Vulnerabilites related to airspan - airvelocity_1500
Vulnerability from fkie_nvd
Published
2022-08-16 01:15
Modified
2024-11-21 07:12
Severity ?
Summary
Airspan AirVelocity 1500 prior to software version 15.18.00.2511 is vulnerable to injection leading to XSS in the SNMP community field in the eNodeB's web management UI. This issue may affect other AirVelocity and AirSpeed models.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://helpdesk.airspan.com/browse/TRN3-1694 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://helpdesk.airspan.com/browse/TRN3-1694 | Permissions Required, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
airspan | airvelocity_1500_firmware | * | |
airspan | airvelocity_1500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:airvelocity_1500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F130B19-2EC0-46BE-905A-2694196798C7", "versionEndExcluding": "15.18.00.2511", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:airvelocity_1500:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5DBFEA-0C64-4E87-A11E-6C850D4C87CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Airspan AirVelocity 1500 prior to software version 15.18.00.2511 is vulnerable to injection leading to XSS in the SNMP community field in the eNodeB\u0027s web management UI. This issue may affect other AirVelocity and AirSpeed models." }, { "lang": "es", "value": "Airspan AirVelocity 1500 versiones anteriores a de software 15.18.00.2511, es vulnerable a una inyecci\u00f3n que conlleva a un ataque det tipo XSS en el campo de comunidad SNMP de la interfaz de usuario de administraci\u00f3n web del eNodeB. Este problema puede afectar a otros modelos AirVelocity y AirSpeed." } ], "id": "CVE-2022-36311", "lastModified": "2024-11-21T07:12:45.460", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-16T01:15:13.960", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1694" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1694" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-16 01:15
Modified
2024-11-21 07:12
Severity ?
Summary
Airspan AirVelocity 1500 software version 15.18.00.2511 lacks CSRF protections in the eNodeB's web management UI. This issue may affect other AirVelocity and AirSpeed models.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://helpdesk.airspan.com/browse/TRN3-1695 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://helpdesk.airspan.com/browse/TRN3-1695 | Permissions Required, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
airspan | airvelocity_1500_firmware | 15.18.00.2511 | |
airspan | airvelocity_1500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:airvelocity_1500_firmware:15.18.00.2511:*:*:*:*:*:*:*", "matchCriteriaId": "7026B344-23A5-46F6-B17A-098A976EA2CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:airvelocity_1500:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5DBFEA-0C64-4E87-A11E-6C850D4C87CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Airspan AirVelocity 1500 software version 15.18.00.2511 lacks CSRF protections in the eNodeB\u0027s web management UI. This issue may affect other AirVelocity and AirSpeed models." }, { "lang": "es", "value": "Airspan AirVelocity 1500 versi\u00f3n 15.18.00.2511, carece de protecciones de tipo CSRF en la interfaz de usuario de administraci\u00f3n web del eNodeB. Este problema puede afectar a otros modelos de AirVelocity y AirSpeed." } ], "id": "CVE-2022-36312", "lastModified": "2024-11-21T07:12:45.580", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-16T01:15:14.200", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1695" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-16 01:15
Modified
2024-11-21 07:12
Severity ?
Summary
Airspan AirVelocity 1500 software versions prior to 15.18.00.2511 have a root command injection vulnerability in the ActiveBank parameter of the recoverySubmit.cgi script running on the eNodeB's web management UI. This issue may affect other AirVelocity and AirSpeed models.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4 | Exploit, Third Party Advisory | |
cve-assign@fb.com | https://helpdesk.airspan.com/browse/TRN3-1690 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://helpdesk.airspan.com/browse/TRN3-1690 | Permissions Required, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
airspan | airvelocity_1500_firmware | * | |
airspan | airvelocity_1500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:airvelocity_1500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECF71DBB-8D4C-4A82-8F4B-3907062C1379", "versionEndIncluding": "15.18.00.2511", "versionStartIncluding": "9.3.0.01249", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:airvelocity_1500:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5DBFEA-0C64-4E87-A11E-6C850D4C87CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Airspan AirVelocity 1500 software versions prior to 15.18.00.2511 have a root command injection vulnerability in the ActiveBank parameter of the recoverySubmit.cgi script running on the eNodeB\u0027s web management UI. This issue may affect other AirVelocity and AirSpeed models." }, { "lang": "es", "value": "Airspan AirVelocity 1500 versiones del software anteriores a 15.18.00.2511, presentan una vulnerabilidad de inyecci\u00f3n de comandos de root en el par\u00e1metro ActiveBank del script recoverySubmit.cgi que se ejecuta en la interfaz de usuario de administraci\u00f3n web del eNodeB. Este problema puede afectar a otros modelos AirVelocity y AirSpeed." } ], "id": "CVE-2022-36309", "lastModified": "2024-11-21T07:12:45.207", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-16T01:15:13.707", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4" }, { "source": "cve-assign@fb.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1690" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1690" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-16 01:15
Modified
2024-11-21 07:12
Severity ?
