"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-03-05 06:00:35 +00:00
parent 0933bb5a97
commit c3a8ac273e
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
2 changed files with 144 additions and 4 deletions

View File

@ -1,17 +1,131 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-42419",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "info@cybellum.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Maintenance Server, in\u00a0Cybellum's\u00a0QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\n\n\nAn attacker with administrative privileges & access to the air-gapped server could potentially\u00a0use this key to run commands on the server.\nThe issue was resolved in version 2.28.\nEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "cwe-321 Use of Hard-coded Cryptographic Key"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Cybellum",
"product": {
"product_data": [
{
"product_name": "Maintenance Server",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThanOrEqual": "2.27",
"status": "affected",
"version": "2.15.5",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "1.*"
},
{
"lessThanOrEqual": "2.19",
"status": "unaffected",
"version": "2.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "or above",
"status": "unaffected",
"version": "2.28",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://cybellum.com/",
"refsource": "MISC",
"name": "https://cybellum.com/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\n\n\n\n<span style=\"background-color: rgb(255, 255, 255);\">Cybellum's </span>QCOW air-gapped distribution (China Edition), versions \n\n2.15.5\n\n through 2.27 -&gt; Upgrade to version 2.28 or above<br>All other versions/distributions -&gt; Unaffected"
}
],
"value": "\n\n\n\n\nCybellum's QCOW air-gapped distribution (China Edition), versions \n\n2.15.5\n\n through 2.27 -> Upgrade to version 2.28 or above\nAll other versions/distributions -> Unaffected"
}
],
"credits": [
{
"lang": "en",
"value": "Delikely"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
}
]
}

View File

@ -60,6 +60,27 @@
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "8060020240213164457.824efc52",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Directory Server 11",
"version": {
@ -166,6 +187,11 @@
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:1074",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:1074"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1062",
"refsource": "MISC",