VAR-201409-0076
Vulnerability from variot - Updated: 2025-04-13 23:04IBM System Networking G8052, G8124, G8124-E, G8124-ER, G8264, G8316, and G8264-T switches before 7.9.10.0; EN4093, EN4093R, CN4093, SI4093, EN2092, and G8264CS switches before 7.8.6.0; Flex System Interconnect Fabric before 7.8.6.0; 1G L2-7 SLB switch for Bladecenter before 21.0.21.0; 10G VFSM for Bladecenter before 7.8.14.0; 1:10G switch for Bladecenter before 7.4.8.0; 1G switch for Bladecenter before 5.3.5.0; Server Connectivity Module before 1.1.3.4; System Networking RackSwitch G8332 before 7.7.17.0; and System Networking RackSwitch G8000 before 7.1.7.0 have hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors. IBM System Networking , Flex System Interconnect Fabric And other IBM Since the product has hard-coded authentication information, there is a vulnerability that can gain access. Supplementary information : CWE Vulnerability type by CWE-798: Use of Hard-coded Credentials ( Using hard-coded credentials ) Has been identified. http://cwe.mitre.org/data/definitions/798.htmlAccess may be obtained by a third party. An attacker can exploit this issue to bypass the authentication mechanism and gain unauthorized access to the affected device. This may aid in further attacks. The following products and versions are affected: IBM System Networking G8052, G8124, G8124-E, G8124-ER, G8264, G8316, G8264-T switches versions prior to 7.9.10.0; EN4093, EN4093R, CN4093, SI4093, EN2092, G8264CS switches 7.8
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201409-0076",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "bladecenter 1\\/10g",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.4.7.0"
},
{
"model": "system networking rackswitch g8264t",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8264",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.9.1.0"
},
{
"model": "system networking rackswitch g8316",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "bladecenter 1g",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "5.3.4.0"
},
{
"model": "flex system interconnect fabric",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch en2092",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch en2092",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.8.5.0"
},
{
"model": "system networking rackswitch si4093",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch cn4093",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8124er",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8332",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8316",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.9.1.0"
},
{
"model": "bladecenter 1g",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "bladecenter 10g vfsm",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.8.6.0"
},
{
"model": "system networking rackswitch en4093r",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "server connectivity module",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.1.3.0"
},
{
"model": "system networking rackswitch g8052",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.9.1.0"
},
{
"model": "bladecenter 1g l2-7 slb",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch en4093",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.8.5.0"
},
{
"model": "system networking rackswitch g8124",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.9.1.0"
},
{
"model": "flex system interconnect fabric",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.8.5.0"
},
{
"model": "system networking rackswitch g8264",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8124er",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.9.1.0"
},
{
"model": "system networking rackswitch g8052",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "bladecenter 1g l2-7 slb",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "21.0.20.0"
},
{
"model": "system networking rackswitch en4093r",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.8.5.0"
},
{
"model": "bladecenter 10g vfsm",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8332",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.7.16.0"
},
{
"model": "system networking rackswitch g8124e",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.9.1.0"
},
{
"model": "system networking rackswitch g8264t",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.9.1.0"
},
{
"model": "system networking rackswitch g8124e",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch en4093",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8124",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch si4093",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.8.5.0"
},
{
"model": "system networking rackswitch g8332",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.1.6.0"
},
{
"model": "system networking rackswitch g8264cs",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "server connectivity module",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "bladecenter 1\\/10g",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch cn4093",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.8.5.0"
},
{
"model": "system networking rackswitch g8264cs",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.8.5.0"
},
{
"model": "1g l2-7 slb switch for bladecenter",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "1g l2-7 slb switch for bladecenter",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "21.0.21.0"
},
{
"model": "1g switch for bladecenter",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "1g switch for bladecenter",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "5.3.5.0"
},
{
"model": "bladecenter 1/10g uplink ethernet switch module",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "bladecenter 1/10g uplink ethernet switch module",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.4.8.0"
},
{
"model": "bladecenter server connectivity module",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "bladecenter server connectivity module",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "1.1.3.4"
},
{
"model": "flex system en2092 1gb ethernet scalable switch",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "flex system en2092 1gb ethernet scalable switch",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.8.6.0"
},
{
"model": "flex system fabric cn4093 10gb converged scalable switch",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "flex system fabric cn4093 10gb converged scalable switch",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.8.6.0"
},
{
"model": "flex system fabric en4093 10gb scalable switch",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "flex system fabric en4093 10gb scalable switch",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.8.6.0"
},
{
"model": "flex system fabric en4093r 10gb scalable switch",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "flex system fabric en4093r 10gb scalable switch",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.8.6.0"
},
{
"model": "flex system fabric si4093 system interconnect module",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "flex system fabric si4093 system interconnect module",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.8.6.0"
},
{
"model": "flex system interconnect fabric",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "flex system interconnect fabric",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "21.0.21.0"
},
{
"model": "system networking rackswitch g8000",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8000",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.1.7.0"
},
{
"model": "system networking rackswitch g8052",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8052",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.9.10.0"
},
{
