cvelist/2023/6xxx/CVE-2023-6894.json

109 lines
4.1 KiB
JSON
Raw Normal View History

2023-12-16 16:00:34 +00:00
{
2023-12-17 08:00:34 +00:00
"data_version": "4.0",
2023-12-16 16:00:34 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-6894",
2023-12-17 08:00:34 +00:00
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
2023-12-16 16:00:34 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-12-18 15:00:33 +00:00
"value": "A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been classified as problematic. This affects an unknown part of the file access/html/system.html of the component Log File Handler. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-248253 was assigned to this vulnerability."
2023-12-17 08:00:34 +00:00
},
{
"lang": "deu",
2023-12-18 15:00:33 +00:00
"value": "Es wurde eine Schwachstelle in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK) ausgemacht. Sie wurde als problematisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei access/html/system.html der Komponente Log File Handler. Mittels dem Manipulieren mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version 4.1.0 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
2023-12-17 08:00:34 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200 Information Disclosure",
"cweId": "CWE-200"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Hikvision",
"product": {
"product_data": [
{
"product_name": "Intercom Broadcasting System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "3.0.3_20201113_RELEASE(HIK)"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.248253",
"refsource": "MISC",
"name": "https://vuldb.com/?id.248253"
},
{
"url": "https://vuldb.com/?ctiid.248253",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.248253"
},
{
"url": "https://github.com/willchen0011/cve/blob/main/unaccess.md",
"refsource": "MISC",
"name": "https://github.com/willchen0011/cve/blob/main/unaccess.md"
}
]
},
2023-12-20 15:01:12 +00:00
"credits": [
{
"lang": "en",
"value": "willchen"
},
{
"lang": "en",
"value": "willchen (VulDB User)"
}
],
2023-12-17 08:00:34 +00:00
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 4.3,
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 4.3,
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 3.3,
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N"
2023-12-16 16:00:34 +00:00
}
]
}
}