{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2023-39480", "ASSIGNER": "zdi-disclosures@trendmicro.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "Softing Secure Integration Server FileDirectory OPC UA Object Arbitrary File Creation Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Softing Secure Integration Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the handling of FileDirectory OPC UA Objects. The issue results from allowing unauthorized access to the filesystem. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-20549." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-552: Files or Directories Accessible to External Parties", "cweId": "CWE-552" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Softing", "product": { "product_data": [ { "product_name": "Secure Integration Server", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.22.0.8686" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1062/", "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-23-1062/" } ] }, "source": { "lang": "en", "value": "Claroty Research - Team82 - Uri Katz, Noam Moshe, Vera Mens, Sharon Brizinov" }, "impact": { "cvss": [ { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N", "baseScore": 4.4, "baseSeverity": "MEDIUM" } ] } }