René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

95 lines
2.5 KiB
JSON

{
"id": "CVE-2023-1327",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-03-14T22:15:10.367",
"lastModified": "2023-03-21T17:59:23.193",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Netgear RAX30 (AX2400), prior to version 1.0.6.74, was affected by an authentication bypass vulnerability, allowing an unauthenticated attacker to gain administrative access to the device's web management interface by resetting the admin password."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.6.74",
"matchCriteriaId": "5DA843E4-41CF-48B1-8AFD-4267BE3EEF40"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454"
}
]
}
]
}
],
"references": [
{
"url": "https://drupal9.tenable.com/security/research/tra-2023-10",
"source": "vulnreport@tenable.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://github.com/advisories/GHSA-pvxx-rv48-qw5m",
"source": "nvd@nist.gov",
"tags": [
"Third Party Advisory"
]
}
]
}