{"containers":{"cna":{"affected":[{"product":"Explorer 710","vendor":"Cobham plc","versions":[{"status":"affected","version":"1.07"}]}],"credits":[{"lang":"en","value":"This issue was found by Kyle O'Meara and David Belasco."}],"datePublic":"2019-10-09T00:00:00.000Z","descriptions":[{"lang":"en","value":"The web application portal of the Cobham EXPLORER 710, firmware version 1.07, allows unauthenticated access to port 5454. This could allow an unauthenticated, remote attacker to connect to this port via Telnet and execute 86 Attention (AT) commands, including some that provide unauthenticated, shell-like access to the device."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-284","description":"CWE-284 Improper Access Control","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2019-10-10T20:09:47.000Z","orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc"},"references":[{"name":"VU#719689","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"https://kb.cert.org/vuls/id/719689/"}],"source":{"discovery":"UNKNOWN"},"title":"The web application portal of the Cobham EXPLORER 710, firmware version 1.07, allows unauthenticated access to a port that can run AT commands","x_generator":{"engine":"Vulnogram 0.0.8"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cert@cert.org","DATE_PUBLIC":"2019-10-09T04:00:00.000Z","ID":"CVE-2019-9531","STATE":"PUBLIC","TITLE":"The web application portal of the Cobham EXPLORER 710, firmware version 1.07, allows unauthenticated access to a port that can run AT commands"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Explorer 710","version":{"version_data":[{"version_affected":"=","version_name":"1.07","version_value":"1.07"}]}}]},"vendor_name":"Cobham plc"}]}},"credit":[{"lang":"eng","value":"This issue was found by Kyle O'Meara and David Belasco."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The web application portal of the Cobham EXPLORER 710, firmware version 1.07, allows unauthenticated access to port 5454. This could allow an unauthenticated, remote attacker to connect to this port via Telnet and execute 86 Attention (AT) commands, including some that provide unauthenticated, shell-like access to the device."}]},"generator":{"engine":"Vulnogram 0.0.8"},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-284 Improper Access Control"}]}]},"references":{"reference_data":[{"name":"VU#719689","refsource":"CERT-VN","url":"https://kb.cert.org/vuls/id/719689/"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T21:54:44.584Z"},"title":"CVE Program Container","references":[{"name":"VU#719689","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"https://kb.cert.org/vuls/id/719689/"}]}]},"cveMetadata":{"assignerOrgId":"37e5125f-f79b-445b-8fad-9564f167944b","assignerShortName":"certcc","cveId":"CVE-2019-9531","datePublished":"2019-10-10T20:09:47.705Z","dateReserved":"2019-03-01T00:00:00.000Z","dateUpdated":"2024-09-16T20:02:16.560Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}