ID

VAR-201602-0175


CVE

CVE-2016-2509


TITLE

Hirschmann "Classic Platform" switches reveal administrator password in SNMP community string by default

Trust: 0.8

sources: CERT/CC: VU#507216

DESCRIPTION

The password-sync feature on Belden Hirschmann Classic Platform switches L2B before 05.3.07 and L2E, L2P, L3E, and L3P before 09.0.06 sets an SNMP community to the same string as the administrator password, which allows remote attackers to obtain sensitive information by sniffing the network. Therefore, an administrative password is leaked to an attacker on the local network. CWE-257: Storing Passwords in a Recoverable Format http://cwe.mitre.org/data/definitions/257.html In addition, National Vulnerability Database (NVD) Then CWE-200 It is published as Belden Is a security advisory BSECV-2016-2 In more detail on this issue. BeldenHirschmannClassicPlatformswitches is a switch product from Belden Corporation of the United States. A security vulnerability exists in the password-sync function of Belden Hirschmann Classic Platform. The following models and versions are affected: Belden Hirschmann Classic L2E, L2P, L3E, RS on L3P platforms, RSR, MACH100, MACH1000, MACH4000, MS, OCTOPUS 09.0.05 and earlier, RSB 05.3.06 and earlier on Classic L2B platforms previous version

Trust: 2.97

sources: NVD: CVE-2016-2509 // CERT/CC: VU#507216 // JVNDB: JVNDB-2016-001441 // CNVD: CNVD-2016-01335 // VULHUB: VHN-91328

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-01335

AFFECTED PRODUCTS

vendor:beldenmodel:hirschmannscope:eqversion:05.3.06

Trust: 1.6

vendor:beldenmodel:hirschmann l2bscope:eqversion: -

Trust: 1.0

vendor:beldenmodel:hirschmannscope:lteversion:09.0.05

Trust: 1.0

vendor:beldenmodel: - scope: - version: -

Trust: 0.8

vendor:yokogawa electricmodel: - scope: - version: -

Trust: 0.8

vendor:beldenmodel:hirschmann classic layer 2 basicscope: - version: -

Trust: 0.8

vendor:beldenmodel:hirschmann classic layer 2 enhancedscope: - version: -

Trust: 0.8

vendor:beldenmodel:hirschmann classic layer 2 professionalscope: - version: -

Trust: 0.8

vendor:beldenmodel:hirschmann classic layer 3 enhancedscope: - version: -

Trust: 0.8

vendor:beldenmodel:hirschmann classic layer 3 professionalscope: - version: -

Trust: 0.8

vendor:beldenmodel:hirschmannscope:ltversion:05.3.07

Trust: 0.8

vendor:beldenmodel:hirschmannscope:ltversion:09.0.06

Trust: 0.8

vendor:beldenmodel:hirschmann classic platform switches l2bscope:ltversion:05.3.07

Trust: 0.6

vendor:beldenmodel:hirschmann classic platform switches l2escope:ltversion: -

Trust: 0.6

vendor:beldenmodel:hirschmann classic platform switches l2pscope:ltversion: -

Trust: 0.6

vendor:beldenmodel:hirschmann classic platform switches l3escope:ltversion: -

Trust: 0.6

vendor:beldenmodel:hirschmann classic platform switches l3pscope:ltversion:09.0.06

Trust: 0.6

vendor:beldenmodel:hirschmannscope:eqversion:09.0.05

Trust: 0.6

sources: CERT/CC: VU#507216 // CNVD: CNVD-2016-01335 // JVNDB: JVNDB-2016-001441 // CNNVD: CNNVD-201602-359 // NVD: CVE-2016-2509

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-2509
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-2509
value: LOW

Trust: 0.8

CNVD: CNVD-2016-01335
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201602-359
value: LOW

Trust: 0.6

VULHUB: VHN-91328
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2016-2509
severity: LOW
baseScore: 2.9
vectorString: AV:A/AC:M/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-01335
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-91328
severity: LOW
baseScore: 2.9
vectorString: AV:A/AC:M/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-2509
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.6
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2016-01335 // VULHUB: VHN-91328 // JVNDB: JVNDB-2016-001441 // CNNVD: CNNVD-201602-359 // NVD: CVE-2016-2509

