Vulnerabilites related to fujitsu - ipcom_ve2_sc_plus_220
CVE-2024-39921 (GCVE-0-2024-39921)
Vulnerability from cvelistv5
Published
2024-09-04 01:51
Modified
2025-03-13 13:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Observable timing discrepancy
Summary
Observable timing discrepancy issue exists in IPCOM EX2 Series V01L02NF0001 to V01L06NF0401, V01L20NF0001 to V01L20NF0401, V02L20NF0001 to V02L21NF0301, and IPCOM VE2 Series V01L04NF0001 to V01L06NF0112. If this vulnerability is exploited, some of the encrypted communication may be decrypted by an attacker who can obtain the contents of the communication.
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ► | Fsas Technologies Inc. | IPCOM EX2 Series |
Version: V01L02NF0001 to V01L06NF0401 |
||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-39921",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-04T14:16:53.423725Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-203",
"description": "CWE-203 Observable Discrepancy",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T13:26:40.037Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "IPCOM EX2 Series",
"vendor": "Fsas Technologies Inc.",
"versions": [
{
"status": "affected",
"version": "V01L02NF0001 to V01L06NF0401"
}
]
},
{
"product": "IPCOM EX2 Series",
"vendor": "Fsas Technologies Inc.",
"versions": [
{
"status": "affected",
"version": "V01L20NF0001 to V01L20NF0401"
}
]
},
{
"product": "IPCOM EX2 Series",
"vendor": "Fsas Technologies Inc.",
"versions": [
{
"status": "affected",
"version": "V02L20NF0001 to V02L21NF0301"
}
]
},
{
"product": "IPCOM VE2 Series",
"vendor": "Fsas Technologies Inc.",
"versions": [
{
"status": "affected",
"version": "V01L04NF0001 to V01L06NF0112"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Observable timing discrepancy issue exists in IPCOM EX2 Series V01L02NF0001 to V01L06NF0401, V01L20NF0001 to V01L20NF0401, V02L20NF0001 to V02L21NF0301, and IPCOM VE2 Series V01L04NF0001 to V01L06NF0112. If this vulnerability is exploited, some of the encrypted communication may be decrypted by an attacker who can obtain the contents of the communication."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Observable timing discrepancy",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-04T01:51:14.241Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.fujitsu.com/jp/products/network/support/2024/ipcom-04/"
},
{
"url": "https://jvn.jp/en/jp/JVN29238389/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2024-39921",
"datePublished": "2024-09-04T01:51:14.241Z",
"dateReserved": "2024-07-03T05:21:05.058Z",
"dateUpdated": "2025-03-13T13:26:40.037Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-29516 (GCVE-0-2022-29516)
Vulnerability from cvelistv5
Published
2022-05-18 09:50
Modified
2024-08-03 06:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- OS Command Injection
Summary
The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors.
References
| ► | URL | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| FUJITSU LIMITED | IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series |
Version: IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:26:06.087Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series",
"vendor": "FUJITSU LIMITED",
"versions": [
{
"status": "affected",
"version": "IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "OS Command Injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-05-18T09:50:24",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2022-29516",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series",
"version": {
"version_data": [
{
"version_value": "IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)"
}
]
}
}
]
},
"vendor_name": "FUJITSU LIMITED"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/",
"refsource": "MISC",
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"name": "https://jvn.jp/en/jp/JVN96561229/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2022-29516",
"datePublished": "2022-05-18T09:50:24",
"dateReserved": "2022-04-28T00:00:00",
"dateUpdated": "2024-08-03T06:26:06.087Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Vulnerability from fkie_nvd
Published
2024-09-04 03:15
Modified
2025-03-13 14:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Observable timing discrepancy issue exists in IPCOM EX2 Series V01L02NF0001 to V01L06NF0401, V01L20NF0001 to V01L20NF0401, V02L20NF0001 to V02L21NF0301, and IPCOM VE2 Series V01L04NF0001 to V01L06NF0112. If this vulnerability is exploited, some of the encrypted communication may be decrypted by an attacker who can obtain the contents of the communication.
