Show plain JSON{"id": "CVE-2013-7180", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-08-15T11:15:42.827", "references": [{"url": "http://www.kb.cert.org/vuls/id/602006", "tags": ["Third Party Advisory", "US Government Resource"], "source": "cret@cert.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Cobham SAILOR 900 VSAT; SAILOR FleetBroadBand 150, 250, and 500; EXPLORER BGAN; and AVIATOR 200, 300, 350, and 700D devices do not properly restrict password recovery, which allows attackers to obtain administrative privileges by leveraging physical access or terminal access to spoof a reset code."}, {"lang": "es", "value": "Los dispositivos Cobham SAILOR 900 VSAT; SAILOR FleetBroadBand 150, 250, y 500; EXPLORER BGAN; y AVIATOR 200, 300, 350, y 700D no restringen debidamente la recuperaci\u00f3n de contrase\u00f1as, lo que permite a atacantes obtener privilegios de administraci\u00f3n mediante el aprovechamiento del acceso f\u00edsico o acceso al terminal para falsificar un c\u00f3digo de restablecimiento."}], "lastModified": "2014-08-15T17:02:35.697", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cobham:aviator_200:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA64EF41-6BDC-443A-897F-F172C3395A94"}, {"criteria": "cpe:2.3:h:cobham:aviator_300:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EA1304E-3FB6-45CE-8C6D-1CBD5FB74893"}, {"criteria": "cpe:2.3:h:cobham:aviator_350:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9798369A-9E46-4408-BB02-9C722E166299"}, {"criteria": "cpe:2.3:h:cobham:aviator_700d:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD3FE641-E175-4CC4-90BF-955B1C0217F3"}, {"criteria": "cpe:2.3:h:cobham:explorer_bgan:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "555E0CCB-642E-441E-A403-93DD00A5C745"}, {"criteria": "cpe:2.3:h:cobham:sailor_900_vsat:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7704EFE7-FCF8-4109-AE65-B162604E0025"}, {"criteria": "cpe:2.3:h:cobham:sailor_fleetbroadband_150:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12AF4243-F56F-4FEC-82EF-0A02C0AB54CA"}, {"criteria": "cpe:2.3:h:cobham:sailor_fleetbroadband_250:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49E0EA46-3D1B-40A7-8CB1-9EFA53954600"}, {"criteria": "cpe:2.3:h:cobham:sailor_fleetbroadband_500:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEBC3788-5053-46B4-A197-55102D2FB004"}], "operator": "OR"}]}], "evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/640.html\">CWE-640: Weak Password Recovery Mechanism for Forgotten Password</a>", "sourceIdentifier": "cret@cert.org"}