5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
0.974 High
EPSS
Percentile
99.9%
OpenSSL is vulnerable to a man-in-the-middle attack.
The OpenSSL security advisory states:
SSL/TLS MITM vulnerability (CVE-2014-0224)
===========================================
An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server.
The attack can only be performed between a vulnerable client and server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users of OpenSSL servers earlier than 1.0.1 are advised to upgrade as a precaution.
OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za.
OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m.
OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h.
Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for discovering and researching this issue. This issue was reported to OpenSSL on 1st May 2014 via JPCERT/CC.
The fix was developed by Stephen Henson of the OpenSSL core team partly based on an original patch from KIKUCHI Masashi.
Additional details may be found in the OpenSSL security advisory. This vulnerability is one of many that has been fixed in the latest release.
Masashi Kikuchi has written a technical blog post about the vulnerability.
A remote attacker with a man-in-the-middle vantage point on the network may be able to decrypt or modify traffic between a client and server.
Apply an Update
OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za.
OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m.
OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h.
978508
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: June 02, 2014 Updated: August 19, 2014
Affected
`Some Attachmate products with specific versions are affected by the
CVE-2014-0224 OpenSSL "CCS’ MITM vulnerability when TLS protocol
connections are used. All affected products now have either new versions
or hot fixes available to fix this issue.
Security Updates technical notes are available for specific products:
Security Updates and Reflection
<http://support.attachmate.com/techdocs/1708.html>
Security Updates and Reflection for Secure IT
<http://support.attachmate.com/techdocs/2288.html>
Security Updates and EXTRA!
<http://support.attachmate.com/techdocs/2501.html>
Security Updates and Reflection 2014 or Reflection 2011
<http://support.attachmate.com/techdocs/2502.html>
Security Updates and Verastream
<http://support.attachmate.com/techdocs/2700.html>`
We are not aware of further vendor information regarding this vulnerability.
Notified: June 02, 2014 Updated: June 06, 2014
Affected
We have not received a statement from the vendor.
Please see the following URL for more information.
Notified: June 02, 2014 Updated: June 06, 2014
Affected
We have not received a statement from the vendor.
Please see the following URL for more information.
Notified: June 02, 2014 Updated: June 05, 2014
Affected
We have not received a statement from the vendor.
Please see the following URL for more information.
Notified: June 02, 2014 Updated: June 19, 2014
Affected
We have determined that GTA firewalls running the following versions of GB-OS are vulnerable and should be upgraded to the indicated version listed below.
GB-OS version 6.1.0 to 6.1.7 are vulnerable and should upgrade to GB-OS 6.1.8
GB-OS version 6.0.0 to 6.0.8 are vulnerable and should upgrade to GB-OS 6.0.9
Customers using GTA firewalls with an unsupported version of GB-OS should upgrade to a currently supported version.
We are not aware of further vendor information regarding this vulnerability.
Notified: June 02, 2014 Updated: August 21, 2014
Affected
`Note: the current version of the following document is available here:
<https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04401858>
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04401858
Version: 1
HPSBMU03101 rev.1 - HP Asset Manager, CloudSystem Chargeback, running
OpenSSL, Remote Disclosure of Information or Unauthorized Access
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2014-08-19
Last Updated: 2014-08-19
Potential Security Impact: Remote disclosure of information or unauthorized
access
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP Asset Manager
and CloudSystem Chargeback running OpenSSL. The vulnerability could be
exploited remotely to allow disclosure information or unauthorized access.
This OpenSSL vulnerability was detected in specific OpenSSL versions. OpenSSL
is a 3rd party product that is embedded with some HP Software products. This
bulletin notifies HP Software customers about products affected by this
OpenSSL vulnerability.
Note: OpenSSL vulnerabilities, are found in the OpenSSL product cryptographic
software library product. This weakness potentially allows Man in the Middle
(MITM) attack where the attacker can decrypt and modify traffic from the
attacked client and server. The impacted products appear in the list below
are vulnerable due to embedding of OpenSSL standard release software.
References:
CVE-2014-0224 (SSRT101672)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Asset Manager - v9.4x, v9.3x, v5.2x
HP CloudSystem Chargeback v9.40
BACKGROUND
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following patch to resolve the vulnerability in HP Asset
Manager and HP CloudSystem Chargeback.
