Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:intel:cli_auto-configuration_utility:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC9C0929-86A5-4745-8594-6D2ABE893160", "vulnerable": true}, {"criteria": "cpe:2.3:a:intel:client_system_setup_utility:*:*:*:*:*:*:*:*", "matchCriteriaId": "25AD73CC-DB7A-4F76-A654-264FF892D7FD", "vulnerable": true}, {"criteria": "cpe:2.3:a:intel:server_configuration_wizard:*:*:*:*:*:*:*:*", "matchCriteriaId": "43F662AC-9F90-485C-B4EC-50729055ED81", "vulnerable": true}, {"criteria": "cpe:2.3:a:intel:server_control:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC69514F-5F56-411A-85D1-553CA06D6393", "vulnerable": true}, {"criteria": "cpe:2.3:a:intel:system_setup_utility:*:*:*:*:*:*:*:*", "matchCriteriaId": "C096ECA2-B75C-4270-A4E0-915FEB6B8043", "vulnerable": true}, {"criteria": "cpe:2.3:h:intel:carrier_grade_server_tigpr2u:*:*:*:*:*:*:*:*", "matchCriteriaId": "93EBE6FC-77E4-4444-A378-9A82326D5867", "vulnerable": true}, {"criteria": "cpe:2.3:h:intel:carrier_grade_server_tsrlt2:*:*:*:*:*:*:*:*", "matchCriteriaId": "11B0E433-8C78-48A1-B29B-5FFFDEF1C072", "vulnerable": true}, {"criteria": "cpe:2.3:h:intel:carrier_grade_server_tsrmt2:*:*:*:*:*:*:*:*", "matchCriteriaId": "A80FF61B-35B9-4829-91C6-569E7FD3BFC5", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:hp:carrier_grade_server_cc2300:a6898a:*:*:*:*:*:*:*", "matchCriteriaId": "C4C19796-0267-4D57-AB95-F57AEF5A71AB", "vulnerable": true}, {"criteria": "cpe:2.3:h:hp:carrier_grade_server_cc2300:a6899a:*:*:*:*:*:*:*", "matchCriteriaId": "0F2332D3-3F29-4A86-89C5-85D5B5AF7EB1", "vulnerable": true}, {"criteria": "cpe:2.3:h:hp:carrier_grade_server_cc3300:a6900a:*:*:*:*:*:*:*", "matchCriteriaId": "5622C2AA-848F-4F1C-A6B5-17400EE8D6D3", "vulnerable": true}, {"criteria": "cpe:2.3:h:hp:carrier_grade_server_cc3300:a6901a:*:*:*:*:*:*:*", "matchCriteriaId": "3C6B394D-8FB5-46DB-B188-8BDF8A6664B9", "vulnerable": true}, {"criteria": "cpe:2.3:h:hp:carrier_grade_server_cc3310:a9862a:*:*:*:*:*:*:*", "matchCriteriaId": "26BA02BA-76CB-4C21-A1F4-562DFAFD6E21", "vulnerable": true}, {"criteria": "cpe:2.3:h:hp:carrier_grade_server_cc3310:a9863a:*:*:*:*:*:*:*", "matchCriteriaId": "9A8373A0-9705-4AF1-92DA-B1FA2FFBE2FD", "vulnerable": true}, {"criteria": "cpe:2.3:h:intel:entry_server_board_se7210tp1-e:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4205D11-F8F8-41F9-8094-FF111A8DCC6E", "vulnerable": true}, {"criteria": "cpe:2.3:h:intel:entry_server_platform_sr1325tp1-e:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFC6FAE8-E508-45C5-A83E-0D2881977837", "vulnerable": true}, {"criteria": "cpe:2.3:h:intel:server_board_scb2:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5BDA184-5403-4E1F-A1D7-BC34284D591A", "vulnerable": true}, {"criteria": "cpe:2.3:h:intel:server_board_sds2:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF71532C-13A1-44CE-BFC3-660320E16217", "vulnerable": true}, {"criteria": "cpe:2.3:h:intel:server_board_se7500wv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "329A7174-7400-47D8-8088-68C68C3EC768", "vulnerable": true}, {"criteria": "cpe:2.3:h:intel:server_board_se7501hg2:*:*:*:*:*:*:*:*", "matchCriteriaId": "02605733-0FD4-418E-AD7E-4A0783B056E7", "vulnerable": true}, {"criteria": "cpe:2.3:h:intel:server_board_shg2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C8F6BF2-E056-4630-97FC-70D60784FC8C", "vulnerable": true}, {"criteria": "cpe:2.3:h:intel:server_platform_spsh4:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3E28B33-A09D-451C-9DB8-15710CEF96E3", "vulnerable": true}, {"criteria": "cpe:2.3:h:intel:server_platform_sr870bh2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4ABD9F57-87A6-4347-A211-E45F43688DBD", "vulnerable": true}, {"criteria": "cpe:2.3:h:intel:server_platform_sr870bn4:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD988002-5D12-423B-8F9E-868647F29DEF", "vulnerable": true}, {"criteria": "cpe:2.3:h:intel:server_platform_srsh4:*:*:*:*:*:*:*:*", "matchCriteriaId": "48B34000-BD33-4AE0-9C40-A2ED5BF5E257", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The firmware for Intelligent Platform Management Interface (IPMI) 1.5-based Intel Server Boards and Platforms is shipped with an Authentication Type Enables parameter set to an invalid None parameter, which allows remote attackers to obtain sensitive information when LAN management functionality is enabled."}], "id": "CVE-2004-2600", "lastModified": "2025-04-03T01:03:51.193", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2004-12-31T05:00:00.000", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "ftp://download.intel.com/support/motherboards/server/sb/aa6791invalidlanconfiguration040504.pdf"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/11315"}, {"source": "cve@mitre.org", "url": "http://support.intel.com/support/motherboards/server/sb/CS-010422.htm"}, {"source": "cve@mitre.org", "url": "http://www.osvdb.org/4978"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/10068"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15775"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "ftp://download.intel.com/support/motherboards/server/sb/aa6791invalidlanconfiguration040504.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/11315"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.intel.com/support/motherboards/server/sb/CS-010422.htm"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/4978"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/10068"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15775"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}