Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:v60_firmware:1.07:*:*:*:*:*:*:*", "matchCriteriaId": "6D8A07AF-7B65-4D49-938C-AC3782C7185A", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:v60:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD40B4F0-9CB1-45A5-A5E6-1480D315B5CD", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:v60ka_firmware:1.07:*:*:*:*:*:*:*", "matchCriteriaId": "CC912BB2-BB1F-4A51-86FF-FB807038E58E", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:v60ka:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EBAAE16-4FF2-48CB-B391-9D59A4439166", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:v65_firmware:1.07:*:*:*:*:*:*:*", "matchCriteriaId": "C4BC38A1-E262-426D-9E08-98B7BD1E0A88", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:v65:-:*:*:*:*:*:*:*", "matchCriteriaId": "800EFF7B-D91E-45C0-92E6-5E2EB6FDB6D9", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:v80g_firmware:1.07:*:*:*:*:*:*:*", "matchCriteriaId": "DF595BF1-5355-4036-82C7-A8D4F93D20D9", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:v80g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CAD3CCD-8A8C-4FB1-A6AA-3CE457330253", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t80w_firmware:1.07:*:*:*:*:*:*:*", "matchCriteriaId": "1AB17431-657F-47DC-8902-0529F5E87AE8", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t80w:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7D7EF6E-AD3E-4043-BEE4-377A74BC17E8", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t80q_firmware:1.07:*:*:*:*:*:*:*", "matchCriteriaId": "C80CD55F-968D-486D-93A7-4AA6742B59A4", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t80q:-:*:*:*:*:*:*:*", "matchCriteriaId": "6923C2A8-F40F-407E-91B1-8FAD9E5A32FD", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t100w_firmware:1.07:*:*:*:*:*:*:*", "matchCriteriaId": "C9FA7288-43E5-4C84-97D0-C3052200BC64", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t100w:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B219C9-3B50-477B-9A1B-C3C4FA9DFA6F", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t100q_firmware:1.07:*:*:*:*:*:*:*", "matchCriteriaId": "AEFB7EE3-B593-445D-98B3-C0F99E8CD896", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t100q:-:*:*:*:*:*:*:*", "matchCriteriaId": "853B7819-1FF4-45DA-B68F-3AA3C231CF15", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t110w_firmware:1.07:*:*:*:*:*:*:*", "matchCriteriaId": "61D13EA3-E18C-4A43-8F2B-D00417AC5292", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t110w:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3209D24-A994-40E0-BB9E-423E81BF39ED", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t110q_firmware:1.07:*:*:*:*:*:*:*", "matchCriteriaId": "2C9B1957-8458-4FCF-A3DC-C58546F7B0CB", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t110q:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EEBE568-2A96-415C-8D04-F4D39CBE9F2C", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t130w_firmware:1.07:*:*:*:*:*:*:*", "matchCriteriaId": "56788A9F-F7C4-4247-A628-74F5C7139344", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t130w:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC98DA8C-610F-4E42-84AF-2F42FA885DB2", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t130q_firmware:1.07:*:*:*:*:*:*:*", "matchCriteriaId": "089722B1-06AB-428E-8993-462BDAAD80DA", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t130q:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4CA96A7-10C8-4B59-9B16-CD1A43BAF38A", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t240ck_firmware:1.07:*:*:*:*:*:*:*", "matchCriteriaId": "CD65163F-A795-48C3-9498-9D35F8424B0F", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t240ck:-:*:*:*:*:*:*:*", "matchCriteriaId": "387C7FE6-482D-48D5-9BBF-55C7821E4E01", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Intellian Satellite TV antennas t-Series and v-Series, firmware version 1.07, uses non-random default credentials of: ftp/ftp or intellian:12345678. A remote network attacker can gain elevated access to a vulnerable device."}, {"lang": "es", "value": "Las antenas de TV por sat\u00e9lite Intellian en las series t y v, con la versi\u00f3n 1.07 de firmware, emplean credenciales por defecto no aleatorias de: ftp/ftp o intellian:12345678. Un atacante remoto en la red puede obtener acceso elevado a un dispositivo vulnerable."}], "id": "CVE-2016-6551", "lastModified": "2024-11-21T02:56:20.333", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-07-13T20:29:00.613", "references": [{"source": "cret@cert.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/93808"}, {"source": "cret@cert.org", "tags": ["Third Party Advisory", "US Government Resource"], "url": "https://www.kb.cert.org/vuls/id/200907"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/93808"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "US Government Resource"], "url": "https://www.kb.cert.org/vuls/id/200907"}], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-255"}], "source": "cret@cert.org", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-255"}], "source": "nvd@nist.gov", "type": "Primary"}]}