2023-11-22 19:00:23 +00:00
{
"id" : "CVE-2023-6263" ,
"sourceIdentifier" : "96d4e157-0bf0-48b3-8efd-382c68caf4e0" ,
"published" : "2023-11-22T18:15:09.780" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:43:29.180" ,
2023-12-18 17:00:28 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-11-22 19:00:23 +00:00
"descriptions" : [
{
"lang" : "en" ,
2023-12-18 17:00:28 +00:00
"value" : "An issue was discovered by IPVM team in Network Optix NxCloud before 23.1.0.40440.\u00a0It was possible to add a fake VMS server to NxCloud by using the exact\u00a0identification of a legitimate VMS server. As result, it was possible to\u00a0retrieve authorization headers from legitimate users when the\u00a0legitimate client connects to the fake VMS server.\n"
2023-11-22 21:00:25 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se descubri\u00f3 un problema en Network Optix NxCloud antes de 23.1.0.40440. Fue posible agregar un servidor VMS falso a NxCloud utilizando la identificaci\u00f3n exacta de un servidor VMS leg\u00edtimo. Como resultado, fue posible recuperar encabezados de autorizaci\u00f3n de usuarios leg\u00edtimos cuando el cliente leg\u00edtimo se conecta al servidor VMS falso."
2023-11-22 19:00:23 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-12-04 15:01:07 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "96d4e157-0bf0-48b3-8efd-382c68caf4e0" ,
"type" : "Secondary" ,
2023-12-04 15:01:07 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" ,
"baseScore" : 8.3 ,
"baseSeverity" : "HIGH" ,
2023-12-04 15:01:07 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
2024-12-08 03:06:42 +00:00
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
2023-12-04 15:01:07 +00:00
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-12-04 15:01:07 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 1.6 ,
"impactScore" : 6.0
2023-12-04 15:01:07 +00:00
} ,
2023-11-22 19:00:23 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-11-22 19:00:23 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 8.1 ,
"baseSeverity" : "HIGH" ,
2023-11-22 19:00:23 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
2024-12-08 03:06:42 +00:00
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
2023-11-22 19:00:23 +00:00
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-11-22 19:00:23 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 2.2 ,
"impactScore" : 5.9
2023-11-22 19:00:23 +00:00
}
]
} ,
"weaknesses" : [
2023-12-04 15:01:07 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "96d4e157-0bf0-48b3-8efd-382c68caf4e0" ,
"type" : "Secondary" ,
2023-12-04 15:01:07 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-290"
}
]
} ,
2023-11-22 19:00:23 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-11-22 19:00:23 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-290"
}
]
}
] ,
2023-12-04 15:01:07 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:networkoptix:nxcloud:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "23.1.0.40440" ,
"matchCriteriaId" : "690A44F2-1ED6-4490-9E4E-17C6FFACD3AE"
}
]
}
]
}
] ,
2023-11-22 19:00:23 +00:00
"references" : [
{
"url" : "https://networkoptix.atlassian.net/wiki/spaces/CHS/blog/2023/09/22/3074195467/vulnerability+2023-09-21+-+Server+Spoofing" ,
2023-12-04 15:01:07 +00:00
"source" : "96d4e157-0bf0-48b3-8efd-382c68caf4e0" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://networkoptix.atlassian.net/wiki/spaces/CHS/blog/2023/09/22/3074195467/vulnerability+2023-09-21+-+Server+Spoofing" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-11-22 19:00:23 +00:00
}
]
}