Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:xerox:workcentre:12.060.17.000:*:*:*:*:*:*:*", "matchCriteriaId": "BF9C033D-37D1-445F-B0FC-5B388805506D", "vulnerable": true}, {"criteria": "cpe:2.3:h:xerox:workcentre:12.060.17.000:*:pro:*:*:*:*:*", "matchCriteriaId": "216F3E75-F438-4090-980E-E8E4895B7CA0", "vulnerable": true}, {"criteria": "cpe:2.3:h:xerox:workcentre:13.060.17.000:*:*:*:*:*:*:*", "matchCriteriaId": "FA3716B1-3B5F-44A5-A5A2-ADA965536D02", "vulnerable": true}, {"criteria": "cpe:2.3:h:xerox:workcentre:13.060.17.000:*:pro:*:*:*:*:*", "matchCriteriaId": "4A2E5932-2D90-48C2-93F7-D3040F872E35", "vulnerable": true}, {"criteria": "cpe:2.3:h:xerox:workcentre:14.060.17.000:*:*:*:*:*:*:*", "matchCriteriaId": "BEFAD4E9-11AC-425D-A95C-9C722177A51C", "vulnerable": true}, {"criteria": "cpe:2.3:h:xerox:workcentre:14.060.17.000:*:pro:*:*:*:*:*", "matchCriteriaId": "5EF56EDD-26FE-405B-9BAA-E5279E46FD32", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The SNMP implementation in Xerox WorkCentre and WorkCentre Pro before 12.050.03.000, 13.x before 13.050.03.000, and 14.x before 14.050.03.000 does not generate authentication failure traps, which allows remote attackers to more easily gain system access and obtain sensitive information via a brute force attack."}, {"lang": "es", "value": "La implementaci\u00f3n SNMP en Xerox WorkCentre y WorkCentre Pro anterior 12.050.03.000, 13.x anterior 13.050.03.000, y 14.x anterior 14.050.03.000 no genera validaci\u00f3n de fallos de trampa, lo cual permite a atacantes remotos, mas facilemente, ganar accesos en el sistema y obtener informaci\u00f3n sensible a trav\u00e9s de ataques por fuerza bruta."}], "id": "CVE-2006-6435", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2006-12-10T11:28:00.000", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/23265"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/23265"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}