Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:garrettcom:magnum_managed_networks_software-6k:*:*:*:*:*:*:*:*", "matchCriteriaId": "3564543A-DC64-4F06-89E0-57C5FE02F981", "versionEndIncluding": "4.3.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:garrettcom:magnum_managed_networks_software-6k:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "8B161151-3ADD-4508-8C57-5F5C2172BDE2", "vulnerable": true}, {"criteria": "cpe:2.3:a:garrettcom:magnum_managed_networks_software-6k:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "89240310-0187-458F-8254-6B652E64C694", "vulnerable": true}, {"criteria": "cpe:2.3:a:garrettcom:magnum_managed_networks_software-6k:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "92FBDD0A-2D96-4C1B-941B-155803C6140E", "vulnerable": true}, {"criteria": "cpe:2.3:a:garrettcom:magnum_managed_networks_software-6k_secure:14.2:*:*:*:*:*:*:*", "matchCriteriaId": "15429057-8BAB-49D2-9265-1804114A92CB", "vulnerable": true}, {"criteria": "cpe:2.3:a:garrettcom:magnum_managed_networks_software-6k_secure:14.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E9435603-F884-43EB-8F6F-4F208AD61FAB", "vulnerable": true}, {"criteria": "cpe:2.3:a:garrettcom:magnum_managed_networks_software-6k_secure:14.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5B6F2E0B-5F40-43F2-9EFC-7FD4404B81F2", "vulnerable": true}, {"criteria": "cpe:2.3:a:garrettcom:magnum_managed_networks_software-6k_secure:14.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "337DC3F6-26C5-41A4-8AAF-CADC850CBD8F", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "The Management Software application in GarrettCom Magnum MNS-6K before 4.4.0, and 14.x before 14.4.0, has a hardcoded password for an administrative account, which allows local users to gain privileges via unspecified vectors."}, {"lang": "es", "value": "La aplicaci\u00f3n Management Software en GarrettCom Magnum MNS-6K anterior a 4.4.0, y 14.x anterior a 14.4.0, tiene una contrase\u00f1a codificada para una cuenta administrativa, permite a usuarios locales obtener privilegios a trav\u00e9s de vectores no especificados."}], "evaluatorImpact": "Per http://www.us-cert.gov/control_systems/pdf/ICSA-12-243-01.pdf \r\n\r\n\"An attacker with access to an established user account could remotely log into the affected system and elevate privileges to the administrative level, thereby circumventing the physical connect safeguards in place for administrative functions.\"", "id": "CVE-2012-3014", "lastModified": "2024-11-21T01:40:07.480", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 5.1, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-09-04T11:04:49.327", "references": [{"source": "ics-cert@hq.dhs.gov", "tags": ["Vendor Advisory"], "url": "http://www.garrettcom.com/techsupport/6k_dl/6k440_rn.pdf"}, {"source": "ics-cert@hq.dhs.gov", "tags": ["US Government Resource"], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-243-01.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.garrettcom.com/techsupport/6k_dl/6k440_rn.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["US Government Resource"], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-243-01.pdf"}], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-255"}], "source": "nvd@nist.gov", "type": "Primary"}]}