2023-11-23 11:00:31 +00:00
{
2023-12-05 08:00:34 +00:00
"data_version" : "4.0" ,
2023-11-23 11:00:31 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2023-6269" ,
2023-12-05 08:00:34 +00:00
"ASSIGNER" : "security-research@sec-consult.com" ,
"STATE" : "PUBLIC"
2023-11-23 11:00:31 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2023-12-05 08:00:34 +00:00
"value" : "An argument injection vulnerability has been identified in the \nadministrative web interface of the Atos Unify OpenScape products \"Session Border Controller\" (SBC) and \"Branch\", before version V10 R3.4.0,\u00a0and OpenScape \"BCF\" before versions V10R10.12.00 and V10R11.05.02. This allows an \nunauthenticated attacker to gain root access to the appliance via SSH (scope change) and also bypass authentication for the administrative interface and gain\n access as an arbitrary (administrative) user."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')" ,
"cweId" : "CWE-88"
}
]
}
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Atos Unify" ,
"product" : {
"product_data" : [
{
"product_name" : "OpenScape Session Border Controller (SBC)" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_name" : "0" ,
"version_value" : "V10 R3.4.0"
}
]
}
} ,
{
"product_name" : "OpenScape Branch" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_name" : "0" ,
"version_value" : "V10 R3.4.0"
}
]
}
} ,
{
"product_name" : "OpenScape BCF" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_name" : "0" ,
"version_value" : "V10 R10.12.00"
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://networks.unify.com/security/advisories/OBSO-2310-01.pdf" ,
"refsource" : "MISC" ,
"name" : "https://networks.unify.com/security/advisories/OBSO-2310-01.pdf"
} ,
{
"url" : "https://r.sec-consult.com/unifyroot" ,
"refsource" : "MISC" ,
"name" : "https://r.sec-consult.com/unifyroot"
2023-12-13 03:00:32 +00:00
} ,
{
"url" : "http://seclists.org/fulldisclosure/2023/Dec/16" ,
"refsource" : "MISC" ,
"name" : "http://seclists.org/fulldisclosure/2023/Dec/16"
2023-12-13 18:00:32 +00:00
} ,
{
"url" : "http://packetstormsecurity.com/files/176194/Atos-Unify-OpenScape-Authentication-Bypass-Remote-Code-Execution.html" ,
"refsource" : "MISC" ,
"name" : "http://packetstormsecurity.com/files/176194/Atos-Unify-OpenScape-Authentication-Bypass-Remote-Code-Execution.html"
2023-12-05 08:00:34 +00:00
}
]
} ,
"generator" : {
"engine" : "Vulnogram 0.1.0-dev"
} ,
"source" : {
"discovery" : "EXTERNAL"
} ,
"credits" : [
{
"lang" : "en" ,
"value" : "Armin Weihbold (SEC Consult Vulnerability Lab)"
}
] ,
"impact" : {
"cvss" : [
{
"attackComplexity" : "LOW" ,
"attackVector" : "NETWORK" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 10 ,
"baseSeverity" : "CRITICAL" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"scope" : "CHANGED" ,
"userInteraction" : "NONE" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" ,
"version" : "3.1"
2023-11-23 11:00:31 +00:00
}
]
}
}