Description
Directory traversal vulnerability in Apexis APM-J601-WS cameras with firmware before 17.35.2.49 allows remote attackers to read arbitrary files via unspecified vectors.
Affected Software
{"id": "CVE-2014-3972", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2014-3972", "description": "Directory traversal vulnerability in Apexis APM-J601-WS cameras with firmware before 17.35.2.49 allows remote attackers to read arbitrary files via unspecified vectors.", "published": "2018-02-19T19:29:00", "modified": "2018-03-19T15:07:00", "epss": [{"cve": "CVE-2014-3972", "epss": 0.00213, "percentile": 0.57929, "modified": "2023-05-27"}], "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0}, "severity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": true, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 3.9, "impactScore": 1.4}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3972", "reporter": "cve@mitre.org", "references": ["https://fortiguard.com/zeroday/FG-VD-14-004"], "cvelist": ["CVE-2014-3972"], "immutableFields": [], "lastseen": "2023-05-28T10:12:16", "viewCount": 13, "enchantments": {"dependencies": {}, "score": {"value": 7.2, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "affected_software": {"major_version": [{"name": "apexis apm-j601-ws firmware", "version": 17}]}, "epss": [{"cve": "CVE-2014-3972", "epss": 0.00213, "percentile": 0.57781, "modified": "2023-05-08"}], "vulnersScore": 7.2}, "_state": {"dependencies": 1685268823, "score": 1685268756, "affected_software_major_version": 0, "epss": 0}, "_internal": {"score_hash": "0af3512e90d812fb10e51aba0e1886bb"}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": [], "cpe23": [], "cwe": ["CWE-22"], "affectedSoftware": [{"cpeName": "apexis:apm-j601-ws_firmware", "version": "17.35.2.49", "operator": "lt", "name": "apexis apm-j601-ws firmware"}], "affectedConfiguration": [{"name": "apexis apm-j601-ws", "cpeName": "apexis:apm-j601-ws", "version": "-", "operator": "eq"}], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "AND", "children": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:apexis:apm-j601-ws_firmware:17.35.2.49:*:*:*:*:*:*:*", "versionEndExcluding": "17.35.2.49", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": false, "cpe23Uri": "cpe:2.3:h:apexis:apm-j601-ws:-:*:*:*:*:*:*:*", "cpe_name": []}]}], "cpe_match": []}]}, "extraReferences": [{"url": "https://fortiguard.com/zeroday/FG-VD-14-004", "name": "https://fortiguard.com/zeroday/FG-VD-14-004", "refsource": "MISC", "tags": ["Third Party Advisory", "VDB Entry"]}], "product_info": [{"vendor": "Apexis", "product": "Apm-j601-ws_firmware"}], "solutions": [], "workarounds": [], "impacts": [], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "exploits": []}
{}