References
| ▶ | URL | Tags | |
|---|---|---|---|
| vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN29238389/ | Mitigation, Third Party Advisory | |
| vultures@jpcert.or.jp | https://www.fujitsu.com/jp/products/network/support/2024/ipcom-04/ | Mitigation, Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F33CCD4D-E55C-4B95-8AB0-32FD36482F14",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC847DF6-0FB4-498F-9E6A-E9277BEFAF8B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7ACBF242-4C29-4DD2-AD23-BC9356377286",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2672DF0-E57F-4BD6-A1E7-48923F99E488",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FC14544-DF17-4BAD-98E8-64ACEDA96091",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FEF791-A685-4036-8B65-94D00C344AD5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "522288AD-5175-4F19-BF23-D4EEF1E3CE3F",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "239A61B6-1F0B-4B80-91E5-372E0F9D9542",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5338A67-DEC0-442F-8C28-9A0BC2906797",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4105E5B6-6E70-4E4A-B339-725CF8EB7DF2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "58FF3704-C3BF-44BB-9BBA-1BFA242F1503",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C3CB421-17F7-4A57-A64C-2C0ACDF54336",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus2_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D51F4578-7896-4C8D-A5A3-808B8C3C228E",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus2_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93E24C7-5A1F-4CC8-8553-A78DF56DAFFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus2_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "121F16FA-ADB2-4A14-9001-0A173F01EBA1",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus2_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37782E15-4803-4A46-B977-AC8F476EA812",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8041853-1E56-43FC-8C00-334C55F4DC42",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48F2D40A-0141-45BF-9058-D9EC91826118",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A96DE914-28DE-4FB9-9E56-0C038818A7CE",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11684682-AC1F-4270-AEA0-9D1324FE3B9C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF5DCD75-A9C2-4FC8-8E37-CAD58B570445",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "632309EF-EB1A-4349-9A47-633F6FEA6868",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "427446D3-CF6D-47B3-9EB1-42D1499D9169",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D32779B2-1953-42AA-84CC-9FB8A60D4DCE",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "850AF6C2-1B57-40F4-8DE5-7BA678940FAF",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_in_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749541B1-9447-41DB-B507-3C25923C8056",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6834BE51-4F83-47D7-9078-55CE715DB9E1",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9335DA00-53AD-4FA6-A105-C544B0A7F5C1",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26FFBA82-8A98-4791-9D29-6BD4D01D43FF",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_in_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "038815A3-3810-408E-B89B-80C5E47272D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "684511EB-FCF1-46C7-8AFF-829C4E1F0306",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21AF154C-6572-41E5-A4F1-A70DB59C78C3",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "521D2E3B-3624-47D4-A93F-5386859AD256",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_lb_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "724D4C66-A53A-4293-8BF8-41136A3FC96B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3172D936-A418-4329-9FC6-E2152BE7CB90",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3CBC251-E0FC-4ECF-A6B2-DE9A28F63E96",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7AC3CFF0-9A53-4334-9C24-6CE64FB1E108",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_lb_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26AEF78E-78D6-4668-A3EC-85A700B561AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ADDB8FD1-7252-4A53-A139-E810E04D8644",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "471F87B1-067B-48CF-934E-14B8B5448B09",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96163B7D-834F-4FDF-8337-3016E0CB5550",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_sc_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D42386DF-D819-4101-BB4A-3C4A905947E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CE628AE-749E-43B9-99EF-22F431A57115",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20993B20-3FCA-49CC-930A-73178A52D369",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE3E90AD-253B-4A68-A1A3-B07E6DE57B81",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_sc_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A70AEB89-7AB9-4B42-A97B-380E8D9245DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD20DCA-7300-476A-A67E-36E97FE675BE",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5E9AA9B-800A-43B2-88CB-96199BBE81B2",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDB984FA-37A6-4233-8508-B9F774CEFDB5",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_dc_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD94E19-5A80-4752-A70C-88DB73696DAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88A97F3B-7521-44FB-AAC9-406397D4C5E7",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A5C21EC-F232-4CF9-A6E8-C391D8DD9F54",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB3AE73-5A32-43E9-AF3F-BE1B971AA031",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_dc_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D9BC4CF-A11A-4681-AFFD-E4574A02F0C0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Observable timing discrepancy issue exists in IPCOM EX2 Series V01L02NF0001 to V01L06NF0401, V01L20NF0001 to V01L20NF0401, V02L20NF0001 to V02L21NF0301, and IPCOM VE2 Series V01L04NF0001 to V01L06NF0112. If this vulnerability is exploited, some of the encrypted communication may be decrypted by an attacker who can obtain the contents of the communication."
