| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.4 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Cisco Mediator Framework up to 2.1. It has been rated as critical. This vulnerability affects unknown code. The manipulation leads to credentials management. This vulnerability is referenced as CVE-2010-0598. No exploit is available. Upgrading the affected component is advised.
Details
A vulnerability was found in Cisco Mediator Framework up to 2.1 and classified as very critical. This issue affects an unknown function. The manipulation with an unknown input leads to a credentials management vulnerability. Using CWE to declare the problem leads to CWE-255. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 does not encrypt HTTP sessions from operator workstations, which allows remote attackers to discover Administrator credentials by sniffing the network, aka Bug ID CSCtb83631.
The weakness was published 05/27/2010 with Cisco as confirmed advisory (CERT.org). It is possible to read the advisory at kb.cert.org. The identification of this vulnerability is CVE-2010-0598. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 07/29/2024). The attack technique deployed by this issue is T1552 according to MITRE ATT&CK.
Upgrading to version 2.2 eliminates this vulnerability.
The vulnerability is also documented in the databases at SecurityFocus (BID 40382†) and Vulnerability Center (SBV-25917†). Similar entries are available at VDB-53377, VDB-53376, VDB-53374 and VDB-53373. Be aware that VulDB is the high quality source for vulnerability data.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 9.4
VulDB Base Score: 9.8
VulDB Temp Score: 9.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Credentials managementCWE: CWE-255
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Mediator Framework 2.2
Timeline
02/10/2010 🔍05/26/2010 🔍
05/27/2010 🔍
05/27/2010 🔍
05/27/2010 🔍
05/31/2010 🔍
03/19/2015 🔍
07/29/2024 🔍
Sources
Vendor: cisco.comAdvisory: kb.cert.org
Organization: Cisco
Status: Confirmed
CVE: CVE-2010-0598 (🔍)
GCVE (CVE): GCVE-0-2010-0598
GCVE (VulDB): GCVE-100-53375
CERT: 🔍
SecurityFocus: 40382 - Cisco Network Building Mediator HTTP Communication Remote Information Disclosure Vulnerability
Secunia: 39904
Vulnerability Center: 25917 - [cisco-sa-20100526-mediator] Cisco Mediator Framework Remote Admin Credentials Vulnerability, Critical
See also: 🔍
Entry
Created: 03/19/2015 12:22Updated: 07/29/2024 02:26
Changes: 03/19/2015 12:22 (50), 02/27/2017 09:30 (9), 09/14/2021 09:53 (4), 07/29/2024 02:26 (16)
Complete: 🔍
Cache ID: 216:F64:103
Be aware that VulDB is the high quality source for vulnerability data.

No comments yet. Languages: en.
Please log in to comment.