Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:emc:isilon_insightiq:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4D35198-BA21-445D-9693-BAF66AE61099", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:isilon_insightiq:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "341857D8-1DBB-479F-9C56-D17ACFC8117F", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:isilon_insightiq:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D91524EB-ECF4-433A-A1D9-7574FAA3F58C", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:isilon_insightiq:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B9ABABD-2320-4C27-BFD7-1E6E34B453C7", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:isilon_insightiq:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "47BB054C-6573-4516-B74A-5B6BED8A82C9", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:isilon_insightiq:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "87999B65-7C3D-474A-90CD-00585641027E", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:isilon_insightiq:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "0AE8CFAC-5941-4A39-81DD-2AB3FEA90A4C", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:isilon_insightiq:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "618AE0B4-5DAD-44DC-9C50-4E68873B0931", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:isilon_insightiq:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B29B844-C048-42EE-8343-A9F23C513F21", "vulnerable": true}, {"criteria": "cpe:2.3:a:emc:isilon_insightiq:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "722FF243-ECAE-4193-ACC3-25AF6FB1D571", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "EMC Isilon InsightIQ 4.1.0, 4.0.1, 4.0.0, 3.2.2, 3.2.1, 3.2.0, 3.1.1, 3.1.0, 3.0.1, 3.0.0 is affected by an authentication bypass vulnerability that could potentially be exploited by attackers to compromise the affected system."}, {"lang": "es", "value": "EMC Isilon InsightIQ 4.1.0, 4.0.1, 4.0.0, 3.2.2, 3.2.1, 3.2.0, 3.1.1, 3.1.0, 3.0.1, 3.0.0 est\u00e1 afectado por una vulnerabilidad de elusi\u00f3n de autenticaci\u00f3n que podr\u00eda ser explotada potencialmente por atacantes para comprometer el sistema afectado."}], "id": "CVE-2017-2765", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-02-08T17:59:00.153", "references": [{"source": "security_alert@emc.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/archive/1/540100/30/0/threaded"}, {"source": "security_alert@emc.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/95945"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/archive/1/540100/30/0/threaded"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/95945"}], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-287"}], "source": "nvd@nist.gov", "type": "Primary"}]}