HP Asset Manager / CloudSystem Chargeback v9.40
Install patch v9.40.P4
For Windows(en)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00376>
For Windows(de)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00377>
For Windows(es)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00378>
For Windows(fr)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00379>
For Windows(it)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00380>
For Windows(ja)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00381>
For Windows(ko)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00382>
For Windows(nl)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00383>
For Windows(pt)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00384>
For Windows(ru)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00385>
For Windows(zh)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00386>
For Linux(en)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00387>
For Linux(de)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00388>
For Linux(es)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00389>
For Linux(fr)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00390>
For Linux(it)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00391>
For Linux(ja)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00392>
For Linux(ko)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00393>
For Linux(nl)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00394>
For Linux(pt)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00395>
For Linux(ru)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00396>
For Linux(zh)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00397>
HP Asset Manager v9.41
Install patch v9.41.P1
For Windows(en)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00423>
For windows(de)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00424>
For Windows(es)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00425>
For Windows(fr)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00426>
For Windows(it)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00427>
For Windows(ja)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00428>
For Windows(ko)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00429>
For Windows(nl)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00430>
For Windows(pt)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00431>
For Windows(ru)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00432>
For Windows(zh)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00433>
For Linux(en)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00434>
For Linux(de)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00435>
For Linux(es)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00436>
For Linux(fr)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00437>
For Linux(it)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00438>
For Linux(ja)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00439>
For Linux(ko)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00440>
For Linux(nl)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00441>
For Linux(pt)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00442>
For Linux(ru)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00443>
For Linux(zh)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00444>
HP Asset Manager v9.3x
Install patch v9.32.P2
For Windows(en)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00398>
For Windows(de)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00399>
For Windows(es)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00400>
For Windows(fr)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00401>
For Windows(it)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00402>
For Windows(ja)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00403>
For Windows(ko)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00404>
For Windows(nl)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00405>
For Windows(pt)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00406>
For Windows(ru)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00407>
For Windows(zh)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00408>
For Linux(en)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00409>
For Linux (de)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00410>
For Linux (es)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00411>
For Linux (fr)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00412>
For Linux (it)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00413>
For Linux (ja)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00414>
For Linux (ko)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00415>
For Linux (nl)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00416>
For Linux (pt)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00417>
For Linux (ru)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00418>
For Linux (zh)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00419>
For AIX ANSI (en de es fr it nl pt)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00420>
For HPUX ANSI (en de es fr it nl pt)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00421>
For Solaris ANSI (en de es fr it nl pt)
<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00422>
HP Asset Manager v5.2x
upgrade to v9.41.P1
HISTORY
Version:1 (rev.1) - 19 August 2014 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer’s patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to [email protected].
Report: To report a potential security vulnerability with any HP supported
product, send Email to: [email protected]
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
<http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins>
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
<https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/>
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided “as is”
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.`
We are not aware of further vendor information regarding this vulnerability.
Notified: June 02, 2014 Updated: June 16, 2014
Affected
We have not received a statement from the vendor.
Please see the links below for more information.
Notified: June 02, 2014 Updated: June 09, 2014
Affected
We have not received a statement from the vendor.
Please see the following link for more information.
Updated: October 26, 2015
Affected
We provide information on this issue at the following URL:
<<http://jpn.nec.com/security-info/secinfo/nv15-011.html>>(only in Japanese)
<<http://jpn.nec.com/security-info/av14-002.html>>(only in Japanese)
We are not aware of further vendor information regarding this vulnerability.
Notified: June 02, 2014 Updated: September 10, 2014
Affected
Please see <http://nvidia.custhelp.com/app/answers/detail/a_id/3566>
for NVIDIA’s statement on this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2014 Updated: June 05, 2014
Affected
We have not received a statement from the vendor.
Please see the following URL for more information.
Notified: June 02, 2014 Updated: June 16, 2014
Affected
We have not received a statement from the vendor.
Please see the links below for more information.
Notified: June 02, 2014 Updated: June 05, 2014
Affected
We have not received a statement from the vendor.
Please see the following URL for more information.
Notified: June 02, 2014 Updated: June 09, 2014
Affected
We have not received a statement from the vendor.
Please see the following links for more information.
Notified: June 02, 2014 Updated: June 05, 2014
Affected
We have not received a statement from the vendor.
Please see the following URL for more information.
Notified: June 02, 2014 Updated: June 16, 2014
Affected
We have not received a statement from the vendor.
Please see the links below for more information.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
Notified: June 02, 2014 Updated: June 02, 2014
Unknown
We have not received a statement from the vendor.
View all 84 vendors __View less vendors __
Group | Score | Vector |
---|---|---|
Base | 6.4 | AV:A/AC:M/Au:N/C:C/I:P/A:N |
Temporal | 5 | E:POC/RL:OF/RC:C |
Environmental | 8.1 | CDP:H/TD:H/CR:H/IR:M/AR:L |
Thanks to KIKUCHI Masashi for reporting this vulnerability.
This document was written by Jared Allar.
CVE IDs: | CVE-2014-0224 |
---|---|
Date Public: | 2014-06-05 Date First Published: |
5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
0.974 High
EPSS
Percentile
99.9%