mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
308 lines
10 KiB
JSON
308 lines
10 KiB
JSON
{
|
|
"id": "CVE-2023-43775",
|
|
"sourceIdentifier": "CybersecurityCOE@eaton.com",
|
|
"published": "2023-09-27T15:19:34.517",
|
|
"lastModified": "2023-10-02T18:32:56.620",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Denial-of-service vulnerability in the web server of the Eaton SMP Gateway allows \n\nattacker to potentially force an unexpected restart of the automation platform, impacting the availability of the product. In rare situations, the issue could cause\nthe SMP device to restart in Safe Mode or Max Safe Mode. When in Max Safe Mode, the product is\nnot vulnerable anymore.\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad de denegaci\u00f3n de servicio en el servidor web de Eaton SMP Gateway permite a un atacante forzar potencialmente un reinicio inesperado de la plataforma de automatizaci\u00f3n, lo que afecta la disponibilidad del producto. En situaciones excepcionales, el problema podr\u00eda provocar que el dispositivo SMP se reinicie en Modo Seguro o Modo Seguro M\u00e1ximo. Cuando est\u00e1 en Modo Seguro M\u00e1ximo, el producto ya no es vulnerable."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 1.4
|
|
},
|
|
{
|
|
"source": "CybersecurityCOE@eaton.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 4.7,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "CybersecurityCOE@eaton.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-400"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:eaton:smp_sg-4260:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2DB90749-D036-4E69-9666-D2F12B3352AE"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_sg-4260_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.0",
|
|
"versionEndExcluding": "8.0r9",
|
|
"matchCriteriaId": "19285A3B-E34F-4C81-B3AF-588041DF2124"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_sg-4260_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.1",
|
|
"versionEndExcluding": "8.1r5",
|
|
"matchCriteriaId": "9561C79D-2DE3-4DCB-92DA-76A3A09ADC81"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_sg-4260_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.2",
|
|
"versionEndExcluding": "8.2r4",
|
|
"matchCriteriaId": "A7BB498B-5CFA-4525-99FA-68BAE9E8CC36"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:eaton:smp_sg-4250:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F627928D-DEE2-4028-B6FB-D67185D52CA8"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_sg-4250_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.0",
|
|
"versionEndExcluding": "8.0r9",
|
|
"matchCriteriaId": "7E0B3C20-2670-42B6-90A7-2242225C39F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_sg-4250_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.1",
|
|
"versionEndExcluding": "8.1r5",
|
|
"matchCriteriaId": "86BD7193-D822-4D96-A3D3-D2688D2CE608"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_sg-4250_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.2",
|
|
"versionEndExcluding": "8.2r4",
|
|
"matchCriteriaId": "93609CFE-55B8-4F43-9166-D5395D6C27A2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_sg-4250_firmware:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "06AEBF3E-1249-45F2-9300-EEFAFAA7E38C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_sg-4250_firmware:7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C6ACBFF2-A26D-451A-99FE-467EB4B5AC83"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_sg-4250_firmware:7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DFA92FFB-3CC4-4FEB-B6CC-F8DFE6508490"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:eaton:smp_4\\/dp:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A22E3F1B-4169-48E5-A6A2-A85BFE89F005"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_4\\/dp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.0",
|
|
"versionEndExcluding": "8.0r9",
|
|
"matchCriteriaId": "997B78C0-A026-4145-B66C-A8F3398769CB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_4\\/dp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.1",
|
|
"versionEndExcluding": "8.1r5",
|
|
"matchCriteriaId": "8AB7A7BF-22BC-48C5-9897-8FFA11C06FE1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_4\\/dp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.2",
|
|
"versionEndExcluding": "8.2r4",
|
|
"matchCriteriaId": "0B9AF8CE-0BAF-4B3B-8138-094716BA2E97"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_4\\/dp_firmware:6.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0F150FA-9366-45D6-B9E8-4660F64B49EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_4\\/dp_firmware:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2F9B5FAC-C4C7-4D3A-9A4C-F8017DEED7CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_4\\/dp_firmware:7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F0BBCC24-B3FB-47B7-9E81-80C8D5D6BD8C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_4\\/dp_firmware:7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4A2ECEDB-E550-4774-BC21-F7CA2A24B034"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:eaton:smp_16:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "214D0DBE-BA0E-4C39-9361-8A845A91ED86"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_16_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.0",
|
|
"versionEndExcluding": "8.0r9",
|
|
"matchCriteriaId": "33F8E4EE-EBBD-4DCB-95F6-EC09BCCA1220"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_16_firmware:6.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "99E3E73E-B44D-465B-A550-AAE11F1153BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_16_firmware:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D8EE1D03-E334-4242-A738-9C6B8B95A1CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_16_firmware:7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5F97B69B-F2A6-4F6F-8E9A-3503DA56D589"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:eaton:smp_16_firmware:7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9E30826-A5F0-4946-86E9-31E878A178E3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2022-1008.pdf",
|
|
"source": "CybersecurityCOE@eaton.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |