96 lines
2.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2023-1327",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-03-14T22:15:10.367",
"lastModified": "2023-03-21T17:59:23.193",
"vulnStatus": "Analyzed",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Netgear RAX30 (AX2400), prior to version 1.0.6.74, was affected by an authentication bypass vulnerability, allowing an unauthenticated attacker to gain administrative access to the device's web management interface by resetting the admin password."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454"
2023-04-24 12:24:31 +02:00
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.6.74",
"matchCriteriaId": "5DA843E4-41CF-48B1-8AFD-4267BE3EEF40"
2023-04-24 12:24:31 +02:00
}
]
}
]
}
],
"references": [
{
"url": "https://drupal9.tenable.com/security/research/tra-2023-10",
"source": "vulnreport@tenable.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://github.com/advisories/GHSA-pvxx-rv48-qw5m",
"source": "nvd@nist.gov",
"tags": [
"Third Party Advisory"
]
}
]
}