Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:rvs4000:1:*:*:*:*:*:*:*", "matchCriteriaId": "BDEB65FB-54C5-4574-9208-F3E3EE823B96", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:rvs4000:2:*:*:*:*:*:*:*", "matchCriteriaId": "FF7E4042-1F62-4DF7-A624-2F492F792937", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "5363CFAF-439E-488C-9E97-BE04D80A4F9D", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "096FB511-0E5D-46B6-827B-EAB242E015EA", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "567C5658-57F0-4BBA-9849-9A77504102FC", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:rvs4000_software:2.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "2596081A-DFA3-4006-9B7C-EE3A29ED0341", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:wrvs4400n:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D9D4BF4B-0360-4A3B-8843-1D5E84CA948E", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:wrvs4400n:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7C01433D-F43E-4574-BC04-1F0C060BBFC4", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:wrvs4400n:2:*:*:*:*:*:*:*", "matchCriteriaId": "A3C11E2E-B910-45EC-A8FA-6BAAFFD26ED3", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C754BA1B-7DEC-49F4-835F-1EDA9289E19D", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A0606AC-B349-411A-8D45-213A60FCFD08", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1CE7344-400B-4E2F-B9DF-C2B0BB74B080", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:wrvs4400n_software:2.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "BEB82F7E-A77E-400A-B894-3207026826C9", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "The web management interface on the Cisco RVS4000 Gigabit Security Router with software 1.x before 1.3.3.4 and 2.x before 2.0.2.7, and the WRVS4400N Gigabit Security Router with software before 2.0.2.1, allows remote attackers to read the private key for the admin SSL certificate via unspecified vectors, aka Bug ID CSCtn23871."}, {"lang": "es", "value": "El interfaz de administraci\u00f3n web de Cisco RVS4000 Gigabit Security Router con software 1.x anteriores a 1.3.3.4 y 2.x anteriores a 2.0.2.7, y de WRVS4400N Gigabit Security Router con software anterior a la versi\u00f3n 2.0.2.1 permite a atacantes remotos leer la clave privada del certificado SSL admin a trav\u00e9s de vectores sin especificar. Tambi\u00e9n conocido como Bug ID CSCtn23871."}], "id": "CVE-2011-1647", "lastModified": "2024-11-21T01:26:43.053", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2011-05-31T20:55:02.827", "references": [{"source": "ykramarz@cisco.com", "tags": ["Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f190.shtml"}, {"source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/47985"}, {"source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025565"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f190.shtml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/47985"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025565"}], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-200"}], "source": "nvd@nist.gov", "type": "Primary"}]}