},
{
"lang": "es",
"value": "Existe un problema de discrepancia de tiempo observable en las series IPCOM EX2 V01L02NF0001 a V01L06NF0401, V01L20NF0001 a V01L20NF0401, V02L20NF0001 a V02L21NF0301 y en las series IPCOM VE2 V01L04NF0001 a V01L06NF0112. Si se explota esta vulnerabilidad, un atacante puede descifrar parte de la comunicaci\u00f3n cifrada y obtener el contenido de la misma."
}
],
"id": "CVE-2024-39921",
"lastModified": "2025-03-13T14:15:29.073",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-09-04T03:15:03.300",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN29238389/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2024/ipcom-04/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-203"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-203"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Vulnerability from fkie_nvd
Published
2022-05-18 15:15
Modified
2024-11-21 06:59
Severity ?
Summary
The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_nw_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE289B4-8FA5-4EB3-A721-6D0C50BE542B",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_nw_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CFB4EA7-7AC7-4ECA-9B8B-AFBE904F257D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_nw_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67D44F35-F39A-4C5C-8B06-007935BEF323",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_nw_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEC0E35D-B3EB-4926-8220-F30FE9B5C54E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_nw_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B2D13DE-65D4-47A7-B0BF-F062F8779909",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_nw_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87721AF6-D878-4C04-87E8-58994C39335C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46034667-FE75-44E9-B0D6-1D38CD7EC665",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_sc_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75A00DF6-7BDB-4459-8F54-9F8183AFE6B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F85C088-B5B5-4158-AF86-96895E932E1D",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_sc_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A70AEB89-7AB9-4B42-A97B-380E8D9245DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F19896-FD0E-4237-BEE0-80A2C05B7E3E",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_sc_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D42386DF-D819-4101-BB4A-3C4A905947E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BBBE5CE-DDD9-4BA8-A74B-8F448EB43960",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_lb_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C09756D-E6B5-4A8C-9C35-69683965E17B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20FEB55E-18DF-49CB-A791-0F54EF94EF22",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_lb_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26AEF78E-78D6-4668-A3EC-85A700B561AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30A2D1C6-94E5-49CC-B323-54906E123F16",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_lb_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "724D4C66-A53A-4293-8BF8-41136A3FC96B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C992F3A3-286C-41E2-B144-880085B97AC2",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_in_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B74FDFA-1B29-4817-913D-6B283FC70118",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD0393D-9C33-4F0D-BBA6-4D85FB422FAB",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_in_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749541B1-9447-41DB-B507-3C25923C8056",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0DD74E8-10AC-40A5-BFE8-AFB72135B6C2",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_in_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "038815A3-3810-408E-B89B-80C5E47272D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42DD45C6-D887-4282-8420-E1ABAB0362BD",
"versionEndExcluding": "v02l21_nf0201",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_dc_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D9BC4CF-A11A-4681-AFFD-E4574A02F0C0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB43C56-7142-472B-B047-7B252EAE0E91",
"versionEndExcluding": "v02l21_nf0201",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_dc_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD94E19-5A80-4752-A70C-88DB73696DAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_in_2300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "569BB6F8-B75A-4802-B902-3ED7AFE6F104",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_in_2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBF85FA-E3A7-4DAD-9A72-778B6CAB9A27",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_in_2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76527386-16BF-46C8-99B1-8498EB116464",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_in_2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D88ED1-096F-4BCC-9D5E-F4FCD6487681",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_in_2700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B8547D5-8296-4ED4-AC98-A8140A9479EE",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_in_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74FAF58B-753A-47C3-B497-06581D1073CB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8514D111-015A-412A-A952-6C852C98C388",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F641180E-0FC3-4829-BC4B-B8FBA08F3F4D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_1300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "714DF830-556B-4895-868D-D509C15FCDD1",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0603FF0-A7B2-47A0-BF33-8BE7609EC801",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_2300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8DB9BEFB-EB0E-4EFA-AF08-7F623B41978F",