Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-2311


Black Box AlertWerks ServSensor with firmware before SP473, AlertWerks ServSensor Junior with firmware before SP473, AlertWerks ServSensor Junior with PoE with firmware before SP473, and AlertWerks ServSensor Contact with firmware before SP473 allow remote authenticated users to discover administrator and user passwords via unspecified vectors.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 6.5, indicating it can be exploited remotely over the network with relatively low complexity without requiring user interaction requiring only low-level privileges . The vulnerability impacts confidentiality (data exposure), for affected systems. Impacting 22 products from blackbox, from blackbox, from blackbox and 19 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

First disclosed in 2016, this vulnerability was reported during a period defined by widespread IoT adoption challenges, mobile security concerns, and the emergence of advanced persistent threat (APT) techniques. Contemporary mitigation strategies focused on secure development practices and third-party component vetting.


Published

2016-05-30T01:59:06.003

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 6.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-200
    CWE-255

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Hardware blackbox alertwerks_servsensor_junior_eme102a-r2 - No
Hardware blackbox alertwerks_servsensor_junior_eme103a-r2 - No
Hardware blackbox alertwerks_servsensor_junior_eme104a-r2 - No
Operating System blackbox alertwerks_servsensor_junior_firmware - Yes
Hardware blackbox alertwerks_servsensor_contact_eme111a-20-r2 - No
Hardware blackbox alertwerks_servsensor_contact_eme111a-60-r2 - No
Hardware blackbox alertwerks_servsensor_contact_eme112a-20-r2 - No
Hardware blackbox alertwerks_servsensor_contact_eme112a-60-r2 - No
Hardware blackbox alertwerks_servsensor_contact_eme113a-20-r2 - No
Hardware blackbox alertwerks_servsensor_contact_eme113a-60-r2 - No
Operating System blackbox alertwerks_servsensor_contact_firmware - Yes
Hardware blackbox _alertwerks_servsensor_eme106a - No
Hardware blackbox _alertwerks_servsensor_eme108a-r2 - No
Hardware blackbox _alertwerks_servsensor_eme109a-r2 - No
Hardware blackbox _alertwerks_servsensor_eme110a-r2 - No
Hardware blackbox alertwerks_servsensor_eme105a - No
Operating System blackbox alertwerks_servsensor_firmware - Yes
Hardware blackbox alertwerks_servsensor_junior_eme152a - No
Hardware blackbox alertwerks_servsensor_junior_eme153a - No
Hardware blackbox alertwerks_servsensor_junior_eme154a - No
Hardware blackbox alertwerks_servsensor_junior_eme155a - No
Hardware blackbox alertwerks_servsensor_junior_eme158a - No
Operating System blackbox alertwerks_servsensor_junior_firmware - Yes

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For blackbox's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.