2024-12-08 03:06:42 +00:00

64 lines
2.2 KiB
JSON

{
"id": "CVE-2023-41921",
"sourceIdentifier": "cert@ncsc.nl",
"published": "2024-07-02T08:15:04.160",
"lastModified": "2024-11-21T08:21:55.600",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability allows attackers to download source code or an executable from a remote location and execute the code without sufficiently verifying the origin and integrity of the code. This vulnerability can allow attackers to modify the firmware before uploading it to the system, thus achieving the modification of the target\u2019s integrity to achieve an insecure state."
},
{
"lang": "es",
"value": "Una vulnerabilidad permite a los atacantes descargar c\u00f3digo fuente o un ejecutable desde una ubicaci\u00f3n remota y ejecutar el c\u00f3digo sin verificar suficientemente el origen y la integridad del c\u00f3digo. Esta vulnerabilidad puede permitir a atacantes modificar el firmware antes de subirlo al sistema, logrando as\u00ed modificar la integridad del objetivo para alcanzar un estado inseguro."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cert@ncsc.nl",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cert@ncsc.nl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-494"
}
]
}
],
"references": [
{
"url": "https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273",
"source": "cert@ncsc.nl"
},
{
"url": "https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}