2023-09-27 16:00:29 +00:00
{
"id" : "CVE-2023-43775" ,
"sourceIdentifier" : "CybersecurityCOE@eaton.com" ,
"published" : "2023-09-27T15:19:34.517" ,
2023-10-02 20:00:29 +00:00
"lastModified" : "2023-10-02T18:32:56.620" ,
"vulnStatus" : "Analyzed" ,
2023-09-27 16:00:29 +00:00
"descriptions" : [
{
"lang" : "en" ,
2023-09-28 22:00:29 +00:00
"value" : "Denial-of-service vulnerability in the web server of the Eaton SMP Gateway allows \n\nattacker to potentially force an unexpected restart of the automation platform, impacting the availability of the product. In rare situations, the issue could cause\nthe SMP device to restart in Safe Mode or Max Safe Mode. When in Max Safe Mode, the product is\nnot vulnerable anymore.\n"
} ,
{
"lang" : "es" ,
2023-10-02 20:00:29 +00:00
"value" : "Una vulnerabilidad de denegaci\u00f3n de servicio en el servidor web de Eaton SMP Gateway permite a un atacante forzar potencialmente un reinicio inesperado de la plataforma de automatizaci\u00f3n, lo que afecta la disponibilidad del producto. En situaciones excepcionales, el problema podr\u00eda provocar que el dispositivo SMP se reinicie en Modo Seguro o Modo Seguro M\u00e1ximo. Cuando est\u00e1 en Modo Seguro M\u00e1ximo, el producto ya no es vulnerable."
2023-09-27 16:00:29 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-10-02 20:00:29 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
} ,
2023-09-27 16:00:29 +00:00
{
"source" : "CybersecurityCOE@eaton.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" ,
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 4.7 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 1.4
}
]
} ,
"weaknesses" : [
2023-10-02 20:00:29 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
} ,
2023-09-27 16:00:29 +00:00
{
"source" : "CybersecurityCOE@eaton.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-400"
}
]
}
] ,
2023-10-02 20:00:29 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_sg-4260_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.0" ,
"versionEndExcluding" : "8.0r9" ,
"matchCriteriaId" : "19285A3B-E34F-4C81-B3AF-588041DF2124"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_sg-4260_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.1" ,
"versionEndExcluding" : "8.1r5" ,
"matchCriteriaId" : "9561C79D-2DE3-4DCB-92DA-76A3A09ADC81"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_sg-4260_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.2" ,
"versionEndExcluding" : "8.2r4" ,
"matchCriteriaId" : "A7BB498B-5CFA-4525-99FA-68BAE9E8CC36"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:eaton:smp_sg-4260:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2DB90749-D036-4E69-9666-D2F12B3352AE"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_sg-4250_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.0" ,
"versionEndExcluding" : "8.0r9" ,
"matchCriteriaId" : "7E0B3C20-2670-42B6-90A7-2242225C39F6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_sg-4250_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.1" ,
"versionEndExcluding" : "8.1r5" ,
"matchCriteriaId" : "86BD7193-D822-4D96-A3D3-D2688D2CE608"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_sg-4250_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.2" ,
"versionEndExcluding" : "8.2r4" ,
"matchCriteriaId" : "93609CFE-55B8-4F43-9166-D5395D6C27A2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_sg-4250_firmware:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "06AEBF3E-1249-45F2-9300-EEFAFAA7E38C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_sg-4250_firmware:7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C6ACBFF2-A26D-451A-99FE-467EB4B5AC83"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_sg-4250_firmware:7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DFA92FFB-3CC4-4FEB-B6CC-F8DFE6508490"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:eaton:smp_sg-4250:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F627928D-DEE2-4028-B6FB-D67185D52CA8"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_4\\/dp_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.0" ,
"versionEndExcluding" : "8.0r9" ,
"matchCriteriaId" : "997B78C0-A026-4145-B66C-A8F3398769CB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_4\\/dp_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.1" ,
"versionEndExcluding" : "8.1r5" ,
"matchCriteriaId" : "8AB7A7BF-22BC-48C5-9897-8FFA11C06FE1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_4\\/dp_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.2" ,
"versionEndExcluding" : "8.2r4" ,
"matchCriteriaId" : "0B9AF8CE-0BAF-4B3B-8138-094716BA2E97"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_4\\/dp_firmware:6.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C0F150FA-9366-45D6-B9E8-4660F64B49EC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_4\\/dp_firmware:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F9B5FAC-C4C7-4D3A-9A4C-F8017DEED7CF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_4\\/dp_firmware:7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F0BBCC24-B3FB-47B7-9E81-80C8D5D6BD8C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_4\\/dp_firmware:7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4A2ECEDB-E550-4774-BC21-F7CA2A24B034"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:eaton:smp_4\\/dp:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A22E3F1B-4169-48E5-A6A2-A85BFE89F005"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_16_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.0" ,
"versionEndExcluding" : "8.0r9" ,
"matchCriteriaId" : "33F8E4EE-EBBD-4DCB-95F6-EC09BCCA1220"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_16_firmware:6.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "99E3E73E-B44D-465B-A550-AAE11F1153BE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_16_firmware:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D8EE1D03-E334-4242-A738-9C6B8B95A1CF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_16_firmware:7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5F97B69B-F2A6-4F6F-8E9A-3503DA56D589"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:eaton:smp_16_firmware:7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A9E30826-A5F0-4946-86E9-31E878A178E3"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:eaton:smp_16:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "214D0DBE-BA0E-4C39-9361-8A845A91ED86"
}
]
}
]
}
] ,
2023-09-27 16:00:29 +00:00
"references" : [
{
"url" : "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2022-1008.pdf" ,
2023-10-02 20:00:29 +00:00
"source" : "CybersecurityCOE@eaton.com" ,
"tags" : [
"Vendor Advisory"
]
2023-09-27 16:00:29 +00:00
}
]
}