CVE-2012-2187
Published Sep 25, 2012
Last updated 12 years ago
Overview
- Description
- IBM Remote Supervisor Adapter II firmware for System x3650, x3850 M2, and x3950 M2 1.13 and earlier generates weak RSA keys, which makes it easier for attackers to defeat cryptographic protection mechanisms via unspecified vectors.
- Source
- psirt@us.ibm.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-310
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:remote_supervisor_adapter_ii_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E736748-3B17-4448-A0A3-9FA7958B76DF", "versionEndIncluding": "1.13" }, { "criteria": "cpe:2.3:a:ibm:remote_supervisor_adapter_ii_firmware:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1FD0CE1-7E7E-48D7-A58B-99FDA5F1E534" }, { "criteria": "cpe:2.3:a:ibm:remote_supervisor_adapter_ii_firmware:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "550B79DE-8189-4CC4-9DC7-0C8718BDE339" }, { "criteria": "cpe:2.3:a:ibm:remote_supervisor_adapter_ii_firmware:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E746090-0764-4A98-AC4C-D2F9BDF80602" }, { "criteria": "cpe:2.3:a:ibm:remote_supervisor_adapter_ii_firmware:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "374C7AC6-1825-4814-8DFA-405254E405EA" }, { "criteria": "cpe:2.3:a:ibm:remote_supervisor_adapter_ii_firmware:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC9EC609-A69C-4793-9769-84DF9AFE2E27" }, { "criteria": "cpe:2.3:a:ibm:remote_supervisor_adapter_ii_firmware:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDD3419A-C62B-4BEF-BCD1-7AFE100BCA14" }, { "criteria": "cpe:2.3:a:ibm:remote_supervisor_adapter_ii_firmware:1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0826810A-8D83-4922-AE47-A2D00ADDA952" }, { "criteria": "cpe:2.3:a:ibm:remote_supervisor_adapter_ii_firmware:1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3851293-B6E6-4A7A-8EA3-442A2E77B772" }, { "criteria": "cpe:2.3:a:ibm:remote_supervisor_adapter_ii_firmware:1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E24E2370-30AE-4FB5-962A-A59773DAB672" }, { "criteria": "cpe:2.3:a:ibm:remote_supervisor_adapter_ii_firmware:1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F6E0B99-EA63-4E09-8F35-61FD435835AB" }, { "criteria": "cpe:2.3:a:ibm:remote_supervisor_adapter_ii_firmware:1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E98F8EA7-DC0A-49DE-8F38-8242191A71F0" }, { "criteria": "cpe:2.3:a:ibm:remote_supervisor_adapter_ii_firmware:1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDBBC639-9A61-4301-8D4A-FA742EABCF41" }, { "criteria": "cpe:2.3:a:ibm:remote_supervisor_adapter_ii_firmware:1.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70DC13FE-C1D4-4F60-8A69-9C0EA993A994" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:x3650:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C0C88593-6B6A-4772-AF94-63A78FC93121" }, { "criteria": "cpe:2.3:h:ibm:x3850:m2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DB8280F0-09FB-4BC6-B384-CF7CAC9DF3EA" }, { "criteria": "cpe:2.3:h:ibm:x3950:m2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "68E36E55-9F24-4E8B-927D-AFBA5514389A" } ], "operator": "OR" } ], "operator": "AND" } ]