U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2009-1048

Change History

Modified Analysis by NIST 2/13/2024 12:38:45 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-290
Removed CWE
NIST CWE-287

								
						
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:snom:snom_300_firmware:*:*:*:*:*:*:*:* versions from (including) 6.5 up to (excluding) 6.5.20
          *cpe:2.3:o:snom:snom_300_firmware:*:*:*:*:*:*:*:* versions from (including) 7.1 up to (excluding) 7.1.39
          *cpe:2.3:o:snom:snom_300_firmware:*:*:*:*:*:*:*:* versions from (including) 7.3 up to (excluding) 7.3.14
     OR
          cpe:2.3:h:snom:snom_300:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:snom:snom_320_firmware:*:*:*:*:*:*:*:* versions from (including) 6.5 up to (excluding) 6.5.20
          *cpe:2.3:o:snom:snom_320_firmware:*:*:*:*:*:*:*:* versions from (including) 7.1 up to (excluding) 7.1.39
          *cpe:2.3:o:snom:snom_320_firmware:*:*:*:*:*:*:*:* versions from (including) 7.3 up to (excluding) 7.3.14
     OR
          cpe:2.3:h:snom:snom_320:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:snom:snom_360_firmware:*:*:*:*:*:*:*:* versions from (including) 6.5 up to (excluding) 6.5.20
          *cpe:2.3:o:snom:snom_360_firmware:*:*:*:*:*:*:*:* versions from (including) 7.1 up to (excluding) 7.1.39
          *cpe:2.3:o:snom:snom_360_firmware:*:*:*:*:*:*:*:* versions from (including) 7.3 up to (excluding) 7.3.14
     OR
          cpe:2.3:h:snom:snom_360:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:snom:snom_370_firmware:*:*:*:*:*:*:*:* versions from (including) 6.5 up to (excluding) 6.5.20
          *cpe:2.3:o:snom:snom_370_firmware:*:*:*:*:*:*:*:* versions from (including) 7.1 up to (excluding) 7.1.39
          *cpe:2.3:o:snom:snom_370_firmware:*:*:*:*:*:*:*:* versions from (including) 7.3 up to (excluding) 7.3.14
     OR
          cpe:2.3:h:snom:snom_370:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:snom:snom_820_firmware:*:*:*:*:*:*:*:* versions from (including) 6.5 up to (excluding) 6.5.20
          *cpe:2.3:o:snom:snom_820_firmware:*:*:*:*:*:*:*:* versions from (including) 7.1 up to (excluding) 7.1.39
          *cpe:2.3:o:snom:snom_820_firmware:*:*:*:*:*:*:*:* versions from (including) 7.3 up to (excluding) 7.3.14
     OR
          cpe:2.3:h:snom:snom_820:-:*:*:*:*:*:*:*
Removed CPE Configuration
OR
     *cpe:2.3:h:snom:snom_300:6.5.2:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_300:6.5.8:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_300:6.5.13:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_300:6.5.15:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_300:6.5.16:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_300:6.5.17:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_300:7.1.30:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_300:7.1.33:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_300:7.1.35:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_300:7.3.4:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_300:7.3.7:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_300:7.3.10a:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_320:6.5.2:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_320:6.5.8:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_320:6.5.13:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_320:6.5.16:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_320:6.5.17:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_320:7.1.30:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_320:7.1.33:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_320:7.1.35:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_320:7.3.4:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_320:7.3.7:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_360:6.5.2:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_360:6.5.8:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_360:6.5.13:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_360:6.5.15:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_360:6.5.16:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_360:6.5.17:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_360:7.1.30:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_360:7.1.33:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_360:7.1.35:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_360:7.3.4:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_360:7.3.7:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_360:7.3.10a:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_370:7.1.30:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_370:7.1.33:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_370:7.1.35:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_370:7.3.4:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_370:7.3.7:*:*:*:*:*:*:*
     *cpe:2.3:h:snom:snom_370:7.3.10a:*:*:*:*:*:*:*

								
						
Changed Reference Type
http://secunia.com/advisories/36293 Vendor Advisory
http://secunia.com/advisories/36293 Broken Link, Vendor Advisory
Changed Reference Type
http://www.csnc.ch/misc/files/advisories/cve-2009-1048.txt No Types Assigned
http://www.csnc.ch/misc/files/advisories/cve-2009-1048.txt Broken Link
Changed Reference Type
http://www.securityfocus.com/archive/1/505723/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/505723/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/52424 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/52424 Third Party Advisory, VDB Entry