2024-07-08 18:03:11 +00:00
{
"id" : "CVE-2023-45742" ,
"sourceIdentifier" : "talos-cna@cisco.com" ,
"published" : "2024-07-08T16:15:03.643" ,
2024-07-11 18:03:15 +00:00
"lastModified" : "2024-07-11T16:02:30.337" ,
"vulnStatus" : "Analyzed" ,
2024-07-08 18:03:11 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "An integer overflow vulnerability exists in the boa updateConfigIntoFlash functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability."
2024-07-11 18:03:15 +00:00
} ,
{
"lang" : "es" ,
"value" : "Existe una vulnerabilidad de desbordamiento de enteros en la funcionalidad boa updateConfigIntoFlash de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes HTTP especialmente manipuladas pueden provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede enviar una secuencia de solicitudes para desencadenar esta vulnerabilidad."
2024-07-08 18:03:11 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-07-11 18:03:15 +00:00
"source" : "nvd@nist.gov" ,
2024-07-08 18:03:11 +00:00
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.2 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 5.9
2024-07-11 18:03:15 +00:00
} ,
{
"source" : "talos-cna@cisco.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.2 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 5.9
2024-07-08 18:03:11 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "talos-cna@cisco.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-190"
}
]
}
] ,
2024-07-11 18:03:15 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7891A085-C128-426B-A8BB-70E688CAAF65"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "79082BA3-FBC4-4F38-8897-37E70D7B83D3"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "59DE58EE-DF41-48A2-B048-65A0666808F1"
}
]
}
]
}
] ,
2024-07-08 18:03:11 +00:00
"references" : [
{
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1877" ,
2024-07-11 18:03:15 +00:00
"source" : "talos-cna@cisco.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-07-08 18:03:11 +00:00
}
]
}