Vulnerability Name: | CVE-2013-6276 (CCN-94424) | ||||||||||||
Assigned: | 2013-10-24 | ||||||||||||
Published: | 2014-07-05 | ||||||||||||
Updated: | 2021-08-19 | ||||||||||||
Summary: | ** UNSUPPORTED WHEN ASSIGNED ** QNAP F_VioCard 2312 and F_VioGate 2308 have hardcoded entries in authorized_keys files. Note: 1. All active models are not affected. The last affected model was EOL since 2010. 2. The legacy authorization mechanism is no longer adopted in all active models. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-798 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: CCN Type: Google Web site Android Source: MITRE Type: CNA CVE-2013-6276 Source: MISC Type: Exploit, Third Party Advisory http://firmware.re/vulns/acsa-2013-002.php Source: MISC Type: Exploit, Third Party Advisory http://web.archive.org/web/20210320190014/http://firmware.re/vulns/acsa-2013-002.php Source: CCN Type: OSVDB ID: 108771 Google Android com.android.contacts ContactsListActivity.java intent.getData() Function Search Suggestion Arbitrary Number Dialing Source: CCN Type: BID-68417 Google Android 'ContactsListActivity.java' Remote Security Bypass Vulnerability Source: XF Type: UNKNOWN google-android-cve20136276-sec-bypass(94424) Source: CCN Type: Packet Storm Security [07-05-2014] Android OS Authorization Missing | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |