mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 21:46:48 +00:00
63 lines
1.7 KiB
JSON
63 lines
1.7 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2023-0248",
|
||
|
"sourceIdentifier": "productsecurity@jci.com",
|
||
|
"published": "2023-12-14T21:15:07.553",
|
||
|
"lastModified": "2023-12-14T22:44:49.057",
|
||
|
"vulnStatus": "Awaiting Analysis",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "An attacker with physical access to the Kantech Gen1 ioSmart card reader with firmware version prior to 1.7.2 in certain circumstances can recover the reader's communication memory between the card and reader.\n\n"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "productsecurity@jci.com",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:L",
|
||
|
"attackVector": "ADJACENT_NETWORK",
|
||
|
"attackComplexity": "HIGH",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "CHANGED",
|
||
|
"confidentialityImpact": "LOW",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "LOW",
|
||
|
"baseScore": 7.5,
|
||
|
"baseSeverity": "HIGH"
|
||
|
},
|
||
|
"exploitabilityScore": 1.6,
|
||
|
"impactScore": 5.3
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "productsecurity@jci.com",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-200"
|
||
|
},
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-401"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-02",
|
||
|
"source": "productsecurity@jci.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories",
|
||
|
"source": "productsecurity@jci.com"
|
||
|
}
|
||
|
]
|
||
|
}
|