{"vuid":"VU#924506","idnumber":"924506","name":"Toshiba 4690 OS contains an information disclosure vulnerability","keywords":["toshiba","4690 os","information disclosure"],"overview":"The Toshiba 4690 operating system, version 6 (Release 3) and possibly earlier versions, contains an information disclosure vulnerability.","clean_desc":"CWE-200: Information Exposure - CVE-2014-4876\nThe Toshiba 4690 operating system, version 6 (Release 3) and possibly earlier versions, contains an information disclosure vulnerability. Sending a special string to TCP port 54138 causes system environment variables and other information to be returned to an unauthenticated client. The vendor has stated that this disclosure occurs by design as part of the support capabilities of 4690 and that: The data being returned contains information about the current state of the 4690 OS and can be used for problem determination. The information is generally the same as that available by local 4690 APIs or from RMA, the 4690 OS system management function. It doesn't contain sensitive (PCI) information.","impact":"A remote, unauthenticated attacker is able to view potentially sensitive system information.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem and recommends the following workaround.","workarounds":"Disable services The vendor has suggested a workaround for users concerned about the information being exposed: The user should disable the ADXSITCF logical name to the string -q. This will disable the services that connect with the network to provide this information, however it will also disable RMA system management data collection as well as prevent the use of ADXSITQL by support teams for gathering information without dumping the machine.","sysaffected":"","thanks":"Thanks to David Odell for reporting this vulnerability.","author":"This document was written by Todd Lewellen and Joel Land.","public":["http://cwe.mitre.org/data/definitions/200.html","http://en.wikipedia.org/wiki/4690_Operating_System"],"cveids":["CVE-2014-4876"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-10-06T17:45:49Z","publicdate":"2015-06-08T00:00:00Z","datefirstpublished":"2015-06-08T13:54:21Z","dateupdated":"2015-06-08T13:54:21Z","revision":18,"vrda_d1_directreport":"0","vrda_d1_population":"1","vrda_d1_impact":"1","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"N","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"W","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"N","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"5","cvss_basevector":"AV:N/AC:L/Au:N/C:P/I:N/A:N","cvss_temporalscore":"4.5","cvss_environmentalscore":"3.35625160185","cvss_environmentalvector":"CDP:N/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}