mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
139 lines
4.8 KiB
JSON
139 lines
4.8 KiB
JSON
{
|
|
"id": "CVE-2023-24482",
|
|
"sourceIdentifier": "productcert@siemens.com",
|
|
"published": "2023-02-14T11:15:14.783",
|
|
"lastModified": "2023-02-22T15:43:48.470",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability has been identified in COMOS V10.2 (All versions), COMOS V10.3.3.1 (All versions < V10.3.3.1.45), COMOS V10.3.3.2 (All versions < V10.3.3.2.33), COMOS V10.3.3.3 (All versions < V10.3.3.3.9), COMOS V10.3.3.4 (All versions < V10.3.3.4.6), COMOS V10.4.0.0 (All versions < V10.4.0.0.31), COMOS V10.4.1.0 (All versions < V10.4.1.0.32), COMOS V10.4.2.0 (All versions < V10.4.2.0.25). Cache validation service in COMOS is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
},
|
|
{
|
|
"source": "productcert@siemens.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 10.0,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 6.0
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "productcert@siemens.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-120"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "10.2",
|
|
"versionEndExcluding": "10.3.3.1.45",
|
|
"matchCriteriaId": "5EE12A9C-F1CC-4E67-A3FF-DBEEDBD4FF87"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "10.3.3.2",
|
|
"versionEndExcluding": "10.3.3.2.33",
|
|
"matchCriteriaId": "0D6FCFC8-00D0-4A0E-B27A-F3A393A96838"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "10.3.3.3",
|
|
"versionEndExcluding": "10.3.3.3.9",
|
|
"matchCriteriaId": "7751C0FE-268F-4DAD-9B10-25FC7E97A3BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "10.3.3.4",
|
|
"versionEndExcluding": "10.3.3.4.6",
|
|
"matchCriteriaId": "7BD1A27A-5EE8-4AA1-B29D-0B534EC4E8B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "10.4.0.0",
|
|
"versionEndExcluding": "10.4.0.0.31",
|
|
"matchCriteriaId": "1CA2B391-8BB4-4224-8BDE-B00817F82E3E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "10.4.1.0",
|
|
"versionEndExcluding": "10.4.1.0.32",
|
|
"matchCriteriaId": "516D326A-E1CF-40ED-8B47-995CE0E51741"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "10.4.2.0",
|
|
"versionEndExcluding": "10.4.2.0.25",
|
|
"matchCriteriaId": "895FAF07-0DA5-459E-8C72-F5566F9562B8"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-693110.pdf",
|
|
"source": "productcert@siemens.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |