VAR-201511-0265

Vulnerability from variot - Updated: 2025-04-13 23:23

The DB service in IBM System Networking Switch Center (SNSC) before 7.3.1.5 and Lenovo Switch Center before 8.1.2.0 allows remote attackers to obtain sensitive administrator-account information via a request on port 40999, as demonstrated by an improperly encrypted password. Authentication is not required to exploit this vulnerability. The specific flaw exists within the IBM SNSC DB Service, that listens by default on port 40999. This service allows an unauthenticated user to obtain the account details for the SNSC Administrator, including the password. The password is stored using reversible encryption, and both the key and salt are static. An attacker can use this information to obtain the plaintext password for the SNSC Administrator or any other known account. Attackers can exploit this issue to obtain sensitive information or perform unauthorized actions. This may lead to further attacks

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "7.3.1.4"
      },
      {
        "_id": null,
        "model": "switch center",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.1.1.0"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "7.3.1.5"
      },
      {
        "_id": null,
        "model": "switch center",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "lenovo",
        "version": "8.1.2.0"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": null,
        "trust": 0.7,
        "vendor": "ibm",
        "version": null
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ibm",
        "version": "7.3.1.4"
      },
      {
        "_id": null,
        "model": "switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "lenovo",
        "version": "8.1.1.0"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3.11"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.111"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.110"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.32"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.31"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3.1.2"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.4"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.0"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.0"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.0"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "_id": null,
        "model": "switch center",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "lenovo",
        "version": "8.1.2.0"
      },
      {
        "_id": null,
        "model": "system networking switch center",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3.1.5"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-552"
      },
      {
        "db": "BID",
        "id": "77551"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005920"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-169"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7819"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:ibm:system_networking_switch_center",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:lenovo:switch_center",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005920"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-552"
      },
      {
        "db": "BID",
        "id": "77551"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-169"
      }
    ],
    "trust": 1.6
  },
  "cve": "CVE-2015-7819",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2015-7819",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2015-7819",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-85780",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-7819",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2015-7819",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "ZDI",
            "id": "CVE-2015-7819",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201511-169",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-85780",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-552"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85780"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005920"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-169"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7819"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "The DB service in IBM System Networking Switch Center (SNSC) before 7.3.1.5 and Lenovo Switch Center before 8.1.2.0 allows remote attackers to obtain sensitive administrator-account information via a request on port 40999, as demonstrated by an improperly encrypted password. Authentication is not required to exploit this vulnerability. The specific flaw exists within the IBM SNSC DB Service, that listens by default on port 40999. This service allows an unauthenticated user to obtain the account details for the SNSC Administrator, including the password. The password is stored using reversible encryption, and both the key and salt are static. An attacker can use this information to obtain the plaintext password for the SNSC Administrator or any other known account. \nAttackers can exploit this issue to obtain sensitive information or perform unauthorized actions. This may lead to further attacks",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-7819"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005920"
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-552"
      },
      {
        "db": "BID",
        "id": "77551"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85780"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-7819",
        "trust": 3.5
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-552",
        "trust": 3.2
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005920",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3010",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-169",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "77551",
        "trust": 0.4
      },
      {
        "db": "ZDI",
        "id": "ZDI-15-551",
        "trust": 0.3
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-89776",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-85780",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-552"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85780"
      },
      {
        "db": "BID",
        "id": "77551"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005920"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-169"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7819"
      }
    ]
  },
  "id": "VAR-201511-0265",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-85780"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-13T23:23:42.557000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "LEN-2015-074",
        "trust": 1.5,
        "url": "https://support.lenovo.com/us/en/product_security/len_2015_074"
      },
      {
        "title": "Lenovo Switch Center Repair measures for trust management vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58663"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-552"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005920"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-169"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-85780"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005920"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7819"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 2.7,
        "url": "https://support.lenovo.com/us/en/product_security/len_2015_074"
      },
      {
        "trust": 2.5,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-15-552/"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7819"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7819"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com"
      },
      {
        "trust": 0.3,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-15-551/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-15-552"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85780"
      },
      {
        "db": "BID",
        "id": "77551"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005920"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-169"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7819"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-15-552",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-85780",
        "ident": null
      },
      {
        "db": "BID",
        "id": "77551",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005920",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-169",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7819",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2015-11-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-15-552",
        "ident": null
      },
      {
        "date": "2015-11-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-85780",
        "ident": null
      },
      {
        "date": "2015-11-10T00:00:00",
        "db": "BID",
        "id": "77551",
        "ident": null
      },
      {
        "date": "2015-11-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-005920",
        "ident": null
      },
      {
        "date": "2015-11-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201511-169",
        "ident": null
      },
      {
        "date": "2015-11-12T03:59:07.530000",
        "db": "NVD",
        "id": "CVE-2015-7819",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2015-11-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-15-552",
        "ident": null
      },
      {
        "date": "2015-11-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-85780",
        "ident": null
      },
      {
        "date": "2015-11-10T00:00:00",
        "db": "BID",
        "id": "77551",
        "ident": null
      },
      {
        "date": "2015-11-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-005920",
        "ident": null
      },
      {
        "date": "2015-11-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201511-169",
        "ident": null
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2015-7819",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-169"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "IBM System Networking Switch Center and  Lenovo Switch Center of  DB Vulnerability in obtaining information about important administrator accounts in the service",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-005920"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "trust management",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201511-169"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…