CVE-2014-2955
Published Jul 14, 2014
Last updated 10 years ago
Overview
- Description
- Raritan PX before 1.5.11 on DPXR20A-16 devices allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password.
- Source
- cret@cert.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-287
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:raritan:px:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EB88ED3-4EC6-41A2-9643-1E4E655F4FDB", "versionEndIncluding": "1.5.8" }, { "criteria": "cpe:2.3:o:raritan:px:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4981CC45-6D41-4093-830B-ACD8540F70C3" }, { "criteria": "cpe:2.3:o:raritan:px:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C99F00E-1CEC-4FCF-B3AB-9BC830F195AB" }, { "criteria": "cpe:2.3:o:raritan:px:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "930503F9-20FB-4BE5-A9D5-F64FFA84C070" }, { "criteria": "cpe:2.3:o:raritan:px:1.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A62AD48A-0F43-44BC-A3C4-950918662D57" }, { "criteria": "cpe:2.3:o:raritan:px:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CA82A4A-7E33-4FF7-AF3D-E0B894C0E24A" }, { "criteria": "cpe:2.3:o:raritan:px:1.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9951DBE8-887B-42B8-A0C9-19A6FCCC9086" }, { "criteria": "cpe:2.3:o:raritan:px:1.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93E27CC4-B079-4CBA-B930-53337058AD73" }, { "criteria": "cpe:2.3:o:raritan:px:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "982E62B7-9513-483B-B414-70B3298C09D0" }, { "criteria": "cpe:2.3:o:raritan:px:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC03E84B-DF14-4BC0-953B-D8854D406AEC" }, { "criteria": "cpe:2.3:o:raritan:px:1.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "534A13FE-26B4-4346-A75D-8BA8F1728BF6" }, { "criteria": "cpe:2.3:o:raritan:px:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2963395-7506-4263-AB83-D0AA1B132FC4" }, { "criteria": "cpe:2.3:o:raritan:px:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "441DF8F5-D2E1-45D4-B528-2E80CC1F4509" }, { "criteria": "cpe:2.3:o:raritan:px:1.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92164018-D547-434E-8544-B0D999822A9D" }, { "criteria": "cpe:2.3:o:raritan:px:1.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6AACD85-A9B8-4CE1-A074-C93202EDD08D" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:raritan:dpxr20a-16:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C879AA2-C108-47E9-9CFA-EF82D36E488D" } ], "operator": "OR" } ], "operator": "AND" } ]