"model": "system networking rackswitch g8124",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8124",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.9.10.0"
},
{
"model": "system networking rackswitch g8124e",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8124e",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.9.10.0"
},
{
"model": "system networking rackswitch g8124er",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8124er",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.9.10.0"
},
{
"model": "system networking rackswitch g8264",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8264",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.9.10.0"
},
{
"model": "system networking rackswitch g8264cs",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8264cs",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.8.6.0"
},
{
"model": "system networking rackswitch g8264t",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8264t",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.9.10.0"
},
{
"model": "system networking rackswitch g8316",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8316",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.9.10.0"
},
{
"model": "system networking rackswitch g8332",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "system networking rackswitch g8332",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.7.17.0"
},
{
"model": "virtual fabric 10gb switch module for ibm bladecenter",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "virtual fabric 10gb switch module for ibm bladecenter",
"scope": "lt",
"trust": 0.8,
"vendor": "ibm",
"version": "7.8.14.0"
},
{
"model": "system networking rackswitch g8124e",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "7.9.1.0"
},
{
"model": "system networking rackswitch si4093",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "7.8.5.0"
},
{
"model": "system networking rackswitch g8316",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "7.9.1.0"
},
{
"model": "system networking rackswitch g8264",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "7.9.1.0"
},
{
"model": "system networking rackswitch g8124",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "7.9.1.0"
},
{
"model": "bladecenter 1\\/10g",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "7.4.7.0"
},
{
"model": "system networking rackswitch g8264t",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "7.9.1.0"
},
{
"model": "flex system interconnect fabric",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "7.8.5.0"
},
{
"model": "system networking rackswitch g8124er",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "7.9.1.0"
},
{
"model": "bladecenter 1g l2-7 slb",
"scope": "eq",
"trust": 0.6,
"vendor": "ibm",
"version": "21.0.20.0"
},
{
"model": "system networking rackswitch g8332",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "system networking rackswitch g8316",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "system networking rackswitch g8264cs",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "system networking rackswitch g8264-t",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "system networking rackswitch g8264",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "system networking rackswitch g8124-er",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "system networking rackswitch g8124-e",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "system networking rackswitch g8124",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "system networking rackswitch g8052",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "system networking rackswitch g8000",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "server connectivity module",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "flex system interconnect fabric",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "flex system fabric si4093 system interconnect module",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "flex system fabric en4093r 10gb scalable switch",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7.8.4.0"
},
{
"model": "flex system fabric en4093 10gb scalable switch",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7.8.4.0"
},
{
"model": "flex system fabric cn4093 10gb converged scalable switch",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7.8.4.0"
},
{
"model": "flex system en2092 1gb ethernet scalable switch",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "1g switch for bladecenter",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "10g vfsm for bladecenter",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "1:10g switch for bladecenter",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "system networking rackswitch g8332",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.7.170"
},
{
"model": "system networking rackswitch g8316",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.9.100"
},
{
"model": "system networking rackswitch g8264cs",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.8.60"
},
{
"model": "system networking rackswitch g8264-t",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.9.100"
},
{
"model": "system networking rackswitch g8264",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.9.100"
},
{
"model": "system networking rackswitch g8124-er",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.9.100"
},
{
"model": "system networking rackswitch g8124-e",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.9.100"
},
{
"model": "system networking rackswitch g8124",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.9.100"
},
{
"model": "system networking rackswitch g8052",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.9.100"
},
{
"model": "system networking rackswitch g8000",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.1.70"
},
{
"model": "server connectivity module",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "1.1.34"
},
{
"model": "flex system interconnect fabric",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "21.0.210"
},
{
"model": "flex system fabric si4093 system interconnect module",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.8.60"
},
{
"model": "flex system fabric en4093r 10gb scalable switch",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.8.6.0"
},
{
"model": "flex system fabric en4093 10gb scalable switch",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.8.6.0"
},
{
"model": "flex system en2092 1gb ethernet scalable switch",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.8.60"
},
{
"model": "1g switch for bladecenter",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "5.3.50"
},
{
"model": "10g vfsm for bladecenter",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.8.140"
},
{
"model": "1:10g switch for bladecenter",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7.4.80"
}
],
"sources": [
{
"db": "BID",
"id": "69968"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004408"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-889"
},
{
"db": "NVD",