Summary
Airspan AirVelocity 1500 software prior to version 15.18.00.2511 had NET-SNMP-EXTEND-MIB enabled on its snmpd service, enabling an attacker with SNMP write abilities to execute commands as root on the eNodeB. This issue may affect other AirVelocity and AirSpeed models.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm | Exploit, Third Party Advisory | |
cve-assign@fb.com | https://helpdesk.airspan.com/browse/TRN3-1689 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://helpdesk.airspan.com/browse/TRN3-1689 | Permissions Required, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
airspan | airvelocity_1500_firmware | * | |
airspan | airvelocity_1500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:airvelocity_1500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECF71DBB-8D4C-4A82-8F4B-3907062C1379", "versionEndIncluding": "15.18.00.2511", "versionStartIncluding": "9.3.0.01249", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:airvelocity_1500:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5DBFEA-0C64-4E87-A11E-6C850D4C87CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Airspan AirVelocity 1500 software prior to version 15.18.00.2511 had NET-SNMP-EXTEND-MIB enabled on its snmpd service, enabling an attacker with SNMP write abilities to execute commands as root on the eNodeB. This issue may affect other AirVelocity and AirSpeed models." }, { "lang": "es", "value": "Airspan AirVelocity 1500 versiones anteriores a 15.18.00.2511, ten\u00eda habilitada la funci\u00f3n NET-SNMP-EXTEND-MIB en su servicio snmpd, lo que permite a un atacante con capacidad de escritura en SNMP ejecutar comandos como root en el eNodeB. Este problema puede afectar a otros modelos AirVelocity y AirSpeed." } ], "id": "CVE-2022-36310", "lastModified": "2024-11-21T07:12:45.333", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-16T01:15:13.833", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm" }, { "source": "cve-assign@fb.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1689" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-242" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-16 01:15
Modified
2024-11-21 07:12
Severity ?
Summary
The AirVelocity 1500 prints SNMP credentials on its physically accessible serial port during boot. This was fixed in AirVelocity 1500 software version 15.18.00.2511 and may affect other AirVelocity and AirSpeed models.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8j75-qh6c-wpc5 | Third Party Advisory | |
cve-assign@fb.com | https://helpdesk.airspan.com/browse/TRN3-1693 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8j75-qh6c-wpc5 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://helpdesk.airspan.com/browse/TRN3-1693 | Permissions Required, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
airspan | airvelocity_1500_firmware | * | |
airspan | airvelocity_1500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:airvelocity_1500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECF71DBB-8D4C-4A82-8F4B-3907062C1379", "versionEndIncluding": "15.18.00.2511", "versionStartIncluding": "9.3.0.01249", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:airvelocity_1500:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5DBFEA-0C64-4E87-A11E-6C850D4C87CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AirVelocity 1500 prints SNMP credentials on its physically accessible serial port during boot. This was fixed in AirVelocity 1500 software version 15.18.00.2511 and may affect other AirVelocity and AirSpeed models." }, { "lang": "es", "value": "AirVelocity 1500 imprime las credenciales SNMP en su puerto serie f\u00edsicamente accesible durante el arranque. Esto fue corregido en versi\u00f3n 15.18.00.2511 del software de AirVelocity 1500 y puede afectar a otros modelos de AirVelocity y AirSpeed." } ], "id": "CVE-2022-36307", "lastModified": "2024-11-21T07:12:44.950", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-16T01:15:13.310", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8j75-qh6c-wpc5" }, { "source": "cve-assign@fb.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1693" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8j75-qh6c-wpc5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1693" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-16 01:15
Modified
2024-11-21 07:12
Severity ?
