Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-5467 (GCVE-0-2018-5467)
Vulnerability from cvelistv5 – Published: 2018-03-06 21:00 – Updated: 2024-08-05 05:33
VLAI?
EPSS
Summary
An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user.
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Hirschmann Automation and Control GmbH Classic Platform Switches |
Affected:
Hirschmann Automation and Control GmbH Classic Platform Switches
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T05:33:44.439Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "103340",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/103340"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Hirschmann Automation and Control GmbH Classic Platform Switches",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Hirschmann Automation and Control GmbH Classic Platform Switches"
}
]
}
],
"datePublic": "2018-03-06T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-598",
"description": "CWE-598",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-03-10T10:57:01.000Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"name": "103340",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/103340"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2018-5467",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Hirschmann Automation and Control GmbH Classic Platform Switches",
"version": {
"version_data": [
{
"version_value": "Hirschmann Automation and Control GmbH Classic Platform Switches"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-598"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "103340",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103340"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-5467",
"datePublished": "2018-03-06T21:00:00.000Z",
"dateReserved": "2018-01-12T00:00:00.000Z",
"dateUpdated": "2024-08-05T05:33:44.439Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GHSA-8929-9VRR-CVF4
Vulnerability from github – Published: 2022-05-13 01:32 – Updated: 2022-05-13 01:32
VLAI?
Details
An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user.
Severity ?
6.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2018-5467"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-03-06T21:29:00Z",
"severity": "MODERATE"
},
"details": "An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user.",
"id": "GHSA-8929-9vrr-cvf4",
"modified": "2022-05-13T01:32:07Z",
"published": "2022-05-13T01:32:07Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5467"
},
{
"type": "WEB",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/103340"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2018-5467
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2018-5467",
"description": "An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user.",
"id": "GSD-2018-5467"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-5467"
],
"details": "An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user.",
"id": "GSD-2018-5467",
"modified": "2023-12-13T01:22:40.253859Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2018-5467",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Hirschmann Automation and Control GmbH Classic Platform Switches",
"version": {
"version_data": [
{
"version_value": "Hirschmann Automation and Control GmbH Classic Platform Switches"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-598"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "103340",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103340"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-0900mmm2tdau:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600m2t1sdau:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600m2m2sdau:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600l2m2sdau:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-0900nnm4tdau:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-0900vvm2tdau:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600s2s2sdau:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600l2s2sdau:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600l2l2sdau:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600s2m2sdau:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600s2t1sdau:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600l2t1sdau:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsr30:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsr20:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taabe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_m1-8tp-rj45:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_m1-8mm-sc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_m1-8sm-sc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_m1-8sfp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e-l3p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x-l3p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-8tp-r:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-8tp-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-24tp-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r-l3p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e-l3p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-fr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f-l3p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-fr-l3p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f-4poe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-8tp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-8tp-fr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-24tp-fr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep-l3p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r-l3p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l3p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l2p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l2p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l3e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l2p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l3e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l3p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l2p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-0800saap:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms30-1602saae:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-1600saae:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-1600saap:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-1600eccp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms30-0802saae:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-0800saae:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-0800eccp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms30-0802saap:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8tx_poe-eec:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_5tx_eec:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tafuhb:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tneuhb:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_16m-train-bp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_24m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_24m-train:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_24m-train-bp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os32-081602o6o6tpephh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os3x-xx16xxx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os3x-xx24xxx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8tx-eec:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tffuhb:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m-train-bp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010001s1strephh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_16m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m-8poe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tnebhh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008021b1btrephh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os32-080802t6t6tpephh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os32-080802o6o6tpephh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os34:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tafbhh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tnebhh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010001m1mtrephh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010004m4mtrephh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_16m-8poe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_24m-8_poe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008021a1atrephh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008024a4atrephh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tneuhb:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m-train:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010004s4strephh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_16m-train:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m-6poe:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tffbhh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008024b4btrephh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os32-081602t6t6tpephh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2018-5467"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01",
"refsource": "MISC",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01"
},
{
"name": "103340",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103340"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
},
"lastModifiedDate": "2019-10-09T23:41Z",
"publishedDate": "2018-03-06T21:29Z"
}
}
}
CNVD-2018-04785
Vulnerability from cnvd - Published: 2018-03-09
VLAI Severity ?