"id": "CVE-2014-4752"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:ibm:bladecenter_1g_l2-7_slb",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:bladecenter_1g_l2-7_slb_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:bladecenter_1g",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:bladecenter_1g_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:bladecenter_1%2F10g",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:bladecenter_1%2F10g_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:server_connectivity_module",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:server_connectivity_module_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__en2092",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__en2092_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__cn4093",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__cn4093_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__en4093",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__en4093_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__en4093r",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__en4093r_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__si4093",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__si4093_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:flex_system_interconnect_fabric",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:flex_system_interconnect_fabric_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__g8000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__g8000_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__g8052",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__g8052_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__g8124",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__g8124_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__g8124e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__g8124e_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__g8124er",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__g8124er_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__g8264",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__g8264_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__g8264cs",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__g8264cs_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__g8264t",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__g8264t_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__g8316",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__g8316_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:system_networking_rackswitch__g8332",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:system_networking_rackswitch__g8332_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ibm:bladecenter_10g_vfsm",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ibm:bladecenter_10g_vfsm_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-004408"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "IBM",
"sources": [
{
"db": "BID",
"id": "69968"
}
],
"trust": 0.3
},
"cve": "CVE-2014-4752",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2014-4752",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-72693",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-4752",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2014-4752",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201409-889",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-72693",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-72693"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004408"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-889"
},
{
"db": "NVD",
"id": "CVE-2014-4752"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "IBM System Networking G8052, G8124, G8124-E, G8124-ER, G8264, G8316, and G8264-T switches before 7.9.10.0; EN4093, EN4093R, CN4093, SI4093, EN2092, and G8264CS switches before 7.8.6.0; Flex System Interconnect Fabric before 7.8.6.0; 1G L2-7 SLB switch for Bladecenter before 21.0.21.0; 10G VFSM for Bladecenter before 7.8.14.0; 1:10G switch for Bladecenter before 7.4.8.0; 1G switch for Bladecenter before 5.3.5.0; Server Connectivity Module before 1.1.3.4; System Networking RackSwitch G8332 before 7.7.17.0; and System Networking RackSwitch G8000 before 7.1.7.0 have hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors. IBM System Networking , Flex System Interconnect Fabric And other IBM Since the product has hard-coded authentication information, there is a vulnerability that can gain access. Supplementary information : CWE Vulnerability type by CWE-798: Use of Hard-coded Credentials ( Using hard-coded credentials ) Has been identified. http://cwe.mitre.org/data/definitions/798.htmlAccess may be obtained by a third party. \nAn attacker can exploit this issue to bypass the authentication mechanism and gain unauthorized access to the affected device. This may aid in further attacks. The following products and versions are affected: IBM System Networking G8052, G8124, G8124-E, G8124-ER, G8264, G8316, G8264-T switches versions prior to 7.9.10.0; EN4093, EN4093R, CN4093, SI4093, EN2092, G8264CS switches 7.8",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-4752"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004408"
},
{
"db": "BID",
"id": "69968"
},
{
"db": "VULHUB",
"id": "VHN-72693"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-4752",
"trust": 2.8
},
{
"db": "SECUNIA",
"id": "54512",
"trust": 1.1
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004408",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201409-889",
"trust": 0.7
},
{
"db": "BID",
"id": "69968",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-72693",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-72693"
},
{
"db": "BID",
"id": "69968"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004408"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-889"
},
{
"db": "NVD",
"id": "CVE-2014-4752"
}
]
},
"id": "VAR-201409-0076",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-72693"
}
],
"trust": 0.49682541
},
"last_update_date": "2025-04-13T23:04:50.343000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Backdoor Access Vulnerability in IBM System Networking Products (CVE- 2014-4752)",
"trust": 0.8,
"url": "http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096232"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-004408"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-004408"
},
{
"db": "NVD",
"id": "CVE-2014-4752"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096232"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/54512"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4752"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-4752"
},
{
"trust": 0.3,
"url": "http://www.ibm.com"
},
{
"trust": 0.3,
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096232"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-72693"
},
{
"db": "BID",
"id": "69968"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004408"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-889"
},
{
"db": "NVD",
"id": "CVE-2014-4752"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-72693"
},
{
"db": "BID",
"id": "69968"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004408"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-889"
},
{
"db": "NVD",
"id": "CVE-2014-4752"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-09-23T00:00:00",
"db": "VULHUB",
"id": "VHN-72693"
},
{
"date": "2014-08-07T00:00:00",
"db": "BID",
"id": "69968"
},
{
"date": "2014-09-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-004408"
},
{
"date": "2014-09-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201409-889"
},
{
"date": "2014-09-23T22:55:03.653000",
"db": "NVD",
"id": "CVE-2014-4752"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-27T00:00:00",
"db": "VULHUB",
"id": "VHN-72693"
},
{
"date": "2014-08-07T00:00:00",
"db": "BID",
"id": "69968"
},
{
"date": "2014-09-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-004408"
},
{
"date": "2014-09-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201409-889"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2014-4752"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201409-889"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural IBM Vulnerability to obtain access rights in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-004408"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "69968"
}
],
"trust": 0.3
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.