199 lines
5.4 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-2538",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2023-07-05T13:15:09.540",
"lastModified": "2024-09-30T15:15:04.730",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A CWE-552 \"Files or Directories Accessible to External Parties\u201d in the web interface of the Tyan S5552 BMC version 3.00 allows an unauthenticated remote attacker to retrieve the private key of the TLS certificate in use by the BMC via forced browsing. This can then be abused to perform Man-in-the-Middle (MitM) attacks against victims that access the web interface through HTTPS."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
},
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-552"
}
]
},
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-552"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tyan:s5552\\/s5552wgm4nr-ex:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CDC5782-A5FC-49D4-819F-6ACFEAE9B864"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tyan:s5552\\/s5552wgm4nr-ex_firmware:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BAB967F2-CB84-46DF-B679-F857E518D19E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tyan:s5552\\/s5552wgm4nr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A382B9A2-F1C4-49CA-85E3-E6AC7210AA6D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tyan:s5552\\/s5552wgm4nr_firmware:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "824C54DD-4201-48AE-A85C-8876B239046F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tyan:s5552\\/s5552gm4nr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9896A2D9-D6D7-443D-B3CE-FA171949D2AA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tyan:s5552\\/s5552gm4nr_firmware:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE1816F2-C194-40EC-B548-001922741B09"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tyan:s5552\\/s5552gm2nr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E5A3905-E705-4E3D-BCBC-7D1C419AFA2D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tyan:s5552\\/s5552gm2nr_firmware:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A9CBC0D-E054-43D7-876A-D06433656AF9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-2538/",
"source": "prodsec@nozominetworks.com",
"tags": [
"Third Party Advisory"
]
}
]
}