{ "id": "CVE-2023-36482", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-08T20:15:10.230", "lastModified": "2024-11-21T08:09:48.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung NFC S3NRN4V, S3NSN4V, S3NSEN4, SEN82AB, and S3NRN82. A buffer copy without checking its input size can cause an NFC service restart." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW" }, "exploitabilityScore": 2.8, "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-120" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:samsung:s3nrn4v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1089C8FD-EABB-4072-871B-85D2126BEA09" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:samsung:s3nrn4v:-:*:*:*:*:*:*:*", "matchCriteriaId": "446E8337-5CC0-4BDE-BA5B-DA2E52B5EAD7" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:samsung:s3nsn4v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1467F670-E942-400C-859E-EC6EE8825841" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:samsung:s3nsn4v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5407BD71-3E81-449A-A18B-6C2A2A4BB201" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:samsung:s3nsen4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC7F936F-264C-4A24-9C1A-CF29EE0B9C19" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:samsung:s3nsen4:-:*:*:*:*:*:*:*", "matchCriteriaId": "75E12AC2-FE99-44A4-B5AC-59929CB6F9BA" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:samsung:sen82ab_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B6B7E24-94EB-4D4D-A67E-BC8F45D8B97C" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:samsung:sen82ab:-:*:*:*:*:*:*:*", "matchCriteriaId": "7426CA04-7411-4002-81B6-336D95B2F6D2" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:samsung:s3nrn82_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F5F9C92-300D-4F52-93A1-5799C06606DA" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:samsung:s3nrn82:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B5552CF-7724-4F24-81E2-DFA4B94FD6D9" } ] } ] } ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] } ] }