CVE-2016-0800

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

Published at
2016-03-01T20:59Z
3001 days ago
Modified
2022-12-13T12:15Z
523 days ago
CWE-310
Problem type

Impact

CVSS v3 vector string
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Attack Vector

Attack Complexity

Privileges Required

User Interaction

Scope

Confidentiality

Integrity

Availability

Severity Score Vector

5.9CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

References


URLType
drownattack.com
https://drownattack.com
MISC
access.redhat.com
https://access.redhat.com/security/vulnerabilities/drown
CONFIRM
kb.pulsesecure.net
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
CONFIRM
h20566.www2.hpe.com
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
CONFIRM
h20566.www2.hpe.com
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
CONFIRM
h20566.www2.hpe.com
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
CONFIRM
RHSA-2016:1519
http://rhn.redhat.com/errata/RHSA-2016-1519.html
REDHAT
91787
http://www.securityfocus.com/bid/91787
BID
h20566.www2.hpe.com
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877
CONFIRM
h20566.www2.hpe.com
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441
CONFIRM
h20566.www2.hpe.com
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
CONFIRM
h20566.www2.hpe.com
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176765
CONFIRM
h20566.www2.hpe.com
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05143554
CONFIRM
h20566.www2.hpe.com
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05096953
CONFIRM
HPSBMU03573
http://marc.info/?l=bugtraq&m=146133665209436&w=2
HP
HPSBMU03575
http://marc.info/?l=bugtraq&m=146108058503441&w=2
HP
HPSBGN03569
http://marc.info/?l=bugtraq&m=145983526810210&w=2
HP
www.oracle.com
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
CONFIRM
h20566.www2.hpe.com
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05307589
CONFIRM
83733
http://www.securityfocus.com/bid/83733
BID
openSUSE-SU-2016:1239
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
SUSE
openSUSE-SU-2016:1241
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
SUSE
www.huawei.com
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-openssl-en
CONFIRM
www.openssl.org
https://www.openssl.org/news/secadv/20160301.txt
CONFIRM
SUSE-SU-2016:0621
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
SUSE
SUSE-SU-2016:0631
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
SUSE
VU#583776
https://www.kb.cert.org/vuls/id/583776
CERT-VN
GLSA-201603-15
https://security.gentoo.org/glsa/201603-15
GENTOO
openSUSE-SU-2016:0720
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html
SUSE
SUSE-SU-2016:0620
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
SUSE
kb.juniper.net
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10722
CONFIRM
support.citrix.com
http://support.citrix.com/article/CTX208403
CONFIRM
openSUSE-SU-2016:0628
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
SUSE
ics-cert.us-cert.gov
https://ics-cert.us-cert.gov/advisories/ICSA-16-103-03
MISC
openSUSE-SU-2016:0638
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
SUSE
openSUSE-SU-2016:0627
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html
SUSE
20160302 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2016
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
CISCO
openSUSE-SU-2016:0637
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
SUSE
SUSE-SU-2016:0617
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
SUSE
SUSE-SU-2016:0678
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
SUSE
SUSE-SU-2016:0624
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
SUSE
openSUSE-SU-2016:0640
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
SUSE
www.siemens.com
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-623229.pdf
CONFIRM
SUSE-SU-2016:1057
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
SUSE
SUSE-SU-2016:0641
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html
SUSE
kc.mcafee.com
https://kc.mcafee.com/corporate/index?page=content&id=SB10154
CONFIRM
kb.juniper.net
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
CONFIRM
h20566.www2.hpe.com
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
CONFIRM
h20566.www2.hpe.com
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
CONFIRM
h20566.www2.hpe.com
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
CONFIRM
1035133
http://www.securitytracker.com/id/1035133
SECTRACK
security.netapp.com
https://security.netapp.com/advisory/ntap-20160301-0001/
CONFIRM
FreeBSD-SA-16:12
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
FREEBSD
www.oracle.com
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
CONFIRM
help.ecostruxureit.com
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
CONFIRM
cert-portal.siemens.com
https://cert-portal.siemens.com/productcert/pdf/ssa-623229.pdf
CONFIRM
www.arista.com
https://www.arista.com/en/support/advisories-notices/security-advisories/1260-security-advisory-18
MISC
cert-portal.siemens.com
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
CONFIRM

