Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:unify:openstage_sip:*:*:*:*:*:*:*:*", "matchCriteriaId": "7228102B-6691-4602-A074-11B953C0D681", "versionEndExcluding": "r3.32.0", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:unify:openstage_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E8FFABC-782E-43BB-A402-C20B6B92342A", "vulnerable": false}, {"criteria": "cpe:2.3:h:unify:openstage_40:-:*:*:*:*:*:*:*", "matchCriteriaId": "95BBDFB6-DDA4-4E2C-8DEA-EDD6C07BB0A1", "vulnerable": false}, {"criteria": "cpe:2.3:h:unify:openstage_60:-:*:*:*:*:*:*:*", "matchCriteriaId": "E660AD8F-0961-4BB8-A453-57FFC205C062", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:unify:openscape_desk_phone_ip_sip:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CF4C6F5-E9A5-48E1-8E55-0D7204BA2DC3", "versionEndExcluding": "r3.32.0", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:atos:openscape_desk_phone_ip_35g:-:*:*:*:*:*:*:*", "matchCriteriaId": "96DC9F9D-8C29-4524-9740-5216E93F86FB", "vulnerable": false}, {"criteria": "cpe:2.3:h:atos:openscape_desk_phone_ip_35g_eco:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D542112-CDD8-4BEA-B52C-507BCC879279", "vulnerable": false}, {"criteria": "cpe:2.3:h:atos:openscape_desk_phone_ip_55g:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC85895E-4D76-47EF-806D-8B6DB7058D5E", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "The web-based management (WBM) interface in Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 generates session cookies with insufficient entropy, which makes it easier for remote attackers to hijack sessions via a brute-force attack."}, {"lang": "es", "value": "La interfaz de gesti\u00f3n web en dispositivos Unify (anteriormente Siemens) OpenStage SIP y OpenScape Desk Phone IP V3, en versiones anteriores a la R3.32.0, genera cookies de sesi\u00f3n con una entrop\u00eda suficiente. Esto hace que sea m\u00e1s f\u00e1cil que los atacantes remotos secuestren sesiones mediante un ataque de fuerza bruta."}], "id": "CVE-2014-8422", "lastModified": "2024-11-21T02:19:03.470", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-04-12T21:29:00.473", "references": [{"source": "cve@mitre.org", "tags": ["Mitigation", "Vendor Advisory"], "url": "https://networks.unify.com/security/advisories/OBSO-1501-02.pdf"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mitigation", "Vendor Advisory"], "url": "https://networks.unify.com/security/advisories/OBSO-1501-02.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-331"}], "source": "nvd@nist.gov", "type": "Primary"}]}