Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "285AA3DB-D702-4F55-A6B6-99F6BC12B1DF", "versionEndIncluding": "i7.0.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i2:*:*:*:*:*:*:*", "matchCriteriaId": "FCE92B3E-2606-4309-9462-E0529A967AC3", "vulnerable": true}, {"criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i3:*:*:*:*:*:*:*", "matchCriteriaId": "EC8B4BB2-1E77-4980-BFD2-3030703C27C2", "vulnerable": true}, {"criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i3.1:*:*:*:*:*:*:*", "matchCriteriaId": "8AF16C0F-1D0B-45DB-BDBE-3400DEC20B9A", "vulnerable": true}, {"criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i4:*:*:*:*:*:*:*", "matchCriteriaId": "0ADF92E7-1E86-432F-990A-D2B032329C0D", "vulnerable": true}, {"criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i5:*:*:*:*:*:*:*", "matchCriteriaId": "85452B6E-BD5E-436B-BC5C-F91F68FD19A7", "vulnerable": true}, {"criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3FB27B5B-0E14-4866-88FF-83BA652E6CD2", "vulnerable": true}, {"criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i6:*:*:*:*:*:*:*", "matchCriteriaId": "94298513-64B2-40F5-AA01-27F5620217B3", "vulnerable": true}, {"criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i6.1:*:*:*:*:*:*:*", "matchCriteriaId": "12FB8F97-28EE-42D3-B793-6E7F36B15234", "vulnerable": true}, {"criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i7:*:*:*:*:*:*:*", "matchCriteriaId": "466D3BD8-0B2A-4DE6-BD23-118CF7AD3413", "vulnerable": true}, {"criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A8D2BEA7-216D-4202-8BE2-430CCCAD106F", "vulnerable": true}, {"criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:sp4:*:*:*:*:*:*:*", "matchCriteriaId": "68CA3AC1-4AC5-48BA-B749-CF29104093DC", "vulnerable": true}, {"criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:sp4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DAE34EB9-66D2-498D-A02D-7F5EAD923707", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:quantum:scalar_i500:5u:*:*:*:*:*:*:*", "matchCriteriaId": "C6AA8B64-A78C-4B51-B29B-21CF2AEF9484", "vulnerable": true}, {"criteria": "cpe:2.3:h:quantum:scalar_i500:14u:*:*:*:*:*:*:*", "matchCriteriaId": "E6FFB7DA-15EB-4053-9440-A30F8E434F5C", "vulnerable": true}, {"criteria": "cpe:2.3:h:quantum:scalar_i500:23u:*:*:*:*:*:*:*", "matchCriteriaId": "C39DFB77-7945-4CA0-9B66-AF3908FE515D", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:dell:powervault_ml6000_firmware:585g.gs003:*:*:*:*:*:*:*", "matchCriteriaId": "B993C619-EC72-47F2-AAE0-8EED9AAC7BF6", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:dell:powervault_ml6000:32u:*:*:*:*:*:*:*", "matchCriteriaId": "136C9AB1-37AE-43EE-BAAC-39277789B734", "vulnerable": true}, {"criteria": "cpe:2.3:h:dell:powervault_ml6000:41u:*:*:*:*:*:*:*", "matchCriteriaId": "33A96FD1-2005-41BE-ACE5-33AC136F7206", "vulnerable": true}, {"criteria": "cpe:2.3:h:dell:powervault_ml6010:5u:*:*:*:*:*:*:*", "matchCriteriaId": "CB0FF827-E40B-4DC0-9CAC-82922B827F35", "vulnerable": true}, {"criteria": "cpe:2.3:h:dell:powervault_ml6020:14u:*:*:*:*:*:*:*", "matchCriteriaId": "789D5925-AF4A-4CBA-B51F-FF6F1ADE5C6C", "vulnerable": true}, {"criteria": "cpe:2.3:h:dell:powervault_ml6030:23u:*:*:*:*:*:*:*", "matchCriteriaId": "B93C93C2-3FC1-4E5A-AC82-22EAFAA5B4CE", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ibm:ts3310_tape_library_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54D9D062-754E-49D8-94D9-81E15511A5D2", "versionEndIncluding": "605g.g002", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:ibm:ts3310_tape_library:3573:*:*:*:*:*:*:*", "matchCriteriaId": "0AC7FE3B-2E91-4A09-9C41-7F0CB198B0E5", "vulnerable": true}, {"criteria": "cpe:2.3:h:ibm:ts3310_tape_library:3576:*:*:*:*:*:*:*", "matchCriteriaId": "BE63555B-ADBE-45DA-9D98-22445A11FCA5", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors."}, {"lang": "es", "value": "La librer\u00eda de cintas Quantum Scalar i500 con el firmware antes de i7.0.3 (604G.GS00100), que tambi\u00e9n se distribuye como la librer\u00eda de cintas Dell ML6000 con el firmware antes de A20-00 (590G.GS00100) y como la librer\u00eda de cintas IBM TS3310 con el firmware antes de R6C (606G. GS001), utiliza contrase\u00f1as por defecto para las cuentas de usuario no especificados, lo cual facilita a los atacantes remotos a la hora de obtener acceso a trav\u00e9s de vectores desconocidos."}], "id": "CVE-2012-1844", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-03-22T10:17:11.127", "references": [{"source": "cve@mitre.org", "url": "http://osvdb.org/80372"}, {"source": "cve@mitre.org", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/913483"}, {"source": "cve@mitre.org", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"}, {"source": "cve@mitre.org", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"}, {"source": "cve@mitre.org", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/80372"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/913483"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"}], "sourceIdentifier": "cve@mitre.org", "vendorComments": [{"comment": "The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.", "lastModified": "2012-06-13T00:00:00", "organization": "Quantum Corporation"}], "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-255"}], "source": "nvd@nist.gov", "type": "Primary"}]}