Title
多款Belden Hirschmann交换机产品用户伪造漏洞
Description
Belden Hirschmann RS等都是美国Belden公司的交换机产品。
多款Belden Hirschmann交换机产品中的Web界面存在安全漏洞。攻击者可利用该漏洞伪造合法的用户。
Severity
中
Formal description
厂商尚未提供漏洞修复方案,请关注厂商主页更新: http://www.hirschmann.com/
Reference
https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01
Impacted products
| Name | ['Belden Hirschmann RS', 'Belden Hirschmann RSR', 'Belden Hirschmann RSB', 'Belden Hirschmann MACH100', 'Belden Hirschmann MACH1000', 'Belden Hirschmann MACH4000', 'Belden Hirschmann MS', 'Belden Hirschmann OCTOPUS'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-5467"
}
},
"description": "Belden Hirschmann RS\u7b49\u90fd\u662f\u7f8e\u56fdBelden\u516c\u53f8\u7684\u4ea4\u6362\u673a\u4ea7\u54c1\u3002\r\n\r\n\u591a\u6b3eBelden Hirschmann\u4ea4\u6362\u673a\u4ea7\u54c1\u4e2d\u7684Web\u754c\u9762\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4f2a\u9020\u5408\u6cd5\u7684\u7528\u6237\u3002",
"discovererName": "Ilya Karpov\uff0cEvgeniy Druzhinin\uff0cMikhail Tsvetkov\u548cDamir Zainullin",
"formalWay": "\u5382\u5546\u5c1a\u672a\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u590d\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u66f4\u65b0\uff1a\r\nhttp://www.hirschmann.com/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-04785",
"openTime": "2018-03-09",
"products": {
"product": [
"Belden Hirschmann RS",
"Belden Hirschmann RSR",
"Belden Hirschmann RSB",
"Belden Hirschmann MACH100",
"Belden Hirschmann MACH1000",
"Belden Hirschmann MACH4000",
"Belden Hirschmann MS",
"Belden Hirschmann OCTOPUS"
]
},
"referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01",
"serverity": "\u4e2d",
"submitTime": "2018-03-08",
"title": "\u591a\u6b3eBelden Hirschmann\u4ea4\u6362\u673a\u4ea7\u54c1\u7528\u6237\u4f2a\u9020\u6f0f\u6d1e"
}
FKIE_CVE-2018-5467
Vulnerability from fkie_nvd - Published: 2018-03-06 21:29 - Updated: 2024-11-21 04:08
Severity ?
Summary
An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user.
References
| URL | Tags | ||
|---|---|---|---|
| ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/103340 | Third Party Advisory, VDB Entry | |
| ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 | Mitigation, Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103340 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 | Mitigation, Third Party Advisory, US Government Resource |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_rs20-0900mmm2tdau:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA25D40E-1E3F-41AB-8BC9-0A364A211183",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rs20-0900nnm4tdau:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ED7F69C-9D7E-4D3E-8FC8-046591B8F72C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rs20-0900vvm2tdau:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A389F6F0-D56E-49C9-B4AD-CCD8DD4A2450",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600l2l2sdau:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49911A4F-A21E-491C-8A03-6E4144DE42D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600l2m2sdau:-:*:*:*:*:*:*:*",
"matchCriteriaId": "738724A7-562C-4807-A317-B5C5428932AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600l2s2sdau:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA39FF33-6E6A-4691-9C40-560723CBFB0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600l2t1sdau:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FB971E8-2607-46BC-84C1-F3D34E44C3E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600m2m2sdau:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1460D64-8DE5-471B-A503-2D87892C79BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600m2t1sdau:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1981C282-9207-4868-9F23-6DD8807BB229",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600s2m2sdau:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E26E3E61-E84D-4800-BDF6-0B4A2F499363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600s2s2sdau:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA008C7-B4CD-4C34-AF56-ECD8C24DB505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600s2t1sdau:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0C5D3E8-A3BB-44FB-A987-83FAD4CC9A5B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsr20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A06C03EE-24A8-4ADE-9B14-5FAAD35E65DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsr30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2BF0F4-230F-44AA-85EE-28B8240B2ACF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD83F89-EB97-4B8F-9DC2-73B730A76EE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A8048B-558C-4741-BD88-D2D3CF74CB96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EA8B637-D6A9-4DF4-824B-C53CA7A8ABEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32B18896-D580-424F-9C4E-82E2EBAD844B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2178F642-0E69-43F0-8F8F-2C87C981DCB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "578326FE-F0FB-47EB-A44F-206BD251D2B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0BEFAE2-3CC3-4DCC-A8C3-9F8DB2B004D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F708D57-48A5-4F53-AB50-15F367358162",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D218119-49DA-47D3-96E8-AD953B9A47C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEA69C3A-0E18-4917-89C8-A7DA275533E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D51E0C67-B998-4C68-84E7-2B38A93B6FBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC13B1DA-0E50-4D07-91E6-E7A07A0E2069",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A850722-6D89-4C42-B20D-407A8E7D9A2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25B98DD9-FB55-4AE5-90E9-10A4BCAA9F81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "043062F8-E093-43D7-8509-63480874592D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACCC3ECF-51F0-4A7C-A43D-3E2D4E72D818",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4A1209-27A8-4C95-BD40-C9AA727CFA0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F15FC0F-489C-4D45-9BC8-F3F86E0A3AC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2888785F-D3D7-41E9-A5C6-5D7ED53DE14F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "853F8602-9DCA-4801-89DB-840FECF6280A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54DE1A99-1AA9-4A43-BD7C-3E22A2A5BA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "738EB5DB-F9F0-4524-A22A-8A7950C27A8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "509B1762-6301-4A27-9D9B-B136F6AAB4CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF4F4DA6-0372-4AD2-BFC1-050017DEA887",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15219A3B-F7E7-4CA9-8309-B67EA6966CD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4714290B-3E4E-4F33-B8A1-9A829785A898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A7A4550-3156-41A7-BBF2-F8A4286758CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