mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-01 19:21:37 +00:00
323 lines
8.5 KiB
JSON
323 lines
8.5 KiB
JSON
{
|
|
"id": "CVE-2023-1258",
|
|
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
|
"published": "2023-03-31T08:15:06.397",
|
|
"lastModified": "2023-08-02T17:05:07.227",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ABB Flow-X firmware on Flow-X embedded hardware (web service modules) allows Footprinting.This issue affects Flow-X: before 4.0.\n\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 1.4
|
|
},
|
|
{
|
|
"source": "cybersecurity@ch.abb.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cybersecurity@ch.abb.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:abb:flow-x\\/m_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.2.6",
|
|
"matchCriteriaId": "1DCEC272-343C-4D88-9ED6-A3D5DC25A2FB"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:abb:flow-x\\/m:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "61233B04-F1F2-4C5B-A260-460D30CFC162"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:abb:flow-x\\/c_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.2.6",
|
|
"matchCriteriaId": "406419A5-33DC-489D-A3DC-2736C8C788B3"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:abb:flow-x\\/c:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B4F273C0-E67E-4F69-8F2C-D3F498755DDA"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:abb:flow-x\\/k_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.2.6",
|
|
"matchCriteriaId": "1A769914-724B-4D91-BF2C-A646EA0FF1A8"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:abb:flow-x\\/k:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2824256-84EE-45A6-9794-10F4AA580D11"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:abb:flow-x\\/s_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.2.6",
|
|
"matchCriteriaId": "7C079FE6-59A6-4220-B7FE-7AA47244C39C"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:abb:flow-x\\/s:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "15B144BE-2159-48A9-A097-599BDE51E8B2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:abb:flow-x\\/p_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.2.6",
|
|
"matchCriteriaId": "794E908F-D650-4E92-898E-A4FCAD199744"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:abb:flow-x\\/p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6B7823F0-C4B5-4A8F-8429-58CE14E46CE9"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:abb:flow-x_r_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.2.6",
|
|
"matchCriteriaId": "C75BB6AE-9113-43AA-AAAC-5D0CE4160F69"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:abb:flow-x_r:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E5A008E-37C8-46A4-AD6C-3E8BCD555B79"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:abb:flow-x\\/t_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.2.6",
|
|
"matchCriteriaId": "2C3CD012-F79D-4D51-85B2-90F10C11E5BE"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:abb:flow-x\\/t:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C96DF884-7DF2-46AB-B5C5-6BB301B030C3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:abb:flow-x\\/web_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.2.6",
|
|
"matchCriteriaId": "1845A152-6B8A-4B12-82BB-0CBE39D8738E"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:abb:flow-x\\/web:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "90F9782F-E7B8-45FC-8CBD-316ED3A7D37E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html",
|
|
"source": "cybersecurity@ch.abb.com",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108467A9754&LanguageCode=en&DocumentPartId=&Action=Launch",
|
|
"source": "cybersecurity@ch.abb.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |