2024-12-08 03:06:42 +00:00

64 lines
2.3 KiB
JSON

{
"id": "CVE-2023-43846",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-28T19:15:09.463",
"lastModified": "2024-11-21T08:24:53.053",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in logs management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote attackers to get the device logs via HTTP GET request. The logs contain such information as user names and IP addresses used in the infrastructure. This information may help the attackers to conduct further attacks in the infrastructure."
},
{
"lang": "es",
"value": "El control de acceso incorrecto en la funci\u00f3n de gesti\u00f3n de registros de la interfaz web en Aten PE6208 2.3.228 y 2.4.232 permite a atacantes remotos obtener los registros del dispositivo a trav\u00e9s de una solicitud HTTP GET. Los registros contienen informaci\u00f3n como nombres de usuario y direcciones IP utilizadas en la infraestructura. Esta informaci\u00f3n puede ayudar a los atacantes a realizar m\u00e1s ataques en la infraestructura."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://github.com/setersora/pe6208",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/setersora/pe6208",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}