks SSH server (IPSSH) denial-of-service (DoS) vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-000018"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input validation",
"sources": [
{
"db": "IVD",
"id": "c403bd44-1f2f-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "0961e59c-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-405"
}
],
"trust": 1.0
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.