Vulnerability Details : CVE-2013-4877
The Verizon Wireless Network Extender SCS-26UC4 and SCS-2U01 does not use CAVE authentication, which makes it easier for remote attackers to obtain ESN and MIN values from arbitrary phones, and conduct cloning attacks, by sniffing the network for registration packets.
Vulnerability category: BypassGain privilege
Exploit prediction scoring system (EPSS) score for CVE-2013-4877
Probability of exploitation activity in the next 30 days: 0.37%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 69 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-4877
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.6
|
LOW | AV:L/AC:H/Au:N/C:P/I:P/A:N |
1.9
|
4.9
|
NIST |
CWE ids for CVE-2013-4877
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-4877
-
http://www.securityfocus.com/bid/61169
RETIRED: Verizon Wireless Network Extender Multiple Local Privilege Escalation Vulnerabilities
-
http://www.kb.cert.org/vuls/id/BLUU-997M5B
VU#458007 - Verizon Wireless Network Extender multiple vulnerabilitiesUS Government Resource
-
http://www.kb.cert.org/vuls/id/458007
VU#458007 - Verizon Wireless Network Extender multiple vulnerabilitiesUS Government Resource
Products affected by CVE-2013-4877
- cpe:2.3:h:verizon:wireless_network_extender:scs-26uc4:*:*:*:*:*:*:*
- cpe:2.3:h:verizon:wireless_network_extender:scs-2u01:*:*:*:*:*:*:*