2023-08-03 20:00:31 +00:00

84 lines
2.4 KiB
JSON

{
"id": "CVE-2023-3670",
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-07-28T08:15:10.557",
"lastModified": "2023-08-03T18:44:39.050",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In CODESYS Development System 3.5.9.0 to\u00a03.5.17.0 and\u00a0CODESYS Scripting\u00a04.0.0.0 to\u00a04.1.0.0 unsafe directory permissions would allow an attacker with local access to the workstation to place potentially harmful and disguised scripts that could be executed by legitimate users."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-668"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.5.9.0",
"versionEndExcluding": "3.5.17.0",
"matchCriteriaId": "727C53CA-E8D1-4280-8CFA-64A6ECFDA41B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:scripting:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0.0",
"versionEndExcluding": "4.1.0.0",
"matchCriteriaId": "FBD63247-C6C1-44FC-99C7-71FC875125A6"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-024",
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
]
}
]
}