2024-01-03 03:00:28 +00:00
{
"id" : "CVE-2023-41779" ,
"sourceIdentifier" : "psirt@zte.com.cn" ,
"published" : "2024-01-03T02:15:43.217" ,
2024-01-09 21:00:29 +00:00
"lastModified" : "2024-01-09T20:01:09.923" ,
"vulnStatus" : "Analyzed" ,
2024-01-03 03:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "There is an illegal memory access vulnerability of ZTE's ZXCLOUD iRAI product.When the vulnerability is exploited by an attacker with the common user permission, the physical machine will be crashed.\n\n\n"
2024-01-03 15:00:29 +00:00
} ,
{
"lang" : "es" ,
"value" : "Existe una vulnerabilidad de acceso ilegal a la memoria del producto ZXCLOUD iRAI de ZTE. Cuando la vulnerabilidad es explotada por un atacante con permiso de usuario com\u00fan, la m\u00e1quina f\u00edsica fallar\u00e1."
2024-01-03 03:00:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-01-09 21:00:29 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 5.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 3.6
} ,
2024-01-03 03:00:28 +00:00
{
"source" : "psirt@zte.com.cn" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 4.4 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 0.8 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
2024-01-09 21:00:29 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-863"
}
]
} ,
2024-01-03 03:00:28 +00:00
{
"source" : "psirt@zte.com.cn" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-119"
}
]
}
] ,
2024-01-09 21:00:29 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "7.23.32" ,
"matchCriteriaId" : "FC0DCC6B-32B8-4C28-BDAF-37604BA1ABFC"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C"
}
]
}
]
}
] ,
2024-01-03 03:00:28 +00:00
"references" : [
{
"url" : "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1034404" ,
2024-01-09 21:00:29 +00:00
"source" : "psirt@zte.com.cn" ,
"tags" : [
"Vendor Advisory"
]
2024-01-03 03:00:28 +00:00
}
]
}