Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://www.onapsis.com/research/security-advisories/sap-hana-potential-wrong-encryption", "name": "https://www.onapsis.com/research/security-advisories/sap-hana-potential-wrong-encryption", "tags": ["Permissions Required", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf", "name": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf", "tags": ["Technical Description", "Third Party Advisory"], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/92064", "name": "92064", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "http://packetstormsecurity.com/files/138453/SAP-HANA-DB-Encryption-Issue.html", "name": "http://packetstormsecurity.com/files/138453/SAP-HANA-DB-Encryption-Issue.html", "tags": [], "refsource": "MISC"}, {"url": "http://seclists.org/fulldisclosure/2016/Aug/96", "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-040: SAP HANA potential wrong encryption", "tags": [], "refsource": "FULLDISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The multi-tenant database container feature in SAP HANA does not properly encrypt communications, which allows remote attackers to bypass intended access restrictions and possibly have unspecified other impact via unknown vectors, aka SAP Security Note 2233550."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-284"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2016-6150", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}}, "publishedDate": "2016-08-05T14:59Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:sap:hana:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2016-11-28T20:30Z"}