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C9183E9-1FE2-4575-847D-693B2FCEC309",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22B32B0A-C422-48A3-980A-182ADEDDEB49",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53621B41-65BE-4C6D-8D0D-222FD9DDB8E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_2700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFF10E3-C6EB-41EA-82F6-112893EFD216",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87924DC9-3834-4E02-AC5E-480CB31563A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "932DD6B4-B851-4E91-84B7-58F022538252",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5768179-59D5-453E-84FA-E65CB2571499",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_1300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "440796EF-4D9C-429C-A0FF-F12C571B6A7E",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C035FCFA-8F72-4571-8A09-376969DC2104",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_2300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BAA5A617-850B-4304-AF74-A98C18693DFA",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4914D5A-F77A-49DF-805A-CC504A99BDF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A2B7F2B-1C3C-4113-8CAF-20C19A5295CF",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF98F841-8228-417A-A893-D903C197C2EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_2700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA683D7-2BAF-429A-BB72-32210DC645EF",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F87E0BB-EF22-4C8B-AF75-94FE7F8F3E40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4BDFCF-E16C-4C9C-9C8B-6ECF3455ECB2",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE83610C-71A0-4499-8EFC-3B5067D45300",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_1300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5BB4FC38-1B64-45A5-87BD-81E8673B9B81",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E3DA3B6-33E2-47F7-A371-096399D8349A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_2300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CABF31BE-515E-4158-A699-8FF54EF465A4",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "146B18B6-F223-40C4-BE4C-EFD1D1B9DDAD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "64E678D2-8894-4FEA-A86E-873475E2ADD4",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "767F1B68-E671-4DCA-AE92-F4D6D1667DC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_2700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC30935-8489-493A-9101-F943EEF107DE",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "145A053B-2611-441A-B369-A9D7358AF452",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67CBFE07-3C37-47C5-911C-7BCB42CD732C",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC847DF6-0FB4-498F-9E6A-E9277BEFAF8B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD24F5C4-CA5A-4627-8E54-4875DF60F950",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2672DF0-E57F-4BD6-A1E7-48923F99E488",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E5D35DC-C63F-4D34-993D-03C82D064B1F",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FEF791-A685-4036-8B65-94D00C344AD5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13A07CEF-AED7-441D-9E12-5544D61BD91D",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "239A61B6-1F0B-4B80-91E5-372E0F9D9542",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "865585F2-F6FF-46DF-92C8-8AAE46F5BFB3",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4105E5B6-6E70-4E4A-B339-725CF8EB7DF2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1FA0305-AAD2-4EC0-9E39-991F77D4F088",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C3CB421-17F7-4A57-A64C-2C0ACDF54336",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus2_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D23694DC-EE06-41FB-AB56-DC2C4C7A93CB",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus2_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93E24C7-5A1F-4CC8-8553-A78DF56DAFFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus2_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8D6766-50EC-47FF-9F50-4694DD7D041A",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus2_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37782E15-4803-4A46-B977-AC8F476EA812",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2AB8056-998B-41AA-89C8-044C158D9534",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "195C8A73-78F6-4DEB-A45C-47656691D917",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E515941E-8711-4589-BA51-56E06091269B",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80B9786F-00BF-4212-93A3-D26919F78A7B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9882F123-DD49-440F-93F0-57EC1F77F8E4",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E7D04BB-CFBC-4987-AB91-D6C84D69EBB3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC7A51E-343B-4493-A404-4786FF2902C2",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48F2D40A-0141-45BF-9058-D9EC91826118",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A216376D-CF93-4C72-ABA6-A2A9A43717FA",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11684682-AC1F-4270-AEA0-9D1324FE3B9C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B29069DF-F116-45C5-8EC8-A03AAE9D7135",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "632309EF-EB1A-4349-9A47-633F6FEA6868",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors."
},
{
"lang": "es",
"value": "La consola web de la serie IPCOM de FUJITSU Network (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), e IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) permite a un atacante remoto ejecutar un comando arbitrario del sistema operativo por medio de vectores no especificados"
}
],
"id": "CVE-2022-29516",
"lastModified": "2024-11-21T06:59:14.480",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-05-18T15:15:10.123",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}