10

CVE-2013-3609

Exploit

The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function.

Data is provided by the National Vulnerability Database (NVD)
SupermicroH8dcl-6f Version-
SupermicroH8dcl-if Version-
SupermicroH8dct-hibqf Version-
SupermicroH8dct-hln4f Version-
SupermicroH8dct-ibqf Version-
SupermicroH8dg6-f Version-
SupermicroH8dgg-qf Version-
SupermicroH8dgi-f Version-
SupermicroH8dgt-hf Version-
SupermicroH8dgt-hibqf Version-
SupermicroH8dgt-hlf Version-
SupermicroH8dgt-hlibqf Version-
SupermicroH8dgu-f Version-
SupermicroH8scm-f Version-
SupermicroH8sgl-f Version-
SupermicroH8sme-f Version-
SupermicroH8sml-7 Version-
SupermicroH8sml-7f Version-
SupermicroH8sml-i Version-
SupermicroH8sml-if Version-
SupermicroX7spa-hf Version-
SupermicroX7spa-hf-d525 Version-
SupermicroX7spe-h-d525 Version-
SupermicroX7spe-hf Version-
SupermicroX7spe-hf-d525 Version-
SupermicroX7spt-df-d525 Version-
SupermicroX8dtl-3f Version-
SupermicroX8dtl-6f Version-
SupermicroX8dtl-if Version-
SupermicroX8si6-f Version-
SupermicroX8sia-f Version-
SupermicroX8sie-f Version-
SupermicroX8sie-ln4f Version-
SupermicroX8sil-f Version-
SupermicroX8sit-f Version-
SupermicroX8sit-hf Version-
SupermicroX8siu-f Version-
SupermicroX9dax-7f Version-
SupermicroX9dax-7f-hft Version-
SupermicroX9dax-7tf Version-
SupermicroX9dax-if Version-
SupermicroX9dax-if-hft Version-
SupermicroX9dax-itf Version-
SupermicroX9db3-f Version-
SupermicroX9db3-tpf Version-
SupermicroX9dbi-f Version-
SupermicroX9dbi-tpf Version-
SupermicroX9dbl-3f Version-
SupermicroX9dbl-if Version-
SupermicroX9dbu-3f Version-
SupermicroX9dbu-if Version-
SupermicroX9dr3-f Version-
SupermicroX9dr7-ln4f Version-
SupermicroX9drd-7jln4f Version-
SupermicroX9drd-7ln4f Version-
SupermicroX9drd-ef Version-
SupermicroX9drd-if Version-
SupermicroX9dre-ln4f Version-
SupermicroX9drff Version-
SupermicroX9drff-7 Version-
SupermicroX9drfr Version-
SupermicroX9drg-hf Version-
SupermicroX9drg-htf Version-
SupermicroX9drh-7f Version-
SupermicroX9drh-7tf Version-
SupermicroX9drh-if Version-
SupermicroX9drh-itf Version-
SupermicroX9dri-f Version-
SupermicroX9drl-3f Version-
SupermicroX9drl-ef Version-
SupermicroX9drl-if Version-
SupermicroX9drt-f Version-
SupermicroX9drt-h6f Version-
SupermicroX9drt-h6ibff Version-
SupermicroX9drt-h6ibqf Version-
SupermicroX9drt-ibff Version-
SupermicroX9drt-ibqf Version-
SupermicroX9qr7-tf Version-
SupermicroX9qr7-tf-jbod Version-
SupermicroX9qri-f Version-
SupermicroX9sbaa-f Version-
SupermicroX9sca-f Version-
SupermicroX9scd-f Version-
SupermicroX9sce-f Version-
SupermicroX9scff-f Version-
SupermicroX9sci-ln4f Version-
SupermicroX9scl-f Version-
SupermicroX9scm-f Version-
SupermicroX9scm-iif Version-
SupermicroX9spu-f Version-
SupermicroX9srd-f Version-
SupermicroX9sre-3f Version-
SupermicroX9sre-f Version-
SupermicroX9srg-f Version-
SupermicroX9sri-3f Version-
SupermicroX9sri-f Version-
SupermicroX9srl-f Version-
SupermicroX9srw-f Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 3.05% 0.854
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.