Vulnerability Name:

CVE-2014-4812 (CCN-95388)

Assigned:2014-10-21
Published:2014-10-21
Updated:2017-08-29
Summary:The installer in IBM Security AppScan Source 8.x and 9.x through 9.0.1 has an open network port for a debug service, which allows remote attackers to obtain sensitive information by connecting to this port.
CVSS v3 Severity:2.9 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:1.8 Low (CVSS v2 Vector: AV:A/AC:H/Au:N/C:P/I:N/A:N)
1.3 Low (Temporal CVSS v2 Vector: AV:A/AC:H/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
1.2 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:N/A:N)
0.9 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2014-4812

Source: CCN
Type: IBM Security Bulletin 1686844
IBM Security AppScan Source opens a debug port during installation (CVE-2014-4812)

Source: CONFIRM
Type: Vendor Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21686844

Source: CCN
Type: BID-70733
IBM Security AppScan Source CVE-2014-4812 Unspecified Local Security Vulnerability

Source: XF
Type: UNKNOWN
ibm-appscan-cve20144812-info-disc(95388)

Source: XF
Type: UNKNOWN
ibm-appscan-cve20144812-info-disc(95388)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ibm:security_appscan_source:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:8.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:9.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan_source:9.0.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    ibm security appscan source 8.0
    ibm security appscan source 8.0.0.1
    ibm security appscan source 8.0.0.2
    ibm security appscan source 8.5
    ibm security appscan source 8.5.0.1
    ibm security appscan source 8.6
    ibm security appscan source 8.6.0.1
    ibm security appscan source 8.6.0.2
    ibm security appscan source 8.7
    ibm security appscan source 8.7.0.0
    ibm security appscan source 8.7.0.1
    ibm security appscan source 8.8
    ibm security appscan source 9.0
    ibm security appscan source 9.0.0.1
    ibm security appscan source 9.0.1