Summary
An authenticated attacker can enumerate and download sensitive files, including the eNodeB's web management UI's TLS private key, the web server binary, and the web server configuration file. These vulnerabilities were found in AirVelocity 1500 running software version 9.3.0.01249, were still present in 15.18.00.2511, and may affect other AirVelocity and AirSpeed models.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9 | Exploit, Third Party Advisory | |
cve-assign@fb.com | https://helpdesk.airspan.com/browse/TRN3-1691 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://helpdesk.airspan.com/browse/TRN3-1691 | Permissions Required, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
airspan | airvelocity_1500_firmware | * | |
airspan | airvelocity_1500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:airvelocity_1500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECF71DBB-8D4C-4A82-8F4B-3907062C1379", "versionEndIncluding": "15.18.00.2511", "versionStartIncluding": "9.3.0.01249", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:airvelocity_1500:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5DBFEA-0C64-4E87-A11E-6C850D4C87CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authenticated attacker can enumerate and download sensitive files, including the eNodeB\u0027s web management UI\u0027s TLS private key, the web server binary, and the web server configuration file. These vulnerabilities were found in AirVelocity 1500 running software version 9.3.0.01249, were still present in 15.18.00.2511, and may affect other AirVelocity and AirSpeed models." }, { "lang": "es", "value": "Un atacante autenticado puede enumerar y descargar archivos confidenciales, incluyendo la clave privada TLS de la interfaz de usuario de administraci\u00f3n web del eNodeB, el binario del servidor web y el archivo de configuraci\u00f3n del servidor web. Estas vulnerabilidades se encontraron en el AirVelocity 1500 que ejecutaba la versi\u00f3n de software 9.3.0.01249, segu\u00edan estando presentes en el 15.18.00.2511, y pueden afectar a otros modelos de AirVelocity y AirSpeed." } ], "id": "CVE-2022-36306", "lastModified": "2024-11-21T07:12:44.820", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-16T01:15:13.003", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9" }, { "source": "cve-assign@fb.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1691" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-219" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-552" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-16 01:15
Modified
2024-11-21 07:12
Severity ?
Summary
Airspan AirVelocity 1500 web management UI displays SNMP credentials in plaintext on software versions older than 15.18.00.2511, and stores SNMPv3 credentials unhashed on the filesystem, enabling anyone with web access to use these credentials to manipulate the eNodeB over SNMP. This issue may affect other AirVelocity and AirSpeed models.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-qjgc-rx8m-q58x | Third Party Advisory | |
cve-assign@fb.com | https://helpdesk.airspan.com/browse/TRN3-1692 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-qjgc-rx8m-q58x | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://helpdesk.airspan.com/browse/TRN3-1692 | Permissions Required, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
airspan | airvelocity_1500_firmware | * | |
airspan | airvelocity_1500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:airvelocity_1500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECF71DBB-8D4C-4A82-8F4B-3907062C1379", "versionEndIncluding": "15.18.00.2511", "versionStartIncluding": "9.3.0.01249", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:airvelocity_1500:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5DBFEA-0C64-4E87-A11E-6C850D4C87CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Airspan AirVelocity 1500 web management UI displays SNMP credentials in plaintext on software versions older than 15.18.00.2511, and stores SNMPv3 credentials unhashed on the filesystem, enabling anyone with web access to use these credentials to manipulate the eNodeB over SNMP. This issue may affect other AirVelocity and AirSpeed models." }, { "lang": "es", "value": "La interfaz de administraci\u00f3n web de Airspan AirVelocity 1500 muestra las credenciales SNMP en texto plano en las versiones de software anteriores a 15.18.00.2511, y almacena las credenciales SNMPv3 sin codificar en el sistema de archivos, lo que permite a cualquier persona con acceso a la web usar estas credenciales para manipular el eNodeB a trav\u00e9s de SNMP. Este problema puede afectar a otros modelos AirVelocity y AirSpeed." } ], "id": "CVE-2022-36308", "lastModified": "2024-11-21T07:12:45.077", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-16T01:15:13.480", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-qjgc-rx8m-q58x" }, { "source": "cve-assign@fb.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1692" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-qjgc-rx8m-q58x" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1692" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-256" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2022-36309 (GCVE-0-2022-36309)
Vulnerability from cvelistv5
Published
2022-08-16 00:33
Modified
2024-08-03 10:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Airspan AirVelocity 1500 software versions prior to 15.18.00.2511 have a root command injection vulnerability in the ActiveBank parameter of the recoverySubmit.cgi script running on the eNodeB's web management UI. This issue may affect other AirVelocity and AirSpeed models.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Airspan | AirVelocity |