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-91328 // JVNDB: JVNDB-2016-001441 // NVD: CVE-2016-2509

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201602-359

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201602-359

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001441

PATCH

title:BSECV-2016-2 - Passwords Synchronization with SNMP v1/v2 Communitiesurl:https://www.belden.com/resourcecenter/security/upload/Belden_Security_Advisory_BSECV-2016-2_1v0.pdf

Trust: 0.8

title:YSAR-16-0001: Vnet/IP用ネットワークスイッチの管理者パスワードが漏えいする脆弱性url:http://www.yokogawa.co.jp/dcs/security/ysar/dcs-ysar-index-ja.htm

Trust: 0.8

title:BeldenHirschmannClassicPlatformswitchesL2B Patch for Information Disclosure Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/71937

Trust: 0.6

title:Belden Hirschmann Classic Platform Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60276

Trust: 0.6

sources: CNVD: CNVD-2016-01335 // JVNDB: JVNDB-2016-001441 // CNNVD: CNNVD-201602-359

EXTERNAL IDS

db:CERT/CCid:VU#507216

Trust: 3.3

db:NVDid:CVE-2016-2509

Trust: 3.1

db:JVNid:JVNVU99862126

Trust: 0.8

db:JVNDBid:JVNDB-2016-001441

Trust: 0.8

db:CNNVDid:CNNVD-201602-359

Trust: 0.7

db:CNVDid:CNVD-2016-01335

Trust: 0.6

db:BIDid:83267

Trust: 0.1

db:VULHUBid:VHN-91328

Trust: 0.1

sources: CERT/CC: VU#507216 // CNVD: CNVD-2016-01335 // VULHUB: VHN-91328 // JVNDB: JVNDB-2016-001441 // CNNVD: CNNVD-201602-359 // NVD: CVE-2016-2509

REFERENCES

url:https://www.belden.com/resourcecenter/security/upload/belden_security_advisory_bsecv-2016-2_1v0.pdf

Trust: 3.1

url:http://www.kb.cert.org/vuls/id/507216

Trust: 2.5

url:http://www.hirschmann.com/en/hirschmann_produkte/industrial_ethernet/workgroup-switches_mach100/index.phtml

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2509

Trust: 0.8

url:http://jvn.jp/vu/jvnvu99862126/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2509

Trust: 0.8

sources: CERT/CC: VU#507216 // CNVD: CNVD-2016-01335 // VULHUB: VHN-91328 // JVNDB: JVNDB-2016-001441 // CNNVD: CNNVD-201602-359 // NVD: CVE-2016-2509

SOURCES

db:CERT/CCid:VU#507216
db:CNVDid:CNVD-2016-01335
db:VULHUBid:VHN-91328
db:JVNDBid:JVNDB-2016-001441
db:CNNVDid:CNNVD-201602-359
db:NVDid:CVE-2016-2509

LAST UPDATE DATE

2025-04-13T23:09:39.168000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#507216date:2016-11-09T00:00:00
db:CNVDid:CNVD-2016-01335date:2016-02-26T00:00:00
db:VULHUBid:VHN-91328date:2016-03-23T00:00:00
db:JVNDBid:JVNDB-2016-001441date:2016-03-29T00:00:00
db:CNNVDid:CNNVD-201602-359date:2016-02-19T00:00:00
db:NVDid:CVE-2016-2509date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#507216date:2016-02-16T00:00:00
db:CNVDid:CNVD-2016-01335date:2016-02-26T00:00:00
db:VULHUBid:VHN-91328date:2016-02-18T00:00:00
db:JVNDBid:JVNDB-2016-001441date:2016-02-18T00:00:00
db:CNNVDid:CNNVD-201602-359date:2016-02-19T00:00:00
db:NVDid:CVE-2016-2509date:2016-02-18T22:59:07.853