Vulnerability Details : CVE-2013-4875
The Uboot bootloader on the Verizon Wireless Network Extender SCS-2U01 allows physically proximate attackers to bypass the intended boot process and obtain a login prompt by connecting a crafted HDMI cable and sending a SysReq interrupt.
Vulnerability category: BypassGain privilege
Products affected by CVE-2013-4875
- cpe:2.3:h:verizon:wireless_network_extender:scs-2u01:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-4875
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 46 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-4875
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.2
|
MEDIUM | AV:L/AC:H/Au:N/C:C/I:C/A:C |
1.9
|
10.0
|
NIST |
CWE ids for CVE-2013-4875
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-4875
-
http://www.securityfocus.com/bid/61169
RETIRED: Verizon Wireless Network Extender Multiple Local Privilege Escalation Vulnerabilities
-
http://www.kb.cert.org/vuls/id/BLUU-997M5B
VU#458007 - Verizon Wireless Network Extender multiple vulnerabilitiesUS Government Resource
-
http://www.kb.cert.org/vuls/id/458007
VU#458007 - Verizon Wireless Network Extender multiple vulnerabilitiesUS Government Resource
Jump to