cvelist/2023/0xxx/CVE-2023-0757.json

109 lines
3.5 KiB
JSON
Raw Normal View History

2023-02-09 08:00:43 +00:00
{
2023-12-14 15:00:34 +00:00
"data_version": "4.0",
2023-02-09 08:00:43 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-0757",
2023-12-14 15:00:34 +00:00
"ASSIGNER": "info@cert.vde.com",
"STATE": "PUBLIC"
2023-02-09 08:00:43 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-12-14 15:00:34 +00:00
"value": "Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to upload arbitrary malicious code and gain full access on the affected device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-732 Incorrect Permission Assignment for Critical Resource",
"cweId": "CWE-732"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PHOENIX CONTACT",
"product": {
"product_data": [
{
"product_name": "MULTIPROG",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all"
}
]
}
},
{
"product_name": "ProConOS eCLR (SDK)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-051/",
"refsource": "MISC",
"name": "https://cert.vde.com/en/advisories/VDE-2023-051/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"advisory": "VDE-2023-051",
"defect": [
"CERT@VDE#64360"
],
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Reid Wightman from Dragos, Inc."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
2023-02-09 08:00:43 +00:00
}
]
}
}