diff --git a/2023/42xxx/CVE-2023-42419.json b/2023/42xxx/CVE-2023-42419.json
index 4de60c74192..6e62f6b9524 100644
--- a/2023/42xxx/CVE-2023-42419.json
+++ b/2023/42xxx/CVE-2023-42419.json
@@ -1,17 +1,131 @@
{
+ "data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
- "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-42419",
- "ASSIGNER": "cve@mitre.org",
- "STATE": "RESERVED"
+ "ASSIGNER": "info@cybellum.com",
+ "STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
- "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ "value": "Maintenance Server, in\u00a0Cybellum's\u00a0QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\n\n\nAn attacker with administrative privileges & access to the air-gapped server could potentially\u00a0use this key to run commands on the server.\nThe issue was resolved in version 2.28.\nEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\n\n"
+ }
+ ]
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "cwe-321 Use of Hard-coded Cryptographic Key"
+ }
+ ]
+ }
+ ]
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "vendor_name": "Cybellum",
+ "product": {
+ "product_data": [
+ {
+ "product_name": "Maintenance Server",
+ "version": {
+ "version_data": [
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "versions": [
+ {
+ "lessThanOrEqual": "2.27",
+ "status": "affected",
+ "version": "2.15.5",
+ "versionType": "custom"
+ },
+ {
+ "status": "unaffected",
+ "version": "1.*"
+ },
+ {
+ "lessThanOrEqual": "2.19",
+ "status": "unaffected",
+ "version": "2.0",
+ "versionType": "custom"
+ },
+ {
+ "lessThanOrEqual": "or above",
+ "status": "unaffected",
+ "version": "2.28",
+ "versionType": "custom"
+ }
+ ],
+ "defaultStatus": "unaffected"
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ },
+ "references": {
+ "reference_data": [
+ {
+ "url": "https://cybellum.com/",
+ "refsource": "MISC",
+ "name": "https://cybellum.com/"
+ }
+ ]
+ },
+ "generator": {
+ "engine": "Vulnogram 0.1.0-dev"
+ },
+ "source": {
+ "discovery": "EXTERNAL"
+ },
+ "solution": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "\n\n\n\n\n\nCybellum's QCOW air-gapped distribution (China Edition), versions \n\n2.15.5\n\n through 2.27 -> Upgrade to version 2.28 or above
All other versions/distributions -> Unaffected"
+ }
+ ],
+ "value": "\n\n\n\n\nCybellum's QCOW air-gapped distribution (China Edition), versions \n\n2.15.5\n\n through 2.27 -> Upgrade to version 2.28 or above\nAll other versions/distributions -> Unaffected"
+ }
+ ],
+ "credits": [
+ {
+ "lang": "en",
+ "value": "Delikely"
+ }
+ ],
+ "impact": {
+ "cvss": [
+ {
+ "attackComplexity": "HIGH",
+ "attackVector": "LOCAL",
+ "availabilityImpact": "LOW",
+ "baseScore": 3.8,
+ "baseSeverity": "LOW",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "privilegesRequired": "HIGH",
+ "scope": "UNCHANGED",
+ "userInteraction": "REQUIRED",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
+ "version": "3.1"
}
]
}
diff --git a/2024/1xxx/CVE-2024-1062.json b/2024/1xxx/CVE-2024-1062.json
index d70905447fc..70447352c60 100644
--- a/2024/1xxx/CVE-2024-1062.json
+++ b/2024/1xxx/CVE-2024-1062.json
@@ -60,6 +60,27 @@
"vendor_name": "Red Hat",
"product": {
"product_data": [
+ {
+ "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support",
+ "version": {
+ "version_data": [
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "versions": [
+ {
+ "version": "8060020240213164457.824efc52",
+ "lessThan": "*",
+ "versionType": "rpm",
+ "status": "unaffected"
+ }
+ ],
+ "defaultStatus": "affected"
+ }
+ }
+ ]
+ }
+ },
{
"product_name": "Red Hat Directory Server 11",
"version": {
@@ -166,6 +187,11 @@
},
"references": {
"reference_data": [
+ {
+ "url": "https://access.redhat.com/errata/RHSA-2024:1074",
+ "refsource": "MISC",
+ "name": "https://access.redhat.com/errata/RHSA-2024:1074"
+ },
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1062",
"refsource": "MISC",