Show plain JSON{"id": "CVE-2019-17215", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2019-10-06T16:15:10.180", "references": [{"url": "https://vuldb.com/?id.140463", "tags": ["Permissions Required", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://vuldb.com/?id.140463", "tags": ["Permissions Required", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-307"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. There is no bruteforce protection (e.g., lockout) established. An attacker might be able to bruteforce the password to authenticate on the device."}, {"lang": "es", "value": "Se detect\u00f3 un problema en los dispositivos V-Zug Combi-Steam MSLQ versiones anteriores a Ethernet R07 y anteriores a WLAN R05. No presenta una protecci\u00f3n de fuerza bruta (p. Ej., Bloqueo) establecida. Un atacante podr\u00eda aplicar fuerza bruta a la contrase\u00f1a para autenticarse en el dispositivo."}], "lastModified": "2024-11-21T04:31:52.597", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:vzug:combi-stream_mslq_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D622A17-7569-4A0A-A500-E07DF939ACEB", "versionEndExcluding": "ethernet_r07"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:vzug:combi-stream_mslq:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "71471F55-CB54-4F42-8A94-92D0CE479028"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:vzug:combi-stream_mslq_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68A4AABA-B6A5-4E1E-A848-F5AB12E7EAFF", "versionEndExcluding": "wlan_r05"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:vzug:combi-stream_mslq:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "71471F55-CB54-4F42-8A94-92D0CE479028"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}