10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
0.975 High
EPSS
Percentile
100.0%
The remote host is running a version of Mac OS X that is 10.6.8 or later but prior to 10.11. It is, therefore, affected by multiple vulnerabilities in the following components :
Note that successful exploitation of the most serious issues can result in arbitrary code execution.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(86270);
script_version("1.15");
script_cvs_date("Date: 2019/06/20 11:24:24");
script_cve_id(
"CVE-2013-3951",
"CVE-2014-2532",
"CVE-2014-3618",
"CVE-2014-6277",
"CVE-2014-7186",
"CVE-2014-7187",
"CVE-2014-8080",
"CVE-2014-8090",
"CVE-2014-8146",
"CVE-2014-8147",
"CVE-2014-8611",
"CVE-2014-9425",
"CVE-2014-9427",
"CVE-2014-9652",
"CVE-2014-9705",
"CVE-2014-9709",
"CVE-2015-0231",
"CVE-2015-0232",
"CVE-2015-0235",
"CVE-2015-0273",
"CVE-2015-0286",
"CVE-2015-0287",
"CVE-2015-1351",
"CVE-2015-1352",
"CVE-2015-1855",
"CVE-2015-2301",
"CVE-2015-2305",
"CVE-2015-2331",
"CVE-2015-2348",
"CVE-2015-2783",
"CVE-2015-2787",
"CVE-2015-3329",
"CVE-2015-3330",
"CVE-2015-3414",
"CVE-2015-3415",
"CVE-2015-3416",
"CVE-2015-3785",
"CVE-2015-3801",
"CVE-2015-5522",
"CVE-2015-5523",
"CVE-2015-5764",
"CVE-2015-5765",
"CVE-2015-5767",
"CVE-2015-5780",
"CVE-2015-5788",
"CVE-2015-5789",
"CVE-2015-5790",
"CVE-2015-5791",
"CVE-2015-5792",
"CVE-2015-5793",
"CVE-2015-5794",
"CVE-2015-5795",
"CVE-2015-5796",
"CVE-2015-5797",
"CVE-2015-5798",
"CVE-2015-5799",
"CVE-2015-5800",
"CVE-2015-5801",
"CVE-2015-5802",
"CVE-2015-5803",
"CVE-2015-5804",
"CVE-2015-5805",
"CVE-2015-5806",
"CVE-2015-5807",
"CVE-2015-5808",
"CVE-2015-5809",
"CVE-2015-5810",
"CVE-2015-5811",
"CVE-2015-5812",
"CVE-2015-5813",
"CVE-2015-5814",
"CVE-2015-5815",
"CVE-2015-5816",
"CVE-2015-5817",
"CVE-2015-5818",
"CVE-2015-5819",
"CVE-2015-5820",
"CVE-2015-5821",
"CVE-2015-5822",
"CVE-2015-5823",
"CVE-2015-5824",
"CVE-2015-5825",
"CVE-2015-5826",
"CVE-2015-5827",
"CVE-2015-5828",
"CVE-2015-5830",
"CVE-2015-5831",
"CVE-2015-5833",
"CVE-2015-5836",
"CVE-2015-5839",
"CVE-2015-5840",
"CVE-2015-5841",
"CVE-2015-5842",
"CVE-2015-5847",
"CVE-2015-5849",
"CVE-2015-5851",
"CVE-2015-5853",
"CVE-2015-5854",
"CVE-2015-5855",
"CVE-2015-5858",
"CVE-2015-5860",
"CVE-2015-5862",
"CVE-2015-5863",
"CVE-2015-5864",
"CVE-2015-5865",
"CVE-2015-5866",
"CVE-2015-5867",
"CVE-2015-5868",
"CVE-2015-5869",
"CVE-2015-5870",
"CVE-2015-5871",
"CVE-2015-5872",
"CVE-2015-5873",
"CVE-2015-5874",
"CVE-2015-5875",
"CVE-2015-5876",
"CVE-2015-5877",
"CVE-2015-5878",
"CVE-2015-5879",
"CVE-2015-5881",
"CVE-2015-5882",
"CVE-2015-5883",
"CVE-2015-5884",
"CVE-2015-5885",
"CVE-2015-5887",
"CVE-2015-5888",
"CVE-2015-5889",
"CVE-2015-5890",
"CVE-2015-5891",
"CVE-2015-5893",
"CVE-2015-5894",
"CVE-2015-5896",
"CVE-2015-5897",
"CVE-2015-5899",
"CVE-2015-5900",
"CVE-2015-5901",
"CVE-2015-5902",
"CVE-2015-5903",
"CVE-2015-5912",
"CVE-2015-5913",
"CVE-2015-5914",
"CVE-2015-5915",
"CVE-2015-5917",
"CVE-2015-5922",
"CVE-2015-7760",
"CVE-2015-7761"
);
script_bugtraq_id(
60440,
66355,
69573,
70152,
70154,
70165,
70935,
71230,
71621,
71800,
71833,
71929,
71932,
72325,
72505,
72539,
72541,
72611,
72701,
73031,
73037,
73225,
73227,
73306,
73431,
73434,
74204,
74228,
74239,
74240,
74446,
74457,
75037,
76763,
76764,
76765,
76766,
76908,
76909,
76910,
76911,
79707
);
script_xref(name:"CERT", value:"967332");
script_xref(name:"IAVA", value:"2014-A-0142");
script_xref(name:"APPLE-SA", value:"APPLE-SA-2015-09-30-3");
script_name(english:"Mac OS X < 10.11 Multiple Vulnerabilities (GHOST)");
script_summary(english:"Checks the version of Mac OS X.");
script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a Mac OS X update that fixes multiple
security vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The remote host is running a version of Mac OS X that is 10.6.8 or
later but prior to 10.11. It is, therefore, affected by multiple
vulnerabilities in the following components :
- Address Book
- AirScan
- apache_mod_php
- Apple Online Store Kit
- AppleEvents
- Audio
- bash
- Certificate Trust Policy
- CFNetwork Cookies
- CFNetwork FTPProtocol
- CFNetwork HTTPProtocol
- CFNetwork Proxies
- CFNetwork SSL
- CoreCrypto
- CoreText
- Dev Tools
- Disk Images
- dyld
- EFI
- Finder
- Game Center
- Heimdal
- ICU
- Install Framework Legacy
- Intel Graphics Driver
- IOAudioFamily
- IOGraphics
- IOHIDFamily
- IOStorageFamily
- Kernel
- libc
- libpthread
- libxpc
- Login Window
- lukemftpd
- Mail
- Multipeer Connectivity
- NetworkExtension
- Notes
- OpenSSH
- OpenSSL
- procmail
- remote_cmds
- removefile
- Ruby
- Safari
- Safari Downloads
- Safari Extensions
- Safari Safe Browsing
- Security
- SMB
- SQLite
- Telephony
- Terminal
- tidy
- Time Machine
- WebKit
- WebKit CSS
- WebKit JavaScript Bindings
- WebKit Page Loading
- WebKit Plug-ins
Note that successful exploitation of the most serious issues can
result in arbitrary code execution.");
script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-us/HT205267");
# https://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?76b3b492");
# https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c7a6ddbd");
script_set_attribute(attribute:"solution", value:
"Upgrade to Mac OS X 10.11 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-6277");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'Mac OS X 10.9.5 / 10.10.5 - rsh/libmalloc Privilege Escalation');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
script_set_attribute(attribute:"canvas_package", value:'CANVAS');
script_set_attribute(attribute:"vuln_publication_date", value:"2013/04/26");
script_set_attribute(attribute:"patch_publication_date", value:"2015/09/30");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/10/05");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x");
script_set_attribute(attribute:"in_the_news", value:"true");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"MacOS X Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl", "os_fingerprint.nasl");
script_require_ports("Host/MacOSX/Version", "Host/OS");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
os = get_kb_item("Host/MacOSX/Version");
if (!os)
{
os = get_kb_item_or_exit("Host/OS");
if ("Mac OS X" >!< os) audit(AUDIT_OS_NOT, "Mac OS X");
c = get_kb_item("Host/OS/Confidence");
if (c <= 70) exit(1, "Can't determine the host's OS with sufficient confidence.");
}
if (!os) audit(AUDIT_OS_NOT, "Mac OS X");
match = eregmatch(pattern:"Mac OS X ([0-9]+(\.[0-9]+)+)", string:os);
if (isnull(match)) exit(1, "Failed to parse the Mac OS X version ('" + os + "').");
version = match[1];
if (
version !~ "^10\.6\.([89]|[1-9][0-9]+)" &&
version !~ "^10\.([7-9]|10)\."
) audit(AUDIT_OS_NOT, "Mac OS X 10.6.8 or later", "Mac OS X "+version);
fixed_version = "10.11";
if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)
{
if (report_verbosity > 0)
{
report = '\n Installed version : ' + version +
'\n Fixed version : ' + fixed_version +
