VAR-200205-0116
Vulnerability from variot - Updated: 2025-04-03 22:33Compaq Intel PRO/Wireless 2011B LAN USB Device Driver 1.5.16.0 through 1.5.18.0 stores the 128-bit WEP (Wired Equivalent Privacy) key in plaintext in a registry key with weak permissions, which allows local users to decrypt network traffic by reading the WEP key from the registry key. Compaq's Intel PRO/Wireless 2011B LAN USB Device driver allows a user to connect a number of supported WLAN Ethernet devices via a USB port. It runs on Microsoft Windows platforms that support USB, such as Windows 98/ME/2000. The Compaq Intel PRO/Wireless 2011B LAN USB Device driver may disclose sensitive information to local attackers. The WEP Key may be used by the local attacker to decrypt all network traffic encapsulated in WEP
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200205-0116",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "pro wireless 2011b lan usb device driver",
"scope": "eq",
"trust": 1.6,
"vendor": "intel",
"version": "1.5.18.0"
},
{
"model": "pro wireless 2011b lan usb device driver",
"scope": "eq",
"trust": 1.6,
"vendor": "intel",
"version": "1.5.16.0"
},
{
"model": "intel pro/wireless 2011b lan usb device driver",
"scope": "eq",
"trust": 0.3,
"vendor": "compaq",
"version": "1.5.18.0"
},
{
"model": "intel pro/wireless 2011b lan usb device driver",
"scope": "eq",
"trust": 0.3,
"vendor": "compaq",
"version": "1.5.16.0"
}
],
"sources": [
{
"db": "BID",
"id": "3968"
},
{
"db": "CNNVD",
"id": "CNNVD-200205-015"
},
{
"db": "NVD",
"id": "CVE-2002-0214"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "dario luethi\u203b dlu@remote-exploit.org",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200205-015"
}
],
"trust": 0.6
},
"cve": "CVE-2002-0214",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2002-0214",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 1.0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-4607",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2002-0214",
"trust": 1.0,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-200205-015",
"trust": 0.6,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-4607",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-4607"
},
{
"db": "CNNVD",
"id": "CNNVD-200205-015"
},
{
"db": "NVD",
"id": "CVE-2002-0214"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Compaq Intel PRO/Wireless 2011B LAN USB Device Driver 1.5.16.0 through 1.5.18.0 stores the 128-bit WEP (Wired Equivalent Privacy) key in plaintext in a registry key with weak permissions, which allows local users to decrypt network traffic by reading the WEP key from the registry key. Compaq\u0027s Intel PRO/Wireless 2011B LAN USB Device driver allows a user to connect a number of supported WLAN Ethernet devices via a USB port. It runs on Microsoft Windows platforms that support USB, such as Windows 98/ME/2000. \nThe Compaq Intel PRO/Wireless 2011B LAN USB Device driver may disclose sensitive information to local attackers. \nThe WEP Key may be used by the local attacker to decrypt all network traffic encapsulated in WEP",
"sources": [
{
"db": "NVD",
"id": "CVE-2002-0214"
},
{
"db": "BID",
"id": "3968"
},
{
"db": "VULHUB",
"id": "VHN-4607"
}
],
"trust": 1.26
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "3968",
"trust": 2.0
},
{
"db": "NVD",
"id": "CVE-2002-0214",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-200205-015",
"trust": 0.7
},
{
"db": "BUGTRAQ",
"id": "20020128 INTEL WLAN DRIVER STORING 128BIT WEP-KEY IN PLAIN TEXT!",
"trust": 0.6
},
{
"db": "XF",
"id": "8015",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-4607",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-4607"
},
{
"db": "BID",
"id": "3968"
},
{
"db": "CNNVD",
"id": "CNNVD-200205-015"
},
{
"db": "NVD",
"id": "CVE-2002-0214"
}
]
},
"id": "VAR-200205-0116",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-4607"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-03T22:33:14.597000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2002-0214"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/3968"
},
{
"trust": 1.7,
"url": "http://online.securityfocus.com/archive/1/252607"
},
{
"trust": 1.7,
"url": "http://www.iss.net/security_center/static/8015.php"
},
{
"trust": 0.3,
"url": "http://www.compaq.com/support/files/"
},
{
"trust": 0.3,
"url": "http://support.intel.com/support/network/wireless/pro2011b/usb/index.htm"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-4607"
},
{
"db": "BID",
"id": "3968"
},
{
"db": "CNNVD",
"id": "CNNVD-200205-015"
},
{
"db": "NVD",
"id": "CVE-2002-0214"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-4607"
},
{
"db": "BID",
"id": "3968"
},
{
"db": "CNNVD",
"id": "CNNVD-200205-015"
},
{
"db": "NVD",
"id": "CVE-2002-0214"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2002-05-16T00:00:00",
"db": "VULHUB",
"id": "VHN-4607"
},
{
"date": "2002-01-28T00:00:00",
"db": "BID",
"id": "3968"
},
{
"date": "2002-01-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200205-015"
},
{
"date": "2002-05-16T04:00:00",
"db": "NVD",
"id": "CVE-2002-0214"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2008-09-11T00:00:00",
"db": "VULHUB",
"id": "VHN-4607"
},
{
"date": "2009-07-11T09:56:00",
"db": "BID",
"id": "3968"
},
{
"date": "2005-10-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200205-015"
},
{
"date": "2025-04-03T01:03:51.193000",
"db": "NVD",
"id": "CVE-2002-0214"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "3968"
},
{
"db": "CNNVD",
"id": "CNNVD-200205-015"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Compaq Intel PRO/Wireless 2011B local area network USB Device Driver Information Disclosure Vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200205-015"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "3968"
},
{
"db": "CNNVD",
"id": "CNNVD-200205-015"
}
],
"trust": 0.9
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…