2023-12-06 17:01:02 +00:00
{
"id" : "CVE-2023-39538" ,
"sourceIdentifier" : "biossecurity@ami.com" ,
"published" : "2023-12-06T16:15:07.277" ,
2024-01-05 19:00:28 +00:00
"lastModified" : "2024-01-05T18:15:28.820" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-12-06 17:01:02 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "\nAMI AptioV contains a vulnerability in BIOS where a User may cause an unrestricted upload of a BMP Logo file with dangerous type by Local access. A successful exploit of this vulnerability may lead to a loss of Confidentiality, Integrity, and/or Availability.\u00a0\n\n\n\n\n\n"
2023-12-12 19:00:24 +00:00
} ,
{
"lang" : "es" ,
"value" : "AMI AptioV contiene una vulnerabilidad en BIOS donde un usuario puede provocar una carga sin restricciones de un archivo de logotipo BMP con un tipo peligroso mediante acceso local. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar una p\u00e9rdida de confidencialidad, integridad y/o disponibilidad."
2023-12-06 17:01:02 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-12-12 19:00:24 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
} ,
2023-12-06 17:01:02 +00:00
{
"source" : "biossecurity@ami.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 0.8 ,
"impactScore" : 6.0
}
]
} ,
"weaknesses" : [
2023-12-12 19:00:24 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-434"
}
]
} ,
2023-12-06 17:01:02 +00:00
{
"source" : "biossecurity@ami.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
} ,
{
"lang" : "en" ,
"value" : "CWE-434"
}
]
}
] ,
2023-12-12 19:00:24 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:ami:aptio_v:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7C73298F-5F7B-43DF-8772-567ACCE6D7FD"
}
]
}
]
}
] ,
2023-12-06 17:01:02 +00:00
"references" : [
{
"url" : "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023009.pdf" ,
2023-12-12 19:00:24 +00:00
"source" : "biossecurity@ami.com" ,
"tags" : [
"Vendor Advisory"
]
2024-01-05 19:00:28 +00:00
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20240105-0003/" ,
"source" : "biossecurity@ami.com"
2023-12-06 17:01:02 +00:00
}
]
}