58196E57-6427-4173-9619-528F03CD5B05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E8322D0-3114-4492-9BF7-3E666CBE6611",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9819AE5A-8C0D-4EE9-815A-B2769C83C380",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21B9C8AA-1E8A-4146-8EB6-1BE9C594B4FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taabe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66E497A2-AC8F-408A-85BE-65845498FB4C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_m1-8mm-sc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B195204E-8B95-4BE1-B235-1E2FD95A44AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_m1-8sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66A9821B-8D5D-4A5F-AED5-74A0703529CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_m1-8sm-sc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09A75E6D-B73E-45B7-8705-95208F235D28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_m1-8tp-rj45:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65C99A74-7C85-4416-9E9C-3CBA79585736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach102-24tp-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "945DE3CE-B99F-4E03-BDD1-C23396DF50F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach102-24tp-fr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA0BA8D9-D4ED-4CDE-8E3D-F6079899E0FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach102-8tp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FAE9CE3-0207-4314-8C4A-84A6AD3BF235",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach102-8tp-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0D747D9-EDD2-4090-B32F-3C9822E4A56C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach102-8tp-fr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC40955F-D5EB-4B31-A7D1-058E02C417FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach102-8tp-r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C923E962-ECE4-4F23-91C3-5A617D52D4B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86D7ADAB-28A7-4D2B-8662-9E90EFCD8151",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep-l3p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1893F2D7-F48D-411E-BB7C-B7AF2C44EFF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEFE82AD-A5F9-4072-8CBC-20BC6D1CD6F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x-l3p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A497238D-1115-40E2-B043-EB896FED267D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39554286-44A3-4652-B669-DA14CD20B441",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e-l3p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D64AA359-B1AF-417B-AA93-349E52A7966E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47EE024D-162D-419F-A177-327BBF42BAFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r-l3p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76CCBC08-CEDB-4461-80B8-9A8C7AC618B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5281211-E32D-412C-8689-82FC4549C40E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e-l3p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04D5198B-B500-4C91-8E0D-8B95B51B71BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79A82CD8-A4A4-4157-91BB-8D6A2BBB0D51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r-l3p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7115757B-7460-4B54-98E5-4F520DD56A0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8F39B9B-FAAC-43BE-9647-97D54FB52507",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f-4poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59AB7716-CEC7-4A27-8875-09253E9AC237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f-l3p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E597300-89BD-4200-965A-A486ABD7B4B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-fr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F11DB049-5577-4B6E-897E-5C18C62B41D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-fr-l3p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2903B36-E3B5-4767-8075-859C00F2E402",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l2p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8386501-2E1F-401C-BFFA-6B53B6BFF8E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1D3786-C6D0-4A17-AD47-0B182C6F7A04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82E9F068-8B2C-4865-AE12-5AB4E8E1F946",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l2p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F1CE066-1223-458C-A543-1D142539FCF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l3e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAE8E9CE-EA78-43BF-9A6A-87D0352CF4DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l3p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FC03833-B05B-4E56-9E58-072C850F3057",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l2p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EB9E695-1706-4D9D-8E10-212B75CD560D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CF89542-FF92-4429-B314-4AFC765FDFD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4792860A-8E90-40E5-985C-C1FB11588E7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l2p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E815F4A6-9097-4ABE-88BD-5014BE6A5513",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l3e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48FEC97C-495B-40E8-BEDF-948EEC41752C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l3p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "026D719B-4E41-4C32-B0E3-728A35A6706D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_ms20-0800eccp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1FD6BEB-9943-42BB-B62E-5B3C91092B57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_ms20-0800saae:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9129B33A-8EE8-4194-A5CD-E8049B99A6B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_ms20-0800saap:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD1A12E5-373D-441E-B04C-8F95F088B344",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_ms20-1600eccp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F5B3B29-8E0D-488C-BB3B-EC0A8A3DBC09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_ms20-1600saae:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB3DCC1-63DE-4B99-894E-3F5C23437850",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_ms20-1600saap:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01CDE07E-9970-421D-A148-896743C7DFCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_ms30-0802saae:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7047E947-36E6-4A26-BC23-28C65B50C356",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_ms30-0802saap:-:*:*:*:*:*:*:*",
"matchCriteriaId": "630F1410-FFB4-489B-9964-351145426399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_ms30-1602saae:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAEF8E02-FAA3-492F-BB1E-1FF4BDF4C608",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_16m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA9093BA-0B42-4097-9A1A-84DE32DED2F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_16m-8poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD6950F-C91B-4627-A047-5122C04C04B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_16m-train:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCA3B0BE-5AFB-469D-A0D9-EAB0577595FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_16m-train-bp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13F4375F-CA06-4839-8CCB-9E9246DDEE7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_24m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B5D6811-AD13-4C0A-99DB-7D4179757168",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_24m-8_poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7070C13-DA62-4D85-A64F-5111A242A8EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_24m-train:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8FB2BC-2BE3-4024-AD6A-A2BBA3B29493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_24m-train-bp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44E11B95-E12C-49BD-A312-CF1BF8118E7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_5tx_eec:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88902682-B211-4736-B364-BEFDA768B4F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1445388A-F752-4953-9F89-BE3660617B31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m-6poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28FF7C3E-5021-4C82-A238-041A1FD71201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m-8poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "431FC180-BCA1-4F98-8D18-A0CE08E10756",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m-train:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A26D3EC9-DFE5-4AD0-ADDF-6F508B6E3744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m-train-bp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0063F51-2F98-4DE8-880C-D7076B0DCD7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_8tx-eec:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87074D73-9674-478E-9377-A9C6C523D2E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_8tx_poe-eec:-:*:*:*:*:*:*:*",
"matchCriteriaId": "875DC5B6-B977-42E7-8713-A9FD0C48F104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tafbhh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC4C975-724F-426A-8056-6EE02B22F282",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tnebhh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4596FAB-8105-441B-B3AC-EDAED7C7F735",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010001m1mtrephh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64276F67-CEDA-4445-A337-79133794D592",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010001s1strephh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5100DA61-83DD-4413-A8EC-20BEB30BA0C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010004m4mtrephh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87F4DE6A-2688-4F1D-BEFA-BE932F637BFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010004s4strephh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D281C363-DD4E-452B-ABCC-4EA336B17C37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tafuhb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D85D07B-2EBE-478E-B5FE-975EFD0AADE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tneuhb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B2024F2-7CB2-40A2-B464-B4C3AA74104D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tffbhh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B207FE2-DE97-48E5-92DA-F936A679B08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tnebhh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58CBF64A-49BE-44D2-8381-05147A54FBD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tffuhb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "063E67B4-2F80-4762-BEF2-B3A8897C0B36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tneuhb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4918054-F180-48D4-B294-BA25074D2EA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE08D58E-44A1-48A1-986E-D66FB728D60C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008021a1atrephh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA034B1A-CD20-4033-ADFB-BC7F13D23AAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008021b1btrephh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C971FE83-B5B2-4855-94AD-F8C4E844D204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008024a4atrephh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E175432-5BCF-4402-8087-3A9F126A12C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008024b4btrephh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB4580A2-26D9-469B-BCEB-F565D757902F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os32-080802o6o6tpephh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "068E6AEF-D20C-4D5D-9DF5-293DA5A42534",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os32-080802t6t6tpephh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF21DEC7-DDDD-477A-957A-0FDD52522A6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os32-081602o6o6tpephh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C73D7F90-BD0C-4C6C-AAB0-A006AD2F6158",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os32-081602t6t6tpephh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D967C151-6D54-4649-9019-03E8C501FCEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os34:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5BDA02A-B7E4-4217-9E56-01A88F944B2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os3x-xx16xxx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "600871CF-FB70-48DC-8AD0-DFB2EC08A45F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os3x-xx24xxx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E755EDB6-832D-42EA-91D7-FFD76443C336",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user."
},
{
"lang": "es",
"value": "Se ha descubierto un problema de exposici\u00f3n de informaci\u00f3n mediante cadenas de consulta en peticiones GET en los switches Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS y OCTOPUS Classic Platform. Se ha identificado una vulnerabilidad de exposici\u00f3n de informaci\u00f3n mediante cadenas de consulta en la interfaz web que podr\u00eda permitir que un atacante suplante a un usuario leg\u00edtimo."
}
],
"id": "CVE-2018-5467",
"lastModified": "2024-11-21T04:08:51.463",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-03-06T21:29:00.347",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103340"
},
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103340"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-598"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…