GET https://vulnerabilitydata.com/api/details/CVE-2016-0800

{
	"id": "CVE-2016-0800",
	"published_date": "2016-03-01T20:59Z",
	"last_modified_date": "2022-12-13T12:15Z",
	"assigner": "secalert@redhat.com",
	"description": "The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a \"DROWN\" attack.",
	"references": [
		{
			"url": "https://drownattack.com",
			"name": "https://drownattack.com",
			"refsource": "MISC",
			"tags": []
		},
		{
			"url": "https://access.redhat.com/security/vulnerabilities/drown",
			"name": "https://access.redhat.com/security/vulnerabilities/drown",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168",
			"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
			"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667",
			"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681",
			"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800",
			"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
			"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://rhn.redhat.com/errata/RHSA-2016-1519.html",
			"name": "RHSA-2016:1519",
			"refsource": "REDHAT",
			"tags": []
		},
		{
			"url": "http://www.securityfocus.com/bid/91787",
			"name": "91787",
			"refsource": "BID",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877",
			"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441",
			"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516",
			"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176765",
			"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176765",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05143554",
			"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05143554",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05096953",
			"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05096953",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://marc.info/?l=bugtraq&m=146133665209436&w=2",
			"name": "HPSBMU03573",
			"refsource": "HP",
			"tags": []
		},
		{
			"url": "http://marc.info/?l=bugtraq&m=146108058503441&w=2",
			"name": "HPSBMU03575",
			"refsource": "HP",
			"tags": []
		},
		{
			"url": "http://marc.info/?l=bugtraq&m=145983526810210&w=2",
			"name": "HPSBGN03569",
			"refsource": "HP",
			"tags": []
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
			"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
			"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
			"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
			"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05307589",
			"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05307589",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://www.securityfocus.com/bid/83733",
			"name": "83733",
			"refsource": "BID",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html",
			"name": "openSUSE-SU-2016:1239",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html",
			"name": "openSUSE-SU-2016:1241",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-openssl-en",
			"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-openssl-en",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://www.openssl.org/news/secadv/20160301.txt",
			"name": "https://www.openssl.org/news/secadv/20160301.txt",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html",
			"name": "SUSE-SU-2016:0621",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html",
			"name": "SUSE-SU-2016:0631",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "https://www.kb.cert.org/vuls/id/583776",
			"name": "VU#583776",
			"refsource": "CERT-VN",
			"tags": []
		},
		{
			"url": "https://security.gentoo.org/glsa/201603-15",
			"name": "GLSA-201603-15",
			"refsource": "GENTOO",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html",
			"name": "openSUSE-SU-2016:0720",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html",
			"name": "SUSE-SU-2016:0620",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10722",
			"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10722",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://support.citrix.com/article/CTX208403",
			"name": "http://support.citrix.com/article/CTX208403",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html",
			"name": "openSUSE-SU-2016:0628",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-103-03",
			"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-103-03",
			"refsource": "MISC",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html",
			"name": "openSUSE-SU-2016:0638",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html",
			"name": "openSUSE-SU-2016:0627",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl",
			"name": "20160302 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2016",
			"refsource": "CISCO",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html",
			"name": "openSUSE-SU-2016:0637",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html",
			"name": "SUSE-SU-2016:0617",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html",
			"name": "SUSE-SU-2016:0678",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html",
			"name": "SUSE-SU-2016:0624",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
			"name": "openSUSE-SU-2016:0640",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-623229.pdf",
			"name": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-623229.pdf",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html",
			"name": "SUSE-SU-2016:1057",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html",
			"name": "SUSE-SU-2016:0641",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10154",
			"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10154",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
			"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804",
			"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us",
			"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us",
			"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://www.securitytracker.com/id/1035133",
			"name": "1035133",
			"refsource": "SECTRACK",
			"tags": []
		},
		{
			"url": "https://security.netapp.com/advisory/ntap-20160301-0001/",
			"name": "https://security.netapp.com/advisory/ntap-20160301-0001/",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc",
			"name": "FreeBSD-SA-16:12",
			"refsource": "FREEBSD",
			"tags": []
		},
		{
			"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
			"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
			"name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-623229.pdf",
			"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-623229.pdf",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1260-security-advisory-18",
			"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1260-security-advisory-18",
			"refsource": "MISC",
			"tags": []
		},
		{
			"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
			"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
			"refsource": "CONFIRM",
			"tags": []
		}
	],
	"impact": {
		"baseMetricV3": {
			"cvssV3": {
				"version": "3.0",
				"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
				"attackVector": "NETWORK",
				"attackComplexity": "HIGH",
				"privilegesRequired": "NONE",
				"userInteraction": "NONE",
				"scope": "UNCHANGED",
				"confidentialityImpact": "HIGH",
				"integrityImpact": "NONE",
				"availabilityImpact": "NONE",
				"baseScore": 5.9,
				"baseSeverity": "MEDIUM"
			},
			"exploitabilityScore": 2.2,
			"impactScore": 3.6
		},
		"baseMetricV2": {
			"cvssV2": {
				"version": "2.0",
				"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
				"accessVector": "NETWORK",
				"accessComplexity": "MEDIUM",
				"authentication": "NONE",
				"confidentialityImpact": "PARTIAL",
				"integrityImpact": "NONE",
				"availabilityImpact": "NONE",
				"baseScore": 4.3
			},
			"severity": "MEDIUM",
			"exploitabilityScore": 8.6,
			"impactScore": 2.9,
			"obtainAllPrivilege": false,
			"obtainUserPrivilege": false,
			"obtainOtherPrivilege": false,
			"userInteractionRequired": false
		}
	},
	"problem_type": "CWE-310"
}