cvelist/2023/25xxx/CVE-2023-25507.json

88 lines
2.8 KiB
JSON
Raw Normal View History

2023-02-07 03:00:42 +00:00
{
2023-04-22 03:00:35 +00:00
"data_version": "4.0",
2023-02-07 03:00:42 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-25507",
2023-04-22 03:00:35 +00:00
"ASSIGNER": "psirt@nvidia.com",
"STATE": "PUBLIC"
2023-02-07 03:00:42 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-04-22 03:00:35 +00:00
"value": "NVIDIA DGX-1 BMC contains a vulnerability in the SPX REST API, where an attacker with the appropriate level of authorization can inject arbitrary shell commands, which may lead to code execution, denial of service, information disclosure, and data tampering."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
"cweId": "CWE-78"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "NVIDIA",
"product": {
"product_data": [
{
"product_name": "NVIDIA DGX servers",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "All BMC versions prior to 3.39.3"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5458",
"refsource": "MISC",
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5458"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
2023-02-07 03:00:42 +00:00
}
]
}
}