2023-08-04 20:00:32 +00:00
{
"id" : "CVE-2023-33377" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2023-08-04T18:15:12.647" ,
2023-08-08 20:00:39 +00:00
"lastModified" : "2023-08-08T19:49:32.947" ,
"vulnStatus" : "Analyzed" ,
2023-08-04 20:00:32 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Connected IO v2.1.0 and prior has an OS command injection vulnerability in the set firewall command in part of its communication protocol, enabling attackers to execute arbitrary OS commands on devices."
}
] ,
2023-08-08 20:00:39 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-78"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:connectedio:connected_io:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.1.0" ,
"matchCriteriaId" : "AF690623-7129-4811-9897-90ECE1F8DFDA"
}
]
}
]
}
] ,
2023-08-04 20:00:32 +00:00
"references" : [
{
"url" : "https://claroty.com/team82/disclosure-dashboard/cve-2023-33377" ,
2023-08-08 20:00:39 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-08-04 20:00:32 +00:00
} ,
{
"url" : "https://www.connectedio.com/products/routers" ,
2023-08-08 20:00:39 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Product"
]
2023-08-04 20:00:32 +00:00
}
]
}