Vulnerability Details : CVE-2013-4425
The DICOM listener in OsiriX before 5.8 and before 2.5-MD, when starting up, encrypts the TLS private key file using "SuperSecretPassword" as the hardcoded password, which allows local users to obtain the private key.
Exploit prediction scoring system (EPSS) score for CVE-2013-4425
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-4425
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:P/I:N/A:N |
3.4
|
2.9
|
NIST |
CWE ids for CVE-2013-4425
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-4425
-
http://archives.neohapsis.com/archives/bugtraq/2013-11/0029.html
-
http://www.securityfocus.com/bid/63566
OsiriX Private Key Local Information Disclosure Vulnerability
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/88606
OsiriX private key information disclosure CVE-2013-4425 Vulnerability Report
Products affected by CVE-2013-4425
- cpe:2.3:a:osirix-viewer:osirix:*:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:3.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:3.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:2.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:5.6:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:5.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:3.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:3.6:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.7:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:osirix-viewer:osirix_md:*:*:*:*:*:*:*:*