Version: unspecified < 15.18.00.2511 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.309Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1690" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AirVelocity", "vendor": "Airspan", "versions": [ { "lessThan": "15.18.00.2511", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2022-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Airspan AirVelocity 1500 software versions prior to 15.18.00.2511 have a root command injection vulnerability in the ActiveBank parameter of the recoverySubmit.cgi script running on the eNodeB\u0027s web management UI. This issue may affect other AirVelocity and AirSpeed models." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-16T00:33:24", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1690" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2022-07-19", "ID": "CVE-2022-36309", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AirVelocity", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "15.18.00.2511" } ] } } ] }, "vendor_name": "Airspan" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Airspan AirVelocity 1500 software versions prior to 15.18.00.2511 have a root command injection vulnerability in the ActiveBank parameter of the recoverySubmit.cgi script running on the eNodeB\u0027s web management UI. This issue may affect other AirVelocity and AirSpeed models." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpdesk.airspan.com/browse/TRN3-1690", "refsource": "CONFIRM", "url": "https://helpdesk.airspan.com/browse/TRN3-1690" }, { "name": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4", "refsource": "MISC", "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2022-36309", "datePublished": "2022-08-16T00:33:24", "dateReserved": "2022-07-19T00:00:00", "dateUpdated": "2024-08-03T10:00:04.309Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-36306 (GCVE-0-2022-36306)
Vulnerability from cvelistv5
Published
2022-08-16 00:32
Modified
2024-08-03 10:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-219 - , CWE-548
Summary
An authenticated attacker can enumerate and download sensitive files, including the eNodeB's web management UI's TLS private key, the web server binary, and the web server configuration file. These vulnerabilities were found in AirVelocity 1500 running software version 9.3.0.01249, were still present in 15.18.00.2511, and may affect other AirVelocity and AirSpeed models.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Airspan | AirVelocity |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1691" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AirVelocity", "vendor": "Airspan", "versions": [ { "lessThanOrEqual": "15.18.00.2511", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2022-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "An authenticated attacker can enumerate and download sensitive files, including the eNodeB\u0027s web management UI\u0027s TLS private key, the web server binary, and the web server configuration file. These vulnerabilities were found in AirVelocity 1500 running software version 9.3.0.01249, were still present in 15.18.00.2511, and may affect other AirVelocity and AirSpeed models." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-219", "description": "CWE-219, CWE-548", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-16T00:32:07", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1691" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2022-07-19", "ID": "CVE-2022-36306", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AirVelocity", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "15.18.00.2511" } ] } } ] }, "vendor_name": "Airspan" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An authenticated attacker can enumerate and download sensitive files, including the eNodeB\u0027s web management UI\u0027s TLS private key, the web server binary, and the web server configuration file. These vulnerabilities were found in AirVelocity 1500 running software version 9.3.0.01249, were still present in 15.18.00.2511, and may affect other AirVelocity and AirSpeed models." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-219, CWE-548" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpdesk.airspan.com/browse/TRN3-1691", "refsource": "CONFIRM", "url": "https://helpdesk.airspan.com/browse/TRN3-1691" }, { "name": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9", "refsource": "MISC", "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2022-36306", "datePublished": "2022-08-16T00:32:07", "dateReserved": "2022-07-19T00:00:00", "dateUpdated": "2024-08-03T10:00:04.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-36307 (GCVE-0-2022-36307)
Vulnerability from cvelistv5
Published
2022-08-16 00:32
Modified
2024-08-03 10:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
The AirVelocity 1500 prints SNMP credentials on its physically accessible serial port during boot. This was fixed in AirVelocity 1500 software version 15.18.00.2511 and may affect other AirVelocity and AirSpeed models.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Airspan | AirVelocity |
Version: unspecified < 15.18.00.2511 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1693" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8j75-qh6c-wpc5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AirVelocity", "vendor": "Airspan", "versions": [ { "lessThan": "15.18.00.2511", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2022-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The AirVelocity 1500 prints SNMP credentials on its physically accessible serial port during boot. This was fixed in AirVelocity 1500 software version 15.18.00.2511 and may affect other AirVelocity and AirSpeed models." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-16T00:32:34", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1693" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8j75-qh6c-wpc5" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2022-07-19", "ID": "CVE-2022-36307", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AirVelocity", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "15.18.00.2511" } ] } } ] }, "vendor_name": "Airspan" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AirVelocity 1500 prints SNMP credentials on its physically accessible serial port during boot. This was fixed in AirVelocity 1500 software version 15.18.00.2511 and may affect other AirVelocity and AirSpeed models." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-522" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpdesk.airspan.com/browse/TRN3-1693", "refsource": "CONFIRM", "url": "https://helpdesk.airspan.com/browse/TRN3-1693" }, { "name": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8j75-qh6c-wpc5", "refsource": "MISC", "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8j75-qh6c-wpc5" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2022-36307", "datePublished": "2022-08-16T00:32:34", "dateReserved": "2022-07-19T00:00:00", "dateUpdated": "2024-08-03T10:00:04.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-36311 (GCVE-0-2022-36311)
Vulnerability from cvelistv5
Published
2022-08-16 00:34
Modified
2024-08-03 10:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - XSS ()
Summary
Airspan AirVelocity 1500 prior to software version 15.18.00.2511 is vulnerable to injection leading to XSS in the SNMP community field in the eNodeB's web management UI. This issue may affect other AirVelocity and AirSpeed models.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Airspan | AirVelocity |
Version: unspecified < 15.18.00.2511 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1694" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AirVelocity", "vendor": "Airspan", "versions": [ { "lessThan": "15.18.00.2511", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2022-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Airspan AirVelocity 1500 prior to software version 15.18.00.2511 is vulnerable to injection leading to XSS in the SNMP community field in the eNodeB\u0027s web management UI. This issue may affect other AirVelocity and AirSpeed models." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "XSS (CWE-79)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-16T00:34:12", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1694" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2022-07-19", "ID": "CVE-2022-36311", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AirVelocity", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "15.18.00.2511" } ] } } ] }, "vendor_name": "Airspan" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Airspan AirVelocity 1500 prior to software version 15.18.00.2511 is vulnerable to injection leading to XSS in the SNMP community field in the eNodeB\u0027s web management UI. This issue may affect other AirVelocity and AirSpeed models." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XSS (CWE-79)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpdesk.airspan.com/browse/TRN3-1694", "refsource": "CONFIRM", "url": "https://helpdesk.airspan.com/browse/TRN3-1694" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2022-36311", "datePublished": "2022-08-16T00:34:12", "dateReserved": "2022-07-19T00:00:00", "dateUpdated": "2024-08-03T10:00:04.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-36312 (GCVE-0-2022-36312)
Vulnerability from cvelistv5
Published
2022-08-16 00:34
Modified
2024-08-03 10:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - CSRF ()
Summary
Airspan AirVelocity 1500 software version 15.18.00.2511 lacks CSRF protections in the eNodeB's web management UI. This issue may affect other AirVelocity and AirSpeed models.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Airspan | AirVelocity |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.350Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1695" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AirVelocity", "vendor": "Airspan", "versions": [ { "lessThanOrEqual": "15", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2022-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Airspan AirVelocity 1500 software version 15.18.00.2511 lacks CSRF protections in the eNodeB\u0027s web management UI. This issue may affect other AirVelocity and AirSpeed models." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CSRF (CWE-352)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-16T00:34:33", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1695" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2022-07-19", "ID": "CVE-2022-36312", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AirVelocity", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "15" } ] } } ] }, "vendor_name": "Airspan" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Airspan AirVelocity 1500 software version 15.18.00.2511 lacks CSRF protections in the eNodeB\u0027s web management UI. This issue may affect other AirVelocity and AirSpeed models." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CSRF (CWE-352)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpdesk.airspan.com/browse/TRN3-1695", "refsource": "CONFIRM", "url": "https://helpdesk.airspan.com/browse/TRN3-1695" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2022-36312", "datePublished": "2022-08-16T00:34:33", "dateReserved": "2022-07-19T00:00:00", "dateUpdated": "2024-08-03T10:00:04.350Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-36308 (GCVE-0-2022-36308)
Vulnerability from cvelistv5
Published
2022-08-16 00:32
Modified
2024-08-03 10:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Airspan AirVelocity 1500 web management UI displays SNMP credentials in plaintext on software versions older than 15.18.00.2511, and stores SNMPv3 credentials unhashed on the filesystem, enabling anyone with web access to use these credentials to manipulate the eNodeB over SNMP. This issue may affect other AirVelocity and AirSpeed models.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Airspan | AirVelocity |
Version: unspecified < 15.18.00.2511 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.241Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1692" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-qjgc-rx8m-q58x" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AirVelocity", "vendor": "Airspan", "versions": [ { "lessThan": "15.18.00.2511", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2022-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Airspan AirVelocity 1500 web management UI displays SNMP credentials in plaintext on software versions older than 15.18.00.2511, and stores SNMPv3 credentials unhashed on the filesystem, enabling anyone with web access to use these credentials to manipulate the eNodeB over SNMP. This issue may affect other AirVelocity and AirSpeed models." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-256", "description": "CWE-256", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-16T00:32:57", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1692" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-qjgc-rx8m-q58x" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2022-07-19", "ID": "CVE-2022-36308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AirVelocity", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "15.18.00.2511" } ] } } ] }, "vendor_name": "Airspan" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Airspan AirVelocity 1500 web management UI displays SNMP credentials in plaintext on software versions older than 15.18.00.2511, and stores SNMPv3 credentials unhashed on the filesystem, enabling anyone with web access to use these credentials to manipulate the eNodeB over SNMP. This issue may affect other AirVelocity and AirSpeed models." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-256" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpdesk.airspan.com/browse/TRN3-1692", "refsource": "CONFIRM", "url": "https://helpdesk.airspan.com/browse/TRN3-1692" }, { "name": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-qjgc-rx8m-q58x", "refsource": "MISC", "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-qjgc-rx8m-q58x" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2022-36308", "datePublished": "2022-08-16T00:32:57", "dateReserved": "2022-07-19T00:00:00", "dateUpdated": "2024-08-03T10:00:04.241Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-36310 (GCVE-0-2022-36310)
Vulnerability from cvelistv5
Published
2022-08-16 00:33
Modified
2024-08-03 10:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-242 - Use of Inherently Dangerous Function ()
Summary
Airspan AirVelocity 1500 software prior to version 15.18.00.2511 had NET-SNMP-EXTEND-MIB enabled on its snmpd service, enabling an attacker with SNMP write abilities to execute commands as root on the eNodeB. This issue may affect other AirVelocity and AirSpeed models.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Airspan | AirVelocity |
Version: unspecified < 15.18.00.2511 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.322Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1689" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AirVelocity", "vendor": "Airspan", "versions": [ { "lessThan": "15.18.00.2511", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2022-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Airspan AirVelocity 1500 software prior to version 15.18.00.2511 had NET-SNMP-EXTEND-MIB enabled on its snmpd service, enabling an attacker with SNMP write abilities to execute commands as root on the eNodeB. This issue may affect other AirVelocity and AirSpeed models." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-242", "description": "Use of Inherently Dangerous Function (CWE-242)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-16T00:33:45", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpdesk.airspan.com/browse/TRN3-1689" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2022-07-19", "ID": "CVE-2022-36310", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AirVelocity", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "15.18.00.2511" } ] } } ] }, "vendor_name": "Airspan" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Airspan AirVelocity 1500 software prior to version 15.18.00.2511 had NET-SNMP-EXTEND-MIB enabled on its snmpd service, enabling an attacker with SNMP write abilities to execute commands as root on the eNodeB. This issue may affect other AirVelocity and AirSpeed models." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use of Inherently Dangerous Function (CWE-242)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpdesk.airspan.com/browse/TRN3-1689", "refsource": "CONFIRM", "url": "https://helpdesk.airspan.com/browse/TRN3-1689" }, { "name": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm", "refsource": "MISC", "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2022-36310", "datePublished": "2022-08-16T00:33:45", "dateReserved": "2022-07-19T00:00:00", "dateUpdated": "2024-08-03T10:00:04.322Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }