Show plain JSON{"id": "CVE-2014-7270", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2015-02-01T15:59:03.323", "references": [{"url": "http://jvn.jp/en/jp/JVN32631078/index.html", "tags": ["Vendor Advisory"], "source": "vultures@jpcert.or.jp"}, {"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000012", "tags": ["Vendor Advisory"], "source": "vultures@jpcert.or.jp"}, {"url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR", "tags": ["Vendor Advisory"], "source": "vultures@jpcert.or.jp"}, {"url": "http://jvn.jp/en/jp/JVN32631078/index.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000012", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allows remote attackers to hijack the authentication of arbitrary users."}, {"lang": "es", "value": "Vulnerabilidad de CSRF en los routers ASUS JAPAN RT-AC87U con firmware 3.0.0.4.378.3754 y anteriores, los routers RT-AC68U con firmware 3.0.0.4.376.3715 y anteriores, los routers RT-AC56S con firmware 3.0.0.4.376.3715 y anteriores, los routers RT-N66U con firmware 3.0.0.4.376.3715 y anteriores, y los routers RT-N56U con firmware 3.0.0.4.376.3715 y anteriores permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios arbitrarios."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-n66u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F00D344B-E6F4-43E6-AC9F-CC1D0ACEB03D", "versionEndIncluding": "3.0.0.4.376.3715"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A60BB38-11FC-48C4-B592-29C6C3A6FEAE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC9CE8AF-0F34-49E9-B57C-A0EE82A55CB8", "versionEndIncluding": "3.0.0.4.376.3715"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "534C0C95-9DD2-464C-8776-01B47398FE13"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-ac87u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4ECCC5BB-8B10-4712-B33A-FE6CDDD826F2", "versionEndIncluding": "3.0.0.4.378.3754"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-ac87u:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "317B2498-88CE-431F-97E1-EFE7F7E34E05"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EFEF79F-9383-4091-B013-B3FD9F7A4E73", "versionEndIncluding": "3.0.0.4.376.3715"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E23D00B-76E3-438C-8023-3D7CC6AEEE15"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-ac56s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "866A3E80-E93C-4C00-B8CD-B040617D4B4E", "versionEndIncluding": "3.0.0.4.376.3715"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-ac56s:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63A1E548-F12D-4BF7-9C01-1325A725FF91"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "vultures@jpcert.or.jp"}