mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
93 lines
2.7 KiB
JSON
93 lines
2.7 KiB
JSON
{
|
|
"id": "CVE-2023-33757",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-01-25T08:15:08.420",
|
|
"lastModified": "2024-01-31T20:38:25.960",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A lack of SSL certificate validation in Splicecom iPCS (iOS App) v1.3.4, iPCS2 (iOS App) v2.8 and before, and iPCS (Android App) v1.8.5 and before allows attackers to eavesdrop on communications via a man-in-the-middle attack."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La falta de validaci\u00f3n del certificado SSL en Splicecom iPCS (iOS App) v1.3.4, iPCS2 (iOS App) v2.8 y anteriores, e iPCS (Android App) v1.8.5 y anteriores permite a los atacantes espiar las comunicaciones a trav\u00e9s de un ataque de man-in-the-middle."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.9,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.2,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-295"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splicecom:ipcs:*:*:*:*:*:android:*:*",
|
|
"versionEndIncluding": "1.8.5",
|
|
"matchCriteriaId": "EF0D97E8-4C21-497D-8EE6-413C1228BB11"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splicecom:ipcs:1.3.4:*:*:*:*:iphone_os:*:*",
|
|
"matchCriteriaId": "5D3B5805-04BF-4561-87E7-71980EEB3596"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splicecom:ipcs2:*:*:*:*:*:iphone_os:*:*",
|
|
"versionEndIncluding": "2.8",
|
|
"matchCriteriaId": "51D3CC91-4071-49CD-BCFA-75D519AC0034"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/twignet/splicecom",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |