ID

VAR-201407-0032


CVE

CVE-2014-3419


TITLE

Infoblox NetMRI Vulnerabilities that gain access

Trust: 0.8

sources: JVNDB: JVNDB-2014-003358

DESCRIPTION

Infoblox NetMRI before 6.8.5 has a default password of admin for the "root" MySQL database account, which makes it easier for local users to obtain access via unspecified vectors. Infoblox Network Automation is a network automation product. Infoblox Network Automation has a weak password with a username/password of root/root. Multiple Infoblox Network Automation Products including NetMRI, Switch Port Manager, Automation Change Manager and Security Device Controller are prone to a local security-bypass vulnerability. Local attackers may exploit this issue to bypass certain security restrictions and perform unauthorized actions

Trust: 2.43

sources: NVD: CVE-2014-3419 // JVNDB: JVNDB-2014-003358 // CNVD: CNVD-2014-04294 // BID: 68473

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-04294

AFFECTED PRODUCTS

vendor:infobloxmodel:netmriscope:eqversion:6.1.2

Trust: 1.6

vendor:infobloxmodel:netmriscope:eqversion:6.0.2.42

Trust: 1.6

vendor:infobloxmodel:netmriscope:eqversion:6.2.1

Trust: 1.6

vendor:infobloxmodel:netmriscope:eqversion:6.2.1.48

Trust: 1.6

vendor:infobloxmodel:netmriscope:eqversion:6.8.2.11

Trust: 1.6

vendor:infobloxmodel:netmriscope:lteversion:6.8.4

Trust: 1.0

vendor:infobloxmodel:netmriscope:ltversion:6.8.5

Trust: 0.8

vendor:infobloxmodel:inc network automationscope: - version: -

Trust: 0.6

vendor:infobloxmodel:netmriscope:eqversion:6.8.4

Trust: 0.6

sources: CNVD: CNVD-2014-04294 // JVNDB: JVNDB-2014-003358 // CNNVD: CNNVD-201407-344 // NVD: CVE-2014-3419

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3419
value: HIGH

Trust: 1.0

NVD: CVE-2014-3419
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-04294
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201407-344
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2014-3419
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-04294
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2014-04294 // JVNDB: JVNDB-2014-003358 // CNNVD: CNNVD-201407-344 // NVD: CVE-2014-3419

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.8

sources: JVNDB: JVNDB-2014-003358 // NVD: CVE-2014-3419

THREAT TYPE

local

Trust: 0.9

sources: BID: 68473 // CNNVD: CNNVD-201407-344

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-201407-344

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-003358

PATCH

title:Infoblox NetMRIurl:http://www.infoblox.jp/products/network-automation/netmri

Trust: 0.8

title:Infoblox Network Automation product local security bypass vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/47484

Trust: 0.6

sources: CNVD: CNVD-2014-04294 // JVNDB: JVNDB-2014-003358

EXTERNAL IDS

db:NVDid:CVE-2014-3419

Trust: 3.3

db:BIDid:68473

Trust: 2.5

db:SECTRACKid:1030542

Trust: 1.6

db:PACKETSTORMid:127410

Trust: 1.6

db:JVNDBid:JVNDB-2014-003358

Trust: 0.8

db:CNVDid:CNVD-2014-04294

Trust: 0.6

db:XFid:94450

Trust: 0.6

db:CNNVDid:CNNVD-201407-344

Trust: 0.6

sources: CNVD: CNVD-2014-04294 // BID: 68473 // JVNDB: JVNDB-2014-003358 // CNNVD: CNNVD-201407-344 // NVD: CVE-2014-3419

REFERENCES

url:http://blog.depthsecurity.com/2014/07/os-command-injection-in-infoblox-netmri.html

Trust: 2.7

url:https://github.com/depthsecurity/netmri-2014-3418

Trust: 2.4

url:http://packetstormsecurity.com/files/127410/infoblox-6.8.4.x-weak-mysql-password.html

Trust: 1.6

url:http://www.securityfocus.com/bid/68473

Trust: 1.6

url:http://www.securitytracker.com/id/1030542

Trust: 1.6

url:http://www.securityfocus.com/archive/1/archive/1/532710/100/0/threaded

Trust: 1.4

url:http://www.securityfocus.com/archive/1/532710/100/0/threaded

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/94450

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3419

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3419

Trust: 0.8

url:http://www.securityfocus.com/archive/1/532710

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/94450

Trust: 0.6

url:http://www.infoblox.com/sites/infobloxcom/files/resources/infoblox-datasheet-automation-change-manager.pdf

Trust: 0.3

url:http://www.infoblox.com/landing/control-your-network/security-device-controller

Trust: 0.3

url:http://www.infoblox.com/en/products/netmri.html

Trust: 0.3

url:http://www.infoblox.com/sites/infobloxcom/files/resources/infoblox-datasheet-switch-port-manager.pdf

Trust: 0.3

url:http://seclists.org/bugtraq/2014/jul/43

Trust: 0.3

sources: CNVD: CNVD-2014-04294 // BID: 68473 // JVNDB: JVNDB-2014-003358 // CNNVD: CNNVD-201407-344 // NVD: CVE-2014-3419

CREDITS

Nate Kettlewell of Depth Security

Trust: 0.3

sources: BID: 68473

SOURCES

db:CNVDid:CNVD-2014-04294
db:BIDid:68473
db:JVNDBid:JVNDB-2014-003358
db:CNNVDid:CNNVD-201407-344
db:NVDid:CVE-2014-3419

LAST UPDATE DATE

2025-04-13T23:25:24.077000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-04294date:2014-07-16T00:00:00
db:BIDid:68473date:2014-07-09T00:00:00
db:JVNDBid:JVNDB-2014-003358date:2014-07-16T00:00:00
db:CNNVDid:CNNVD-201407-344date:2014-07-16T00:00:00
db:NVDid:CVE-2014-3419date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-04294date:2014-07-16T00:00:00
db:BIDid:68473date:2014-07-09T00:00:00
db:JVNDBid:JVNDB-2014-003358date:2014-07-16T00:00:00
db:CNNVDid:CNNVD-201407-344date:2014-07-16T00:00:00
db:NVDid:CVE-2014-3419date:2014-07-15T14:55:09.683