Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mimosa:backhaul_radios:*:*:*:*:*:*:*:*", "matchCriteriaId": "F469E35D-A0BC-4E8D-8CD6-F5BF223F7823", "versionEndIncluding": "2.2.1", "vulnerable": true}, {"criteria": "cpe:2.3:o:mimosa:client_radios:*:*:*:*:*:*:*:*", "matchCriteriaId": "30E63E47-17AF-470D-8C30-19FAE29B1828", "versionEndIncluding": "2.2.1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "An information-leakage issue was discovered on Mimosa Client Radios before 2.2.3 and Mimosa Backhaul Radios before 2.2.3. There is a page in the web interface that will show you the device's serial number, regardless of whether or not you have logged in. This information-leakage issue is relevant because there is another page (accessible without any authentication) that allows you to remotely factory reset the device simply by entering the serial number."}, {"lang": "es", "value": "Se detect\u00f3 un problema de filtrado de informaci\u00f3n en Mimosa Client Radios anterior a versi\u00f3n 2.2.3 y Mimosa Backhaul Radios anterior a versi\u00f3n 2.2.3. Existe una p\u00e1gina en la interfaz web que le mostrar\u00e1 el n\u00famero de serial del dispositivo, independientemente de si ha iniciado sesi\u00f3n o no. Este problema de filtrado de informaci\u00f3n es relevante porque hay otra p\u00e1gina (accesible sin ninguna autenticaci\u00f3n) que le permite restablecer remotamente el dispositivo de f\u00e1brica simplemente mediante el ingreso del n\u00famero de serie."}], "id": "CVE-2017-9134", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-05-21T21:29:00.283", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "http://blog.iancaling.com/post/160596244178"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://blog.iancaling.com/post/160596244178"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-200"}], "source": "nvd@nist.gov", "type": "Primary"}]}