cvelist/2023/4xxx/CVE-2023-4463.json

152 lines
5.8 KiB
JSON
Raw Normal View History

2023-08-21 18:00:32 +00:00
{
2023-12-29 10:00:37 +00:00
"data_version": "4.0",
2023-08-21 18:00:32 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-4463",
2023-12-29 10:00:37 +00:00
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
2023-08-21 18:00:32 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-12-29 10:00:37 +00:00
"value": "A vulnerability classified as problematic was found in Poly CCX 400, CCX 600, Trio 8800 and Trio C60. This vulnerability affects unknown code of the component HTTP Header Handler. The manipulation of the argument Cookie leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249256."
},
{
"lang": "deu",
"value": "In Poly CCX 400, CCX 600, Trio 8800 and Trio C60 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Das betrifft eine unbekannte Funktionalit\u00e4t der Komponente HTTP Header Handler. Durch das Manipulieren des Arguments Cookie mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-404 Denial of Service",
"cweId": "CWE-404"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Poly",
"product": {
"product_data": [
{
"product_name": "CCX 400",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
},
{
"product_name": "CCX 600",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
},
{
"product_name": "Trio 8800",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
},
{
"product_name": "Trio C60",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.249256",
"refsource": "MISC",
"name": "https://vuldb.com/?id.249256"
},
{
"url": "https://vuldb.com/?ctiid.249256",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.249256"
},
{
2024-01-09 17:00:37 +00:00
"url": "https://modzero.com/en/advisories/mz-23-01-poly-voip/",
2023-12-29 10:00:37 +00:00
"refsource": "MISC",
2024-01-09 17:00:37 +00:00
"name": "https://modzero.com/en/advisories/mz-23-01-poly-voip/"
},
{
"url": "https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices",
"refsource": "MISC",
"name": "https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices"
2023-12-29 10:00:37 +00:00
},
{
"url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html",
"refsource": "MISC",
"name": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html"
}
]
},
"credits": [
{
"lang": "en",
"value": "Christoph Wolff"
},
{
"lang": "en",
"value": "Pascal Zenker"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 5.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
2023-08-21 18:00:32 +00:00
}
]
}
}