2023-12-12 03:00:29 +00:00
{
"id" : "CVE-2023-36650" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2023-12-12T01:15:10.173" ,
2023-12-14 00:55:21 +00:00
"lastModified" : "2023-12-13T23:51:23.937" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-12-12 03:00:29 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A missing integrity check in the update system in ProLion CryptoSpike 3.0.15P2 allows attackers to execute OS commands as the root Linux user on the host system via forged update packages."
2023-12-12 15:05:13 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una verificaci\u00f3n de integridad faltante en el sistema de actualizaci\u00f3n en ProLion CryptoSpike 3.0.15P2 permite a los atacantes ejecutar comandos del sistema operativo como usuario ra\u00edz de Linux en el sistema host a trav\u00e9s de paquetes de actualizaci\u00f3n falsificados."
2023-12-12 03:00:29 +00:00
}
] ,
2023-12-14 00:55:21 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.2 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-354"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:prolion:cryptospike:3.0.15:p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "51A592E8-274C-4A8A-B925-075FCA82DD22"
}
]
}
]
}
] ,
2023-12-12 03:00:29 +00:00
"references" : [
{
"url" : "https://www.cvcn.gov.it/cvcn/cve/CVE-2023-36650" ,
2023-12-14 00:55:21 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-12-12 03:00:29 +00:00
}
]
}