'\n';
security_hole(port:0, extra:report);
}
else security_hole(0);
exit(0);
}
else exit(0, "The host is not affected since it is running Mac OS X "+version+".");
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3951
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8090
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8146
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8147
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8611
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9425
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9427
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9652
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9705
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0232
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0273
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1351
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1352
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1855
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2301
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2348
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2783
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2787
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3329
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3330
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3785
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5522
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5523
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5764
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5765
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5767
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5780
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5790
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5792
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5794
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5796
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5797
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5798
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5800
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5802
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5803
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5806
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5807
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5808
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5810
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5811
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5813
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5816
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5818
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5819
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5820
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5821
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5822
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5824
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5825
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5826
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5827
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5828
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5830
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5831
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5833
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5836
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5839
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5840
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5841
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5842
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5847
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5849
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5851
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5853
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5854
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5855
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5858
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5860
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5862
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5863
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5864
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5865
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5866
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5867
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5868
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5869
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5870
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5871
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5872
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5873
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5874
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5875
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5876
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5877
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5878
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5879
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5881
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5882
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5883
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5884
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5885
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5887
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5888
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5889
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5890
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5891
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5894
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5896
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5897
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5899
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5900
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5901
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5902
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5903
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5912
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5913
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5914
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5915
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5917
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5922
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7760
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7761
www.nessus.org/u?76b3b492
www.nessus.org/u?c7a6ddbd
support.apple.com/en-us/HT205267
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
0.975 High
EPSS
Percentile
100.0%