2023-12-05 17:00:22 +00:00
{
"id" : "CVE-2023-6357" ,
"sourceIdentifier" : "info@cert.vde.com" ,
"published" : "2023-12-05T15:15:08.983" ,
2023-12-11 21:00:22 +00:00
"lastModified" : "2023-12-11T20:49:14.117" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-12-05 17:00:22 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device."
2023-12-11 21:00:22 +00:00
} ,
{
"lang" : "es" ,
"value" : "Un atacante remoto con pocos privilegios podr\u00eda aprovechar la vulnerabilidad e inyectar comandos adicionales del sistema a trav\u00e9s de librer\u00edas del sistema de archivos que podr\u00edan darle al atacante el control total del dispositivo."
2023-12-05 17:00:22 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "info@cert.vde.com" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "info@cert.vde.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-78"
}
]
}
] ,
2023-12-11 21:00:22 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.11.0.0" ,
"matchCriteriaId" : "DEFEF3B4-03F2-4E09-A8F2-02A0604CB8BF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_empc-a\\/imx6:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.11.0.0" ,
"matchCriteriaId" : "B2DB55B1-CAFE-435B-8776-DB4D33ED9C98"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.11.0.0" ,
"matchCriteriaId" : "7D492DB3-94BA-4F14-8119-1610AB4F95EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_linux_arm_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.11.0.0" ,
"matchCriteriaId" : "97D00DF9-EBF1-4DEC-8A49-694871643B9F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.11.0.0" ,
"matchCriteriaId" : "D6F207B6-5906-4B39-A5B4-A07F6D5A9BB9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.11.0.0" ,
"matchCriteriaId" : "7791D9E4-CEC3-4658-8E2C-8F08882CE4F4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.11.0.0" ,
"matchCriteriaId" : "9CADE021-8D58-4BC5-BA60-A16FE24FBA73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.11.0.0" ,
"matchCriteriaId" : "B3948946-E7B8-4D7E-8D1D-80B9E0DB47AF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.11.0.0" ,
"matchCriteriaId" : "7C9DF443-E965-4480-B76E-4A25CF2E714F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.11.0.0" ,
"matchCriteriaId" : "F5FCD76E-A3F5-4E02-AD3F-B2BDE708A651"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.5.19.50" ,
"matchCriteriaId" : "162DB2B8-3426-43F7-848A-BE542C24619C"
}
]
}
]
}
] ,
2023-12-05 17:00:22 +00:00
"references" : [
2023-12-11 21:00:22 +00:00
{
"url" : "https://cert.vde.com/en/advisories/VDE-2023-066" ,
"source" : "nvd@nist.gov" ,
"tags" : [
"Mitigation" ,
"Third Party Advisory"
]
} ,
2023-12-05 17:00:22 +00:00
{
"url" : "https://https://cert.vde.com/en/advisories/VDE-2023-066" ,
2023-12-11 21:00:22 +00:00
"source" : "info@cert.vde.com" ,
"tags" : [
"Broken Link"
]
2023-12-05 17:00:22 +00:00
}
]
}