VAR-201101-0116

Vulnerability from variot - Updated: 2025-04-11 23:17

The PolyVision RoomWizard with firmware 3.2.3 has a default password of roomwizard for the administrator account, which makes it easier for remote attackers to obtain console access via an HTTP session, a different vulnerability than CVE-2010-0214. The PolyVision RoomWizard web based scheduling system with touch screen display contains two vulnerabilities that allow an unauthorized user to access the device console and Sync Connector Active Directory credentials. RoomWizard is prone to a security-bypass vulnerability and an information-disclosure vulnerability. Successful exploiting these issues allow attackers to gain access to the application; other attacks may also be possible

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201101-0116",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "roomwizard",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "polyvision",
        "version": "3.2.3"
      },
      {
        "model": "roomwizard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "polyvision",
        "version": "*"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "polyvision",
        "version": null
      },
      {
        "model": "roomwizard",
        "scope": null,
        "trust": 0.8,
        "vendor": "polyvision",
        "version": null
      },
      {
        "model": "media link roomwizard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "interactive",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:polyvision:roomwizard",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:polyvision:roomwizard_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sean Lam",
    "sources": [
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2011-0423",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2011-0423",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-48368",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2011-0423",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#870601",
            "trust": 0.8,
            "value": "1.26"
          },
          {
            "author": "NVD",
            "id": "CVE-2011-0423",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201101-122",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-48368",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48368"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The PolyVision RoomWizard with firmware 3.2.3 has a default password of roomwizard for the administrator account, which makes it easier for remote attackers to obtain console access via an HTTP session, a different vulnerability than CVE-2010-0214. The PolyVision RoomWizard web based scheduling system with touch screen display contains two vulnerabilities that allow an unauthorized user to access the device console and Sync Connector Active Directory credentials. RoomWizard is prone to a security-bypass vulnerability and an information-disclosure vulnerability. \nSuccessful exploiting these issues allow attackers to gain access to the application; other attacks may also be possible",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-0423"
      },
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48368"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#870601",
        "trust": 3.6
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0423",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "45699",
        "trust": 2.0
      },
      {
        "db": "VUPEN",
        "id": "ADV-2011-0059",
        "trust": 1.7
      },
      {
        "db": "PACKETSTORM",
        "id": "97291",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "70388",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122",
        "trust": 0.7
      },
      {
        "db": "FULLDISC",
        "id": "20110106 ROOMWIZARD DEFAULT PASSWORD AND SYNC CONNECTOR CREDENTIAL LEAK [CVE-2010-0214]",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "64543",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-48368",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48368"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "id": "VAR-201101-0116",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-48368"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-11T23:17:56.667000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.polyvision.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-48368"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://www.kb.cert.org/vuls/id/870601"
      },
      {
        "trust": 2.0,
        "url": "http://seclists.org/fulldisclosure/2011/jan/58"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/45699"
      },
      {
        "trust": 1.7,
        "url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2011/0059"
      },
      {
        "trust": 1.1,
        "url": "http://osvdb.org/70388"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64642"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
      },
      {
        "trust": 0.8,
        "url": "about vulnerability notes"
      },
      {
        "trust": 0.8,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 0.8,
        "url": "provide a vendor statement"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0423"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0423"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/64543"
      },
      {
        "trust": 0.3,
        "url": "http://www.interactivemedialink.com.au/products/input-devices/196-roomwizard-room-scheduling-system.html"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48368"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48368"
      },
      {
        "db": "BID",
        "id": "45699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-01-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "date": "2011-01-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-48368"
      },
      {
        "date": "2011-01-06T00:00:00",
        "db": "BID",
        "id": "45699"
      },
      {
        "date": "2012-03-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "date": "2011-01-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      },
      {
        "date": "2011-01-12T01:00:02.353000",
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-01-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#870601"
      },
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-48368"
      },
      {
        "date": "2015-04-13T21:05:00",
        "db": "BID",
        "id": "45699"
      },
      {
        "date": "2012-03-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-004107"
      },
      {
        "date": "2011-01-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      },
      {
        "date": "2025-04-11T00:51:21.963000",
        "db": "NVD",
        "id": "CVE-2011-0423"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "PolyVision RoomWizard insecurely stores Sync Connector Active Directory credentials and uses default administrative password",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#870601"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "trust management",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201101-122"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…