"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-12-05 08:00:34 +00:00
parent 1f6bbc3883
commit ec50025bc3
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
4 changed files with 228 additions and 8 deletions

View File

@ -1,17 +1,109 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-5188",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "info@cert.vde.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Configurator is vulnerable to malformed packets. An remote unauthenticated attacker could send specifically crafted packets that lead to a denial-of-service condition until restart of the affected device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation",
"cweId": "CWE-20"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WAGO",
"product": {
"product_data": [
{
"product_name": "Telecontrol Configurator",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "*"
}
]
}
},
{
"product_name": "WagoAppRTU",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.4.6.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-044/",
"refsource": "MISC",
"name": "https://cert.vde.com/en/advisories/VDE-2023-044/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"advisory": "VDE-2023-044",
"defect": [
"CERT@VDE#64591"
],
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Sofia Pisani"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,123 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6269",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security-research@sec-consult.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An argument injection vulnerability has been identified in the \nadministrative web interface of the Atos Unify OpenScape products \"Session Border Controller\" (SBC) and \"Branch\", before version V10 R3.4.0,\u00a0and OpenScape \"BCF\" before versions V10R10.12.00 and V10R11.05.02. This allows an \nunauthenticated attacker to gain root access to the appliance via SSH (scope change) and also bypass authentication for the administrative interface and gain\n access as an arbitrary (administrative) user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')",
"cweId": "CWE-88"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Atos Unify",
"product": {
"product_data": [
{
"product_name": "OpenScape Session Border Controller (SBC)",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V10 R3.4.0"
}
]
}
},
{
"product_name": "OpenScape Branch",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V10 R3.4.0"
}
]
}
},
{
"product_name": "OpenScape BCF",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V10 R10.12.00"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://networks.unify.com/security/advisories/OBSO-2310-01.pdf",
"refsource": "MISC",
"name": "https://networks.unify.com/security/advisories/OBSO-2310-01.pdf"
},
{
"url": "https://r.sec-consult.com/unifyroot",
"refsource": "MISC",
"name": "https://r.sec-consult.com/unifyroot"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Armin Weihbold (SEC Consult Vulnerability Lab)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -45,6 +45,10 @@
{
"status": "unaffected",
"version": "1.4.12"
},
{
"status": "unaffected",
"version": "1.2.13"
}
],
"defaultStatus": "unaffected"

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6514",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}