cvelist/2023/0xxx/CVE-2023-0506.json

112 lines
4.3 KiB
JSON
Raw Normal View History

2023-01-26 21:07:25 +00:00
{
2023-10-03 14:00:34 +00:00
"data_version": "4.0",
2023-01-26 21:07:25 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-0506",
2023-10-03 14:00:34 +00:00
"ASSIGNER": "cve-coordination@incibe.es",
"STATE": "PUBLIC"
2023-01-26 21:07:25 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-10-03 14:00:34 +00:00
"value": "The web service of ByDemes Group Airspace CCTV Web Service in its 2.616.BY00.11 version, contains a privilege escalation vulnerability, detected in the Camera Control Panel, whose exploitation could allow a low-privileged attacker to gain administrator access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284: Improper Access Control",
"cweId": "CWE-284"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "ByDemes Group",
"product": {
"product_data": [
{
"product_name": "Airspace CCTV Web Service",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2.616.BY00.11"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/inadequate-access-control-demes-group-products",
"refsource": "MISC",
"name": "https://www.incibe.es/en/incibe-cert/notices/aviso/inadequate-access-control-demes-group-products"
},
{
"url": "https://github.com/zerolynx/wstg/blob/master/document/4-Web_Application_Security_Testing/05-Authorization_Testing/02-Testing_for_Bypassing_Authorization_Schema.md",
"refsource": "MISC",
"name": "https://github.com/zerolynx/wstg/blob/master/document/4-Web_Application_Security_Testing/05-Authorization_Testing/02-Testing_for_Bypassing_Authorization_Schema.md"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The reported vulnerability has already been fixed by the By Demes Group security team. Affected users are advised to upgrade to the latest version available. By Demes Group reminds that the affected devices are at end of life and are no longer supported, so it is recommended to upgrade to a newer model."
}
],
"value": "The reported vulnerability has already been fixed by the By Demes Group security team. Affected users are advised to upgrade to the latest version available. By Demes Group reminds that the affected devices are at end of life and are no longer supported, so it is recommended to upgrade to a newer model."
}
],
"credits": [
{
"lang": "en",
"value": "Camilo Andr\u00e9s Bruna"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
2023-01-26 21:07:25 +00:00
}
]
}
}