Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:zte:nr8120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8807FCE-8AC8-4E32-B175-8A685ADC6835", "versionEndExcluding": "12.17.20", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:zte:nr8120:-:*:*:*:*:*:*:*", "matchCriteriaId": "15F1B24E-199F-4E46-8ADE-911AA9304537", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:zte:nr8120a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5CB45CB-4324-46BA-85E4-8BC9E3E2F7A9", "versionEndExcluding": "12.17.20", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:zte:nr8120a:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AAC6C2A-E58B-4212-A19B-89498F4EFD30", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:zte:nr8150_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A6E609-D8D6-460E-B8C2-B667019BDF18", "versionEndExcluding": "12.17.20", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:zte:nr8150:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C8B80DA-7D74-41A7-A015-8EB2FFECC6D0", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:zte:nr8250_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62E51DE4-4AFC-4B70-A453-D618F27C5FE8", "versionEndExcluding": "12.17.20", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:zte:nr8250:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAD90566-E31C-480A-A408-64C80871A037", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:zte:nr8000tr_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5940B7FE-423A-45D7-89BD-6D5564E1BD76", "versionEndExcluding": "12.17.20", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:zte:nr8000tr:-:*:*:*:*:*:*:*", "matchCriteriaId": "731CC36E-F5C7-4BD5-98CD-9D53FEFAA322", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:zte:nr8950_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6070E2BF-092D-4AEC-A1F5-CA073558E00B", "versionEndExcluding": "12.17.20", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:zte:nr8950:-:*:*:*:*:*:*:*", "matchCriteriaId": "C43CD2EB-B572-4B52-8BDE-3B7C72912005", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "All versions prior to V12.17.20 of the ZTE Microwave NR8000 series products - NR8120, NR8120A, NR8120, NR8150, NR8250, NR8000 TR and NR8950 are the applications of C/S architecture using the Java RMI service in which the servers use the Apache Commons Collections (ACC) library that may result in Java deserialization vulnerabilities. An unauthenticated remote attacker can exploit the vulnerabilities by sending a crafted RMI request to execute arbitrary code on the target host."}, {"lang": "es", "value": "Todas las versiones anteriores a V12.17.20 de los productos de ZTE Microwave de la serie NR8000 (NR8120, NR8120A, NR8120, NR8150, NR8250, NR8000 TR y NR8950) son las aplicaciones de arquitectura C/S que emplean el servicio Java RMI mediante el cual los servidores emplean la biblioteca Apache Commons Collections (ACC), lo que puede originar vulnerabilidades de deserializaci\u00f3n de Java. Un atacante remoto sin autenticar puede explotar estas vulnerabilidades enviando una petici\u00f3n RMI manipulada para ejecutar c\u00f3digo arbitrario en el host objetivo."}], "id": "CVE-2017-10932", "lastModified": "2025-03-07T14:22:47.347", "metrics": {"cvssMetricV2": [{"acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-09-28T01:29:00.997", "references": [{"source": "psirt@zte.com.cn", "tags": ["Vendor Advisory"], "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008422"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008422"}], "sourceIdentifier": "psirt@zte.com.cn", "vulnStatus": "Undergoing Analysis", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-502"}], "source": "nvd@nist.gov", "type": "Primary"}]}