Unknown
CVE-2012-4960
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- acu v100r003c01spc100,
- acu v200r001c00,
- acu v200r001c00spc100,
- ar 19/29/49,
- ar g3 v200r001c00,
- ar g3 v200r001c01,
- ar g3 v200r002c00spc200,
- atn v200r001c00,
- atn v200r001c01,
- cx200 v100r005,
- cx300 v100r005,
- cx600 v200r002,
- cx600 v600r001,
- cx600 v600r002,
- cx600 v600r003,
- e200 usg2200,
- e200 usg5100,
- e200e-b,
- e200e-c,
- e200e-usg2100,
- e200e-x1,
- e200e-x2,
- e200x3,
- e200x5,
- e200x7,
- eudemon 8080e,
- eudemon 8160e,
- eudemon usg5300,
- eudemon usg5500,
- eudemon usg9300,
- eudemon usg9500,
- eudemon1000,
- eudemon1000e-u,
- eudemon1000e-x,
- eudemon100e v200r007,
- eudemon200 v200r001,
- eudemon300,
- eudemon500,
- eudemon8000e-x,
- h3c ar(oem in),
- ma5200g v200r003,
- ma5200g v300r003,
- me60 v100r005,
- me60 v100r006,
- me60 v600r002,
- me60 v600r003,
- me60 v600r005c00spc600,
- ne20 v200r005,
- ne20e-x6 v300r005,
- ne40 v300r005,
- ne40e v300r005,
- ne40e v600r001,
- ne40e/80e v600r002,
- ne40e/80e v600r003,
- ne5000e v300r007,
- ne5000e v800r002,
- ne80 v300r005,
- ne80e v600r001,
- ne80e v600r002,
- ne80e v600r003,
- nip100 v100r001,
- nip1000 v100r001,
- nip200 v100r001,
- nip2100 v100r001c00,
- nip2200 v100r001c00,
- nip5100 v100r001c00,
- s2300 v100r002,
- s2300 v100r003,
- s2300 v100r005,
- s2300 v100r006,
- s2700 v100r006,
- s3300 v100r002,
- s3300 v100r003,
- s3300 v100r005,
- s3300 v100r006,
- s3300hi v100r006,
- s3300hi v200r001,
- s3700 v100r005,
- s3700 v100r006,
- s3700 v200r001,
- s5300 v100r002,
- s5300 v100r003,
- s5300 v100r005,
- s5300 v100r006,
- s5300hi v100r006,
- s5300hi v200r001,
- s5306 v100r006,
- s5306 v200r001,
- s5700 v100r005,
- s5700 v100r006,
- s5700 v200r001,
- s6300 v100r006,
- s6300 v200r001,
- s6700 v100r006,
- s6700 v200r001,
- s7700 v100r003,
- s7700 v100r006,
- s9300 v100r001,
- s9300 v100r002,
- s9300 v100r003,
- s9300 v100r006,
- svn2000 v200r001c00,
- svn3000 v100r002c02spc802b041,
- svn5000 v200r001c00,
- svn5300 v100r001c01b019,
- wlan ac 6605 v200r001c00,
- wlan ac 6605 v200r001c00spc100
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: