cvelist/2023/0xxx/CVE-2023-0808.json

153 lines
6.4 KiB
JSON
Raw Normal View History

2023-02-13 11:00:37 +00:00
{
2023-02-13 12:00:35 +00:00
"data_version": "4.0",
2023-02-13 11:00:37 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-0808",
2023-02-13 12:00:35 +00:00
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
2023-02-13 11:00:37 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-10-20 22:00:39 +00:00
"value": "A vulnerability was found in Deye/Revolt/Bosswerk Inverter MW3_15U_5406_1.47/MW3_15U_5406_1.471. It has been rated as problematic. This issue affects some unknown processing of the component Access Point Setting Handler. The manipulation with the input 12345678 leads to use of hard-coded password. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version MW3_16U_5406_1.53 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-220769 was assigned to this vulnerability."
2023-02-13 12:00:35 +00:00
},
{
"lang": "deu",
2023-10-20 22:00:39 +00:00
"value": "Eine Schwachstelle wurde in Deye/Revolt/Bosswerk Inverter MW3_15U_5406_1.47/MW3_15U_5406_1.471 ausgemacht. Sie wurde als problematisch eingestuft. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Komponente Access Point Setting Handler. Durch Beeinflussen mit der Eingabe 12345678 mit unbekannten Daten kann eine use of hard-coded password-Schwachstelle ausgenutzt werden. Ein Angriff setzt physischen Zugriff auf dem Zielobjekt voraus. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Die Ausnutzbarkeit gilt als schwierig. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version MW3_16U_5406_1.53 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
2023-02-13 12:00:35 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-259 Use of Hard-coded Password",
"cweId": "CWE-259"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Deye",
"product": {
"product_data": [
{
"product_name": "Inverter",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "MW3_15U_5406_1.47"
},
{
"version_affected": "=",
"version_value": "MW3_15U_5406_1.471"
}
]
}
}
]
}
},
{
"vendor_name": "Revolt",
"product": {
"product_data": [
{
"product_name": "Inverter",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "MW3_15U_5406_1.47"
},
{
"version_affected": "=",
"version_value": "MW3_15U_5406_1.471"
}
]
}
}
]
}
},
{
"vendor_name": "Bosswerk",
"product": {
"product_data": [
{
"product_name": "Inverter",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "MW3_15U_5406_1.47"
},
{
"version_affected": "=",
"version_value": "MW3_15U_5406_1.471"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.220769",
"refsource": "MISC",
"name": "https://vuldb.com/?id.220769"
},
{
"url": "https://vuldb.com/?ctiid.220769",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.220769"
},
{
"url": "https://heise.de/-7483376",
"refsource": "MISC",
"name": "https://heise.de/-7483376"
}
]
},
"credits": [
{
"lang": "en",
"value": "Jan Mahn"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.9,
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.9,
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 3.7,
2023-10-20 22:00:39 +00:00
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
2023-02-13 11:00:37 +00:00
}
]
}
}