cvelist/2023/27xxx/CVE-2023-27407.json

74 lines
2.5 KiB
JSON
Raw Normal View History

2023-03-01 14:00:36 +00:00
{
2023-05-09 12:00:35 +00:00
"data_version": "4.0",
2023-03-01 14:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-27407",
2023-05-09 12:00:35 +00:00
"ASSIGNER": "productcert@siemens.com",
"STATE": "PUBLIC"
2023-03-01 14:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-05-09 12:00:35 +00:00
"value": "A vulnerability has been identified in SCALANCE LPE9403 (All versions < V2.1). The web based management of affected device does not properly validate user input, making it susceptible to command injection. This could allow an authenticated remote attacker to access the underlying operating system as the root user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')",
"cweId": "CWE-77"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "SCALANCE LPE9403",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "All versions < V2.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-325383.pdf",
"refsource": "MISC",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-325383.pdf"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
2023-03-01 14:00:36 +00:00
}
]
}
}