CVE-2016-2310
Published Jun 9, 2016
Last updated 4 years ago
Overview
- Description
- General Electric (GE) Multilink ML800, ML1200, ML1600, and ML2400 switches with firmware before 5.5.0 and ML810, ML3000, and ML3100 switches with firmware before 5.5.0k have hardcoded credentials, which allows remote attackers to modify configuration settings via the web interface.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-798
Evaluator
- Comment
- CWE-798: Use of Hard-coded Credentials
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilink_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57707326-C7A4-412B-BF90-98E12CF97312", "versionEndIncluding": "5.5.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilink_ml1200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1179F179-510A-4A97-8365-B81C0E0FC605" }, { "criteria": "cpe:2.3:h:ge:multilink_ml1600:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "620703E4-1D78-44CB-B353-517A8AB2A815" }, { "criteria": "cpe:2.3:h:ge:multilink_ml2400:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "426A283A-540C-43F2-8397-52668BADDEB8" }, { "criteria": "cpe:2.3:h:ge:multilink_ml800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9A00E85C-1B21-43F7-8323-F759216BFB90" }, { "criteria": "cpe:2.3:h:ge:multilink_ml810:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "81DC26E5-D3D7-41C6-B654-B06FA0461451" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilink_ml3000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7EE40202-1D8F-406E-8281-B67DCF5E8501" }, { "criteria": "cpe:2.3:h:ge:multilink_ml3100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D72F9922-A473-4076-91E3-CF3899C179D7" }, { "criteria": "cpe:2.3:h:ge:multilink_ml810:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "81DC26E5-D3D7-41C6-B654-B06FA0461451" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilink_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF7A9653-BF61-4480-B349-577C6155B991", "versionEndIncluding": "5.5.0k" } ], "operator": "OR" } ], "operator": "AND" } ]