59 lines
2.2 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-6095",
"sourceIdentifier": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"published": "2024-04-26T08:15:11.327",
"lastModified": "2024-04-26T12:58:17.720",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "\nVladimir Kononovich, a Security Researcher has found a flaw that allows for a remote code execution on the DVR. An attacker could inject malicious HTTP headers into request packets to execute arbitrary code. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.\n\n"
},
{
"lang": "es",
"value": "Vladimir Kononovich, un investigador de seguridad, ha encontrado una falla que permite la ejecuci\u00f3n remota de c\u00f3digo en el DVR. Un atacante podr\u00eda inyectar encabezados HTTP maliciosos en paquetes de solicitud para ejecutar c\u00f3digo arbitrario. El fabricante ha publicado un parche de firmware para la falla; consulte el informe del fabricante para obtener detalles y workarounds."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.9,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.hanwhavision.com/wp-content/uploads/2024/04/NVR-DVR-Vulnerability-Report-CVE-2023-6095-6096.pdf",
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882"
}
]
}