2024-12-08 03:06:42 +00:00

203 lines
5.2 KiB
JSON

{
"id": "CVE-2023-36482",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T20:15:10.230",
"lastModified": "2024-11-21T08:09:48.250",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Samsung NFC S3NRN4V, S3NSN4V, S3NSEN4, SEN82AB, and S3NRN82. A buffer copy without checking its input size can cause an NFC service restart."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:s3nrn4v_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1089C8FD-EABB-4072-871B-85D2126BEA09"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:s3nrn4v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "446E8337-5CC0-4BDE-BA5B-DA2E52B5EAD7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:s3nsn4v_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1467F670-E942-400C-859E-EC6EE8825841"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:s3nsn4v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5407BD71-3E81-449A-A18B-6C2A2A4BB201"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:s3nsen4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7F936F-264C-4A24-9C1A-CF29EE0B9C19"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:s3nsen4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75E12AC2-FE99-44A4-B5AC-59929CB6F9BA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:sen82ab_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B6B7E24-94EB-4D4D-A67E-BC8F45D8B97C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:sen82ab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7426CA04-7411-4002-81B6-336D95B2F6D2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:s3nrn82_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F5F9C92-300D-4F52-93A1-5799C06606DA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:s3nrn82:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B5552CF-7724-4F24-81E2-DFA4B94FD6D9"
}
]
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}