René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

93 lines
2.5 KiB
JSON

{
"id": "CVE-2023-27100",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-22T23:15:12.350",
"lastModified": "2023-04-10T20:15:11.237",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Improper restriction of excessive authentication attempts in the SSHGuard component of Netgate pfSense Plus software v22.05.1 and pfSense CE software v2.6.0 allows attackers to bypass brute force protection mechanisms via crafted web requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netgate:pfsense_plus:22.05.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F3B5179-1D65-4536-AC94-FC7CCE8288DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pfsense:pfsense:2.6.0:*:*:*:community:*:*:*",
"matchCriteriaId": "7F69B7B3-805F-4604-9710-80F11F5E4142"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/171791/pfsenseCE-2.6.0-Protection-Bypass.html",
"source": "cve@mitre.org"
},
{
"url": "https://docs.netgate.com/downloads/pfSense-SA-23_05.sshguard.asc",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://redmine.pfsense.org/issues/13574",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
}
]
}