2023-12-08 03:00:27 +00:00
{
"id" : "CVE-2023-43743" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2023-12-08T01:15:07.270" ,
2023-12-13 17:08:24 +00:00
"lastModified" : "2023-12-13T15:38:28.213" ,
"vulnStatus" : "Analyzed" ,
2023-12-08 03:00:27 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A SQL injection vulnerability in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30 with firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109 allows an authenticated attacker to execute arbitrary SQL queries on the backend database via the filter parameter in requests to the /newapi/ endpoint in the Zultys MX web interface."
2023-12-13 17:08:24 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad de inyecci\u00f3n SQL en Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250 y MX30 con versiones de firmware anteriores a 17.0.10 parche 17161 y 16.04 parche 16109 permite a un atacante autenticado ejecutar consultas SQL arbitrarias en la base de datos backend a trav\u00e9s del par\u00e1metro de filtro en solicitudes al endpoint /newapi/ en la interfaz web de Zultys MX."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-se_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0.4" ,
"matchCriteriaId" : "09D39AC9-ACBA-4CF9-B9F0-D04F6B392905"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-se_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.6" ,
"versionEndExcluding" : "17.0.10" ,
"matchCriteriaId" : "4D290A1E-9CF3-42C3-B099-9A0D5FFE2FDC"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zultys:mx-se:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B8E4DCA4-D3CB-46DC-B20F-205F18FE6FA4"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-se_ii_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0.4" ,
"matchCriteriaId" : "E2CE4D4C-0CB5-4AB9-936B-E275E4A6E1A1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-se_ii_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.6" ,
"versionEndExcluding" : "17.0.10" ,
"matchCriteriaId" : "9B040E08-BAF8-475B-BF5C-DC3D6D5FBBB1"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zultys:mx-se_ii:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6DD550DD-C5C0-4ABC-9C29-016FC0587E97"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-e_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0.4" ,
"matchCriteriaId" : "3907F8B7-CB24-4BE4-8B8D-18F3D965EE7C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-e_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.6" ,
"versionEndExcluding" : "17.0.10" ,
"matchCriteriaId" : "2257C4EE-4C6F-4EC2-A88D-6048FFE28EC2"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zultys:mx-e:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2E12E140-C7D8-4875-9AF7-4EF1A77D9CF1"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-virtual_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0.4" ,
"matchCriteriaId" : "BCCC65F2-DAC8-4A47-A712-95D7E2579A3B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-virtual_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.6" ,
"versionEndExcluding" : "17.0.10" ,
"matchCriteriaId" : "7657BBD9-09D8-4EEA-AC0B-5098C4369874"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zultys:mx-virtual:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3B765CFE-8D05-430C-9725-6FBC8C9D1484"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx250_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0.4" ,
"matchCriteriaId" : "9D49E46A-4BA6-4563-9786-D2BC5E05F1CE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx250_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.6" ,
"versionEndExcluding" : "17.0.10" ,
"matchCriteriaId" : "B9572474-24A5-47C5-9A95-E8F4E0AB56C8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zultys:mx250:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "44FBBEC0-96AF-42D1-B27C-91E6F3E67F7D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx30_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0.4" ,
"matchCriteriaId" : "AF02FDBD-C0B9-4E6D-AEDD-3BB28D9EF059"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx30_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.6" ,
"versionEndExcluding" : "17.0.10" ,
"matchCriteriaId" : "6EC94AF4-0D2B-4045-98DF-53E2014C139D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zultys:mx30:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "45765B6E-39CE-4CD2-A20C-7DB96FDDEBF0"
}
]
}
]
2023-12-08 03:00:27 +00:00
}
] ,
"references" : [
{
"url" : "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0002.md" ,
2023-12-13 17:08:24 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-12-08 03:00:27 +00:00
} ,
{
"url" : "https://mxvirtual.com" ,
2023-12-13 17:08:24 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Product"
]
2023-12-08 03:00:27 +00:00
}
]
}