Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:omron:ns_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF95403-DE01-4ABF-B877-6EC88268FCDC", "versionEndIncluding": "1.3", "versionStartIncluding": "1.1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:omron:ns10:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D65A565-79CF-48F7-89AA-B25D4126BC30", "vulnerable": false}, {"criteria": "cpe:2.3:h:omron:ns12:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5C66177-8822-4330-AB4E-0D18C06B4889", "vulnerable": false}, {"criteria": "cpe:2.3:h:omron:ns15:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ADD9BA5-F03C-4B69-A088-A46C08C90DC4", "vulnerable": false}, {"criteria": "cpe:2.3:h:omron:ns5:-:*:*:*:*:*:*:*", "matchCriteriaId": "095B49B3-A9A3-448A-B07B-7921285920B7", "vulnerable": false}, {"criteria": "cpe:2.3:h:omron:ns8:-:*:*:*:*:*:*:*", "matchCriteriaId": "360BDC8D-811F-4F63-9FFC-A81C6617D376", "vulnerable": false}, {"criteria": "cpe:2.3:h:omron:nsh5:-:*:*:*:*:*:*:*", "matchCriteriaId": "F131D0DE-3CD9-4EFF-9D0E-8B6A896DEA9F", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "OMRON NS devices 1.1 through 1.3 allow remote attackers to bypass authentication via a direct request to the .html file for a specific screen, as demonstrated by monitor.html."}, {"lang": "es", "value": "Los dispositivos OMRON NS desde la versi\u00f3n 1.1 hasta la 1.3 permite que los atacantes remotos omitan la autenticaci\u00f3n mediante una petici\u00f3n directa al archivo .html para una pantalla espec\u00edfica, tal y como queda demostrado en monitor.html."}], "id": "CVE-2018-6624", "lastModified": "2024-11-21T04:11:00.960", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-02-05T18:29:00.390", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "http://misteralfa-hack.blogspot.cl/2018/02/otomron-login-bypass.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://misteralfa-hack.blogspot.cl/2018/02/otomron-login-bypass.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-425"}], "source": "nvd@nist.gov", "type": "Primary"}]}