Show plain JSON{"id": "CVE-2014-2941", "cveTags": [{"tags": ["disputed"], "sourceIdentifier": "cret@cert.org"}], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:N", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-08-15T11:15:42.997", "references": [{"url": "http://www.kb.cert.org/vuls/id/269991", "tags": ["Third Party Advisory", "US Government Resource"], "source": "cret@cert.org"}, {"url": "http://www.kb.cert.org/vuls/id/269991", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Cobham Sailor 6000 satellite terminals have hardcoded Tbus 2 credentials, which allows remote attackers to obtain access via a TBUS2 command. NOTE: the vendor reportedly states \"there is no possibility to exploit another user's credentials."}, {"lang": "es", "value": "** DISPUTADA ** los terminales de sat\u00e9lite Cobham Sailor 6000 tiene las credenciales Tbus 2 embebidas, lo que permite a atacantes remotos obtener acceso a trav\u00e9s de un comando TBUS2. NOTA: el proveedor declara que 'no existe la posibilidad de explotar las credenciales de otro usuario.'"}], "lastModified": "2024-11-21T02:07:13.337", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cobham:ailor_6110_mini-c_gmdss:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEA4C870-472D-4CE8-BAF7-B489DA48AC4E"}, {"criteria": "cpe:2.3:h:cobham:sailor_6006_message_terminal:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D85C2D45-B835-4374-B3AB-B3DE311BBFFA"}, {"criteria": "cpe:2.3:h:cobham:sailor_6222_vhf:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6CDFC3D-35A7-4530-A253-62E5DF82F3CD"}, {"criteria": "cpe:2.3:h:cobham:sailor_6300_mf_\\/_hf:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0328B479-A9BA-49A9-B352-70D8816F4463"}], "operator": "OR"}]}], "evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/798.html\">CWE-798: Use of Hard-coded Credentials</a>", "sourceIdentifier": "cret@cert.org"}