2023-09-15 18:00:28 +00:00
{
"id" : "CVE-2022-47848" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2023-09-15T16:15:07.687" ,
2023-09-20 20:00:28 +00:00
"lastModified" : "2023-09-20T19:54:58.253" ,
"vulnStatus" : "Analyzed" ,
2023-09-15 18:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An issue was discovered in Bezeq Vtech NB403-IL version BZ_2.02.07.09.13.01 and Vtech IAD604-IL versions BZ_2.02.07.09.13.01, BZ_2.02.07.09.13T, and BZ_2.02.07.09.09T, allows remote attackers to gain sensitive information via rootDesc.xml page of the UPnP service."
2023-09-20 20:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se descubri\u00f3 un problema en Bezeq Vtech NB403-IL versi\u00f3n BZ_2.02.07.09.13.01 y Vtech IAD604-IL versiones BZ_2.02.07.09.13.01, BZ_2.02.07.09.13T y BZ_2.02.07.09.09T, que permite a atacantes remotos para obtener informaci\u00f3n confidencial a trav\u00e9s de la p\u00e1gina rootDesc.xml del servicio UPnP."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-287"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:bezeq:vtech_nb403-il_firmware:bz_2.02.07.09.13.01:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4B02C038-F636-4C46-A7D8-2A4F7BD069B0"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:bezeq:vtech_nb403-il:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "72F41356-838A-4640-9C7D-AA92BFA550ED"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:bezeq:vtech_iad604-il_firmware:bz_2.02.07.09.09t:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "01633E21-8C51-47A1-A04A-78A1796AE684"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:bezeq:vtech_iad604-il_firmware:bz_2.02.07.09.13.01:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "54765A58-0E2D-4564-A082-B23A641ECD4B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:bezeq:vtech_iad604-il_firmware:bz_2.02.07.09.13t:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "352EB738-B6D1-4D50-B091-199AF43DA11A"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:bezeq:vtech_iad604-il:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1831376D-EC0C-4AD5-BA34-6A8E09B10915"
}
]
}
]
2023-09-15 18:00:28 +00:00
}
] ,
"references" : [
{
"url" : "https://00xbyte.github.io/posts/bezeq-router-auth-bypass/" ,
2023-09-20 20:00:28 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-09-15 18:00:28 +00:00
}
]
}