{"id": "CVE-2016-6551", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2018-07-13T20:29:00.613", "references": [{"url": "http://www.securityfocus.com/bid/93808", "tags": ["Third Party Advisory", "VDB Entry"], "source": "cret@cert.org"}, {"url": "https://www.kb.cert.org/vuls/id/200907", "tags": ["Third Party Advisory", "US Government Resource"], "source": "cret@cert.org"}, {"url": "http://www.securityfocus.com/bid/93808", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.kb.cert.org/vuls/id/200907", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "cret@cert.org", "description": [{"lang": "en", "value": "CWE-255"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-255"}]}], "descriptions": [{"lang": "en", "value": "Intellian Satellite TV antennas t-Series and v-Series, firmware version 1.07, uses non-random default credentials of: ftp/ftp or intellian:12345678. A remote network attacker can gain elevated access to a vulnerable device."}, {"lang": "es", "value": "Las antenas de TV por sat\u00e9lite Intellian en las series t y v, con la versi\u00f3n 1.07 de firmware, emplean credenciales por defecto no aleatorias de: ftp/ftp o intellian:12345678. Un atacante remoto en la red puede obtener acceso elevado a un dispositivo vulnerable."}], "lastModified": "2024-11-21T02:56:20.333", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:v60_firmware:1.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D8A07AF-7B65-4D49-938C-AC3782C7185A"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:v60:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AD40B4F0-9CB1-45A5-A5E6-1480D315B5CD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:v60ka_firmware:1.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC912BB2-BB1F-4A51-86FF-FB807038E58E"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:v60ka:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0EBAAE16-4FF2-48CB-B391-9D59A4439166"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:v65_firmware:1.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4BC38A1-E262-426D-9E08-98B7BD1E0A88"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:v65:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "800EFF7B-D91E-45C0-92E6-5E2EB6FDB6D9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:v80g_firmware:1.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF595BF1-5355-4036-82C7-A8D4F93D20D9"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:v80g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0CAD3CCD-8A8C-4FB1-A6AA-3CE457330253"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t80w_firmware:1.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AB17431-657F-47DC-8902-0529F5E87AE8"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t80w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D7D7EF6E-AD3E-4043-BEE4-377A74BC17E8"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t80q_firmware:1.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C80CD55F-968D-486D-93A7-4AA6742B59A4"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t80q:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6923C2A8-F40F-407E-91B1-8FAD9E5A32FD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t100w_firmware:1.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9FA7288-43E5-4C84-97D0-C3052200BC64"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t100w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "71B219C9-3B50-477B-9A1B-C3C4FA9DFA6F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t100q_firmware:1.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AEFB7EE3-B593-445D-98B3-C0F99E8CD896"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t100q:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "853B7819-1FF4-45DA-B68F-3AA3C231CF15"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t110w_firmware:1.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61D13EA3-E18C-4A43-8F2B-D00417AC5292"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t110w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B3209D24-A994-40E0-BB9E-423E81BF39ED"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t110q_firmware:1.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C9B1957-8458-4FCF-A3DC-C58546F7B0CB"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t110q:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5EEBE568-2A96-415C-8D04-F4D39CBE9F2C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t130w_firmware:1.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56788A9F-F7C4-4247-A628-74F5C7139344"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t130w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EC98DA8C-610F-4E42-84AF-2F42FA885DB2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t130q_firmware:1.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "089722B1-06AB-428E-8993-462BDAAD80DA"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t130q:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F4CA96A7-10C8-4B59-9B16-CD1A43BAF38A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intelliantech:t240ck_firmware:1.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD65163F-A795-48C3-9498-9D35F8424B0F"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:intelliantech:t240ck:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "387C7FE6-482D-48D5-9BBF-55C7821E4E01